This document is a requirements worksheet for an ITS (Information Technology Services) project at UNCG. It collects information about the business need, users, technical requirements, service and support needs, and application requirements for a new or upgraded system. Key details include that it impacts the entire university, has multiple stakeholders, and requires information on things like data security, network needs, support roles, and application architecture. The document is used to scope the project and size resource needs.
Discusses the microservices architectural style for cloud-based systems. Explains what is meant by microservices and architectural choices for microservices
Discusses the microservices architectural style for cloud-based systems. Explains what is meant by microservices and architectural choices for microservices
Slide 2.
#Topics covered (Software process models
#Process activities
#Coping with change
#Process improvement)
Slide 3.
(The software process)
# A structured set of activities required to develop a software system.
# Many different software processes but all involve:
Specification – defining what the system should do;
Design and implementation – defining the organization of the system and implementing the system;
Validation – checking that it does what the customer wants;
Evolution – changing the system in response to changing customer needs.
# A software process model is an abstract representation of a process. It presents a description of a process from some particular perspective.
Slide
Obstacle Driven Development is the latest engineering process and combines Test Driven Development with safety critical V-model development.
This updated presentation demonstrates how ODD extends and combines requirements analysis with Test Driven Development and V-models.
Please see the series for further details.
MANAGING S/W DESIGN CHANGES USING C.R. DESIGNERIJSEA
The development of any software product depends on how efficiently design documents are created. The
various kind of design document which are required to be created for the development of software product
are High level Design (HLD), Low Level Design (LLD) and Change Request Design (CRD) Document .
Low level design document gives the design of the actual software application. Low level design document
is based on High Level Design document [2]. After an application is implemented at client site, there can
be changes which the client may ask during the implementation or maintenance phase. For such changes,
Change Request Design documents are created. A good design document will make the application very
easy to develop/maintain by the developer. CR Designer tool is designed and developed to create a
standard Change Request Design (CRD) documents and tracing the changes done in processes of the
module in different versions of CRD document released. This paper presents a new dimension tool for
Change Request Design Document.
55 Customer Development Survey Questions!Wilson Pang
Here's a list of customer development questions that you can use to survey your customers in order to learn more about them and build a better customer relationship
Slide 2.
#Topics covered (Software process models
#Process activities
#Coping with change
#Process improvement)
Slide 3.
(The software process)
# A structured set of activities required to develop a software system.
# Many different software processes but all involve:
Specification – defining what the system should do;
Design and implementation – defining the organization of the system and implementing the system;
Validation – checking that it does what the customer wants;
Evolution – changing the system in response to changing customer needs.
# A software process model is an abstract representation of a process. It presents a description of a process from some particular perspective.
Slide
Obstacle Driven Development is the latest engineering process and combines Test Driven Development with safety critical V-model development.
This updated presentation demonstrates how ODD extends and combines requirements analysis with Test Driven Development and V-models.
Please see the series for further details.
MANAGING S/W DESIGN CHANGES USING C.R. DESIGNERIJSEA
The development of any software product depends on how efficiently design documents are created. The
various kind of design document which are required to be created for the development of software product
are High level Design (HLD), Low Level Design (LLD) and Change Request Design (CRD) Document .
Low level design document gives the design of the actual software application. Low level design document
is based on High Level Design document [2]. After an application is implemented at client site, there can
be changes which the client may ask during the implementation or maintenance phase. For such changes,
Change Request Design documents are created. A good design document will make the application very
easy to develop/maintain by the developer. CR Designer tool is designed and developed to create a
standard Change Request Design (CRD) documents and tracing the changes done in processes of the
module in different versions of CRD document released. This paper presents a new dimension tool for
Change Request Design Document.
55 Customer Development Survey Questions!Wilson Pang
Here's a list of customer development questions that you can use to survey your customers in order to learn more about them and build a better customer relationship
Understanding Your Customer: Personas and Action Plan WorksheetAngela Ognev
You want to "make something people want," but who are the people and what they want? Use this worksheet to break down the real implications of demographics, what drives people or pushes them away, the assumptions you're making and what you want to know more about, and create a plan to dive even deeper?
Why? When you create a product people want, need, and are delighted by, you provide immense value and build a company that impacts lives.
NOTE: Do as many persona sheets as you need. Think about each niche you're targeting, and if you have end-users, customers, individuals, and companies to reach out to.
Persona for individual (B2C): http://www.slideshare.net/AngelaOgnev/customer-person-pact-ws-angela-ognev
Persona for companies (B2B): http://www.slideshare.net/AngelaOgnev/customer-company-pact-ws-angela-ognev
Workshop presentation by Darren Sharp Resonate Solutions to SOCAP Australia FMCG group. Presented at SOCAP 2012 annual conference in Melbourne Australia 29 August 2012.
The Goal Setting Workshop helps to define a Mission Statement, then create goals in alignment with that vision statement, with balance in 8 key life areas, and then develops the first action plan based on each of the goals.
Want to migrate from one technology platform to another?
Seems simple. Done so many times, this initiative still sounds like a deja vu to lot of teams and executives in organizations big and small, flat or hierarchical or matrix management culture.
First principle - Socialize, engage, educate, evangelize and get the buy in of direct and in-direct stakeholders.
How do you go through all that using a disciplined approach?
Check this out. Feel free to contact me for clarifications anytime via info @ ValueRealizationInc.com
Business Case Capstone IIConnie FarrisColorado T.docxjasoninnes20
Business Case Capstone II
Connie Farris
Colorado Technical University
IT Capstone II
(IT488-1904B-01)
Henrietta Okora
Running head: BUSINESS CASE CAPSTONE II 1
BUSINESS CASE CAPSTONE II 4
Abstract
BUSINESS CASE CAPSTONE II 3
Business Case Capstone II
Table of Contents
Table of Contents
Abstract2
(Week 1) Section 1: Overview of the project (from IT487)4
Overview4
I75 Corridor5
(Week 1) Section 2: Requirements (from IT487)6
(Week 1) Section 3: Design (from IT487)8
(Week 1) Section 4: System development methodology10
(Week 1) Section 5: Work breakdown structure12
Work Break down Structure13
(Week 1) Section 6: Communication plan14
Communication Matrix15
(Week 2) Section 7: Quality Assurance Plan16
(Week 3) Section 8: Documentation plan17
(Week-4) Section 9: Quality Assurance and results of test-case execution18
Section 10 – Project closure19
QUALITY MANAGEMENT REPORT20
Introduction20
Requirements21
Resources22
Design24
System Development Methodology25
Communication Plan27
References28
(Week 1) Section 1: Overview of the project (from IT487)Overview
The Galactic Customer IT Services is an IT support company with over 250,000 employees with companies in 50 States with the main headquarters located in Gainesville, FL. The location chosen for the headquarters is based on a Telco Gateway Infrastructure that the main fiber-optic trunk line, which runs along the I-75 corridor, from Miami Lakes FL to the northern most part of Michigan. This I-75 corridor plays an important part of the Networking ability for the organization. The Galactic Customer IT Services is an IT support company, which provides IT support to various small to large companies both within the Unites States and support to various military bases overseas. This large customer service company has installed application software to its large Help Desk ticketing system. The next phase being implemented is the upgrading of its Networking Infrastructure, which also includes cloud-based networking. This Organization has several new updated Servers ready to install on the network. With the previous project being accepted the organization has decided to move forward to improving its networking infrastructure, however the organization has requested the project team to draft a plan that requires the following in the plan: Requirements, Design, System Development Methodology, WBS (Work Breakdown Structure), Communications Plan, Quality Assurance Plan, Documentation Plan, and Quality Assurance and results of test-case execution before the project can be closed. Additionally, this organization is upgrading it phone systems to Voice Over Internet Protocol, which will eliminate all Intra-Ladder costs from Telco Companies and the cloud-based networking will also be added to the VoIP system. Using the Waterfall method, the plan below will detail the necessary requirements and resources that will be taken by Galactic IT to provide the most comprehensive plan possible reg ...
Threat and Risk Assessment QuestionnaireCompletion da.docxMARRY7
Threat and Risk Assessment Questionnaire
Completion date:
Reviewed date:
Responsible ICT division:
<Operations or Business Services>
Service:
<Enter service being assessed>
Security Classification:
Unclassified
Confidentiality category:
ICT-IN-CONFIDENCE
threat and Risk assessment questionnaire completed by:
Section
Completed by:
Completed by:
Date
1. Current Operational Status
2. Privacy Focus
3. Documentation Focus
4. Employee Focus
5. Application Focus
6. Data Focus
7. Identity Management Focus
8. Physical Focus
9. Server Focus
10. Network Focus
11. Cloud Services
12. Third Party Agreements
Document version control
Version
Date
Author
Summary of changes
1.0
<date>
Author
<changes>
Table of contents
threat and Risk assessment questionnaire completed by:2
Document version control3
Table of contents4
Introduction5
Purpose of system5
Scope5
1.current operational status5
2.privacy focus5
3.documentation focus7
4.employee focus8
5.application focus9
6.data focus12
7.identity management focus14
8.physical focus16
9.server focus19
10.network focus21
11.cloud services24
12.third party agreements26
Associated documents27
references28
Document review28
Appendix A29
RACI Responsibility Matrix29
Appendix b29
semi quantitative analysis30
Threat and Risk Assessment Questionnaire 2 April 2015
Page 1 of 1
Introduction
This Threat and Risk Assessment Questionnaire, which is agnostic to the technology being utilised, is designed to assist in categorising and assessing the risks to services they provide to business.
Each section should be completed by the person (or delegate) who is responsible for that part of the system. NOTE: ONLY complete sections of this document which are relevant to the system being assessed.
Each section contains a list of best practice security standards that should be considered during design, development and implementation of the system, and may pose a risk if they have not been considered. For each of these, a description of the current controls in place and their effectiveness should be added, along with the likelihood and the consequence if the risk is not addressed. Refer to Appendix B for an explanation of how to evaluate the Likelihood and Consequence. Purpose of system
<Describe the service that is being assessed>Scope
<Describe the scope of the threat and risk assessment including any limitations>1. current operational status
Please select the current operational status of the service being assessed?
Operational (currently in production)
In-Development (being designed, developed, or deployed)
Transition (currently undergoing a major upgrade or transition)
2. privacy focus
Answering Yes to any of the following questions may suggest that consultation with a privacy officer is required or with the NSW Privacy Commissioner who can provide advice on the Privacy and Personal Information Protection Act 1998.
Please answer the following questions about privacy regarding the s ...
BUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docxjasoninnes20
BUSINESS CASE CAPSTONE 2
BUSINESS CASE CAPSTONE 3
Business Case Capstone
Connie Farris
Raphael Brown
Jim Chambers
Shaun Cummings
Deandre Kralevic
Colorado Technical University
IT Capstone II
(IT488-1904B-01)
Henrietta Okora
Running head: BUSINESS CASE CAPSTONE 1
Business Case Capstone
Table of Contents
(Week 1) Section 1: Overview of the project (from IT487)3
Overview3
I75 Corridor4
Section 2: Requirements (from IT487)5
Section 3: Design (from IT487)7
Section 4: System development methodology9
Section 5: Work breakdown structure11
Section 6: Communication Plan13
(WEEK 2) Section 7: Quality Assurance Plan TBD15
(WEEK 3) Section 8: Documentation Plan TBD16
(Week 4) Section 9: Quality Assurance and results of test-case execution TBD17
Section 10: Project Closure18
References:19
(Week 1) Section 1: Overview of the project (from IT487)Overview
The Galactic Customer IT Services is IT Support Company with over 250,000 employees with companies in over 50 states with the main headquarters located in Gainesville, FL. The location chosen for the headquarters is based on a Telco Gateway Infrastructure that the main fiber-optic truck line runs along the I75 corridor, from Miami Lakes FL to the northern part of Michigan. This I75 corridor plays an important part of the Networking ability for the organization. The Galactic Customer IT Services is an IT support company, which provides IT support to various small to large companies both within the Unites States and support to various military bases overseas. This large customer service company has installed application software to its large Help Desk ticketing system. The next phase being implemented is the upgrading of its Networking Infrastructure, which also includes cloud-based networking. This Organization has several new updated Servers ready to install on the network. With the previous project being accepted the organization has decided to move forward to improving its networking infrastructure, however the organization has request the project team to draft a plan that requires the following in the plan: Requirements, Design, System Development Methodology, WBS (Work Breakdown Structure), Communications Plan, Quality Assurance Plan, Documentation Plan, and Quality Assurance and results of test-case execution be the project can be closed. I75 Corridor
http://gregkantner.com/blog/wp-content/uploads/2012/05/interstate-75-map.gif
Section 2: Requirements (from IT487)
The project requirements here are derived from the software requirements for the Galactic customer services. The project was to create new ticketing software that the customer wanted upgraded and to completely replace the previous product. The requirements are the following:
• Ticket system
• Ticke ...
Planning and Preparing for Electronic Health Recordsncofield
Implementing an Electronic Medical Records system is a daunting task for medical practices. This brief presentation can help a physician office understand all of the different facets of an EMR deployment and how the EMR will affect the entire network infrastructure of the practice.
Visa photo dimensions sample photos rules_adultsAditya Pandey
ALL DETAILS & DIMENSIONS REQUIRED FOR PHOTOS FOR VISA.
ALL COUNTRIES COVERED.
REJECTED PHOTO SAMPLES ALSO COVERED.
ALL ADULTS & CHILDREN REQUIREMENTS.
SAY THANKS IF YOU LIKE & FOUND USEFUL.
CHEERS, ADITYA
Visa photo dimensions sample photos rejected_photosAditya Pandey
ALL DETAILS & DIMENSIONS REQUIRED FOR PHOTOS FOR VISA.
ALL COUNTRIES COVERED.
REJECTED PHOTO SAMPLES ALSO COVERED.
ALL ADULTS & CHILDREN REQUIREMENTS.
SAY THANKS IF YOU LIKE & FOUND USEFUL.
CHEERS, ADITYA
Visa photo dimensions sample photos childrenAditya Pandey
ALL DETAILS & DIMENSIONS REQUIRED FOR PHOTOS FOR VISA.
ALL COUNTRIES COVERED.
REJECTED PHOTO SAMPLES ALSO COVERED.
ALL ADULTS & CHILDREN REQUIREMENTS.
SAY THANKS IF YOU LIKE & FOUND USEFUL.
CHEERS, ADITYA
Visa photo dimensions sample photos adultsAditya Pandey
ALL DETAILS & DIMENSIONS REQUIRED FOR PHOTOS FOR VISA.
ALL COUNTRIES COVERED.
REJECTED PHOTO SAMPLES ALSO COVERED.
ALL ADULTS & CHILDREN REQUIREMENTS.
SAY THANKS IF YOU LIKE & FOUND USEFUL.
CHEERS, ADITYA
Senior Project and Engineering Leader Jim Smith.pdfJim Smith
I am a Project and Engineering Leader with extensive experience as a Business Operations Leader, Technical Project Manager, Engineering Manager and Operations Experience for Domestic and International companies such as Electrolux, Carrier, and Deutz. I have developed new products using Stage Gate development/MS Project/JIRA, for the pro-duction of Medical Equipment, Large Commercial Refrigeration Systems, Appliances, HVAC, and Diesel engines.
My experience includes:
Managed customized engineered refrigeration system projects with high voltage power panels from quote to ship, coordinating actions between electrical engineering, mechanical design and application engineering, purchasing, production, test, quality assurance and field installation. Managed projects $25k to $1M per project; 4-8 per month. (Hussmann refrigeration)
Successfully developed the $15-20M yearly corporate capital strategy for manufacturing, with the Executive Team and key stakeholders. Created project scope and specifications, business case, ROI, managed project plans with key personnel for nine consumer product manufacturing and distribution sites; to support the company’s strategic sales plan.
Over 15 years of experience managing and developing cost improvement projects with key Stakeholders, site Manufacturing Engineers, Mechanical Engineers, Maintenance, and facility support personnel to optimize pro-duction operations, safety, EHS, and new product development. (BioLab, Deutz, Caire)
Experience working as a Technical Manager developing new products with chemical engineers and packaging engineers to enhance and reduce the cost of retail products. I have led the activities of multiple engineering groups with diverse backgrounds.
Great experience managing the product development of products which utilize complex electrical controls, high voltage power panels, product testing, and commissioning.
Created project scope, business case, ROI for multiple capital projects to support electrotechnical assembly and CPG goods. Identified project cost, risk, success criteria, and performed equipment qualifications. (Carrier, Electrolux, Biolab, Price, Hussmann)
Created detailed projects plans using MS Project, Gant charts in excel, and updated new product development in Jira for stakeholders and project team members including critical path.
Great knowledge of ISO9001, NFPA, OSHA regulations.
User level knowledge of MRP/SAP, MS Project, Powerpoint, Visio, Mastercontrol, JIRA, Power BI and Tableau.
I appreciate your consideration, and look forward to discussing this role with you, and how I can lead your company’s growth and profitability. I can be contacted via LinkedIn via phone or E Mail.
Jim Smith
678-993-7195
jimsmith30024@gmail.com
The case study discusses the potential of drone delivery and the challenges that need to be addressed before it becomes widespread.
Key takeaways:
Drone delivery is in its early stages: Amazon's trial in the UK demonstrates the potential for faster deliveries, but it's still limited by regulations and technology.
Regulations are a major hurdle: Safety concerns around drone collisions with airplanes and people have led to restrictions on flight height and location.
Other challenges exist: Who will use drone delivery the most? Is it cost-effective compared to traditional delivery trucks?
Discussion questions:
Managerial challenges: Integrating drones requires planning for new infrastructure, training staff, and navigating regulations. There are also marketing and recruitment considerations specific to this technology.
External forces vary by country: Regulations, consumer acceptance, and infrastructure all differ between countries.
Demographics matter: Younger generations might be more receptive to drone delivery, while older populations might have concerns.
Stakeholders for Amazon: Customers, regulators, aviation authorities, and competitors are all stakeholders. Regulators likely hold the greatest influence as they determine the feasibility of drone delivery.
The Team Member and Guest Experience - Lead and Take Care of your restaurant team. They are the people closest to and delivering Hospitality to your paying Guests!
Make the call, and we can assist you.
408-784-7371
Foodservice Consulting + Design
Oprah Winfrey: A Leader in Media, Philanthropy, and Empowerment | CIO Women M...CIOWomenMagazine
This person is none other than Oprah Winfrey, a highly influential figure whose impact extends beyond television. This article will delve into the remarkable life and lasting legacy of Oprah. Her story serves as a reminder of the importance of perseverance, compassion, and firm determination.
Artificial intelligence (AI) offers new opportunities to radically reinvent the way we do business. This study explores how CEOs and top decision makers around the world are responding to the transformative potential of AI.
Its requirements worksheet for scoping and sizing v2.0
1. ITS Requirements Worksheet
For Scoping and Sizing Work V2.0
Request Name: Request Date:
Remedy Request #:
Client Name:
Client Department: Client Division:
Business Analyst:
10/1/2014 PAGE 1 OF 13 Worksheet for Scoping and Sizing
Template Version 2.0
SERVICE OVERVIEW
Audience: Sponsor
1. Business Need
Please list the specific University or Information Technology Services Strategic
Goals, Policies, and/or Procedures of relevance for this project: (Refer to University
plan, supporting Divisional Operational Plans and other technology-related policies
http://its.uncg.edu/Technology_Policies/.
1.1 University Business Need
1.2 Business Goal
1.3 What is the expected scope of impact?
Department (name):
Division (choose one or more) Schools/Administrative Unit(s)
Academic Affairs
Business Affairs
Information Technology Services
Student Affairs
University Advancement
University-wide (includes Students)
External Clients or UNC Entities (name):
Other
Additional Notes:
1.4 Who are the non-ITS Stakeholders?
1.4.1 Client sponsor:
2. ITS Requirements Worksheet
For Scoping and Sizing Work V2.0
10/1/2014 PAGE 2 OF 13 Worksheet for Scoping and Sizing
Template Version 2.0
1.4.2 Client project members:
1.4.3 Client testers:
1.5 What are the funding and implementation considerations?
1.5.1 Is funding available for hardware, software, additional staff (if required),
and ongoing maintenance?
No
Yes, if so:
1.5.1.1 Has an estimate of ITS costs been delivered?
1.5.2 What is the implementation (one time) budget?
1.5.3 What is the annual (on-going) budget?
1.5.2 Are there implementation timing/deadline considerations?
No
Yes
1.5.2.1 If yes, what is the desired implementation window?
1.5.2.2 What, if any, are the requirements (or drivers) impacting this
implementation window?
1.6 Is this replacing another application, system, or service?
No
Yes – which one?
1.7 Is this an upgrade of an existing application, system, or service?
No
Yes – which one?
1.8 Is this request part of another related initiative or project?
3. ITS Requirements Worksheet
For Scoping and Sizing Work V2.0
10/1/2014 PAGE 3 OF 13 Worksheet for Scoping and Sizing
Template Version 2.0
No
Yes – which one?
2. User Information
2. 1 Expected number of users?
Total authorized users Total concurrent online users
Internal to UNCG:
Students
Faculty and Staff
External to UNCG:
2.2 Location of user community?
Off-campus
On-campus dormitory rooms
On-campus all other areas
2.3 What is the expected frequency of use? Daily
2.4 Is the application ADA compliant?
Yes
No
Don’t Know
2.4.1 If no, can the application be made reasonably compliant?
Yes
No
Don’t Know
4. ITS Requirements Worksheet
For Scoping and Sizing Work V2.0
Technical Overview <Sections filled out as needed>
Audience: Client and Technical Subject Matter Experts
3. Data/Service/System Requirements N/A
3.1 What are the service/application/system access requirements?
Labs
Dorm rooms
Offices (On Main Campus)
Offices (Off Main Campus locations such as North or South Campus, leased
10/1/2014 PAGE 4 OF 13 Worksheet for Scoping and Sizing
Template Version 2.0
space
Wireless authenticated (w/UNCG login ID)
Wireless guest
Off-campus
All of the above
3.2 What types of data will be used within the system/application?
Restricted (data whose disclosure to unauthorized persons would be a
violation of federal or state laws or University contracts see the Data
Classification Policy)
Not restricted (data to which the general public may be granted access in
accordance with the North Carolina Public Records Act)
Credit/debit or other payment card information (Payment Card Industry
(PCI) Compliance)
Data subject to Record Retention Guidelines
(http://its.uncg.edu/Policy_Manual/Electronic_Records/)
HIPAA (Health Insurance Portability and Accountability Act, and ARRA of
2009) (protected health information) compliant requirements
FERPA (Family Educational Rights and Privacy)
(protected student information) compliant requirements
Personnel Data (State Personnel Act)
(http://its.uncg.edu/Policy_Manual/Electronic_Records/)
UNCG Spartan Cash from Blackboard Transaction System
5. ITS Requirements Worksheet
For Scoping and Sizing Work V2.0
10/1/2014 PAGE 5 OF 13 Worksheet for Scoping and Sizing
Template Version 2.0
3.3 Does the system store data?
No
Yes, if so:
Does the proposed system store data that is not already stored in
another UNCG system?
Are there other places that might need to use/have this data?
3.4 What data collection method do you prefer to be used?
User self-entered data
Data entered by administrator or office staff
Data feed from an external source
3.5 Is there a need for INCOMING electronic data transfer into this system either
from an on-campus system or from an external source?
No
Yes (please specify source)
3.5.1 Will any required data feeds/flows into the application be real-time
(including near real-time) or batch?
Real/near-real time
Batch
3.6 Is there a need for OUTGOING electronic transfer data transfer from this
system either to either an on-campus system or to a location outside of the UNCG
campus network?
No
Yes (please specify destination)
6. ITS Requirements Worksheet
For Scoping and Sizing Work V2.0
3.6.1 Will any required data feeds/flows out of the application be real-time
(including near real-time) or batch?
10/1/2014 PAGE 6 OF 13 Worksheet for Scoping and Sizing
Template Version 2.0
Real/near-real time
Batch
3.7 Does information need to be transferred into or out of the system in particular
schedule or time interval?
No
Yes (please describe the schedule)
3.8 Are there any available Client references such as other universities for this
product?
No
Yes (If yes, please specify):
4. Service and Support Information N/A
4.1 What are the system availability requirements?
9x5
24x7
Other
4.2 Does the software require a contract acceptance (click-to-accept or shrink-wrap
agreement) for use or installation?
Yes No Don’t Know
4.2.1 If yes, has the contract been reviewed and approved by university council?
7. ITS Requirements Worksheet
For Scoping and Sizing Work V2.0
4.3 Vendor licensing and support:
Locally supported by UNCG staff
Vendor Support If the application is vendor supported, please answer the
10/1/2014 PAGE 7 OF 13 Worksheet for Scoping and Sizing
Template Version 2.0
following:
4.3.1 What services does the vendor offer?
4.3.2 What is the cost for vendor services?
4.3.3 What is the licensing model (open source, unlimited, unlimited site
license, per user, per server, etc?)
4.3.4 What are the annual license/update maintenance costs and what type of
support is offered?
4.3.5 Will the implementation of this service involve local (UNCG)
modifications to the system or development of unique content in a non-production
environment? (In other words, will a separate
software/content DEVELOPMENT version of the service/application be
needed?)
4.3.5.1 Will the new service/application be closely integrated with existing
applications at UNCG (Banner, Blackboard, etc.) requiring the ability to
test new versions of the application with those existing enterprise systems.
(In other words, will we need a VALIDATION environment?)
4.3.5.2 If integrating with Banner, which database environment(s) will an
instance of this service/application connect to?
BANPRD
UGVAL3
UGVAL7
UGVAL4
Training
UGDEV2
UGDEV8
Other (please specify)
8. ITS Requirements Worksheet
For Scoping and Sizing Work V2.0
4.4 What are the support roles and responsibilities required for ongoing support
and use that are expected? (Discussion of available ITS resources and their
support roles, if any, support expectations and skills needed within Client group,
vendor support if any, alternative support structures, etc.)
4.4.1 Who will serve as the System Administrator for maintenance of the server
operating system, if required?
4.4.2 Who will serve as the Application Engineer, if required? (Installs software
and integrates with the Operating System)
4.4.2.1 Does the intended Application Engineer have prior experience with
the product?
4.4.2.2 Does the intended Application Engineer have prior experience
using UNCG’s VPN and server infrastructure?
4.4.3 Who will serve as the Application DBA, if required?
4.4.4 Who will serve as the Application Administrator (the person who oversees
and manages the application configuration and maintenance)?
4.4.4.1 Does the intended Application Administrator have prior
experience with the product?
4.4.4.2 Does the intended Application Administrator have prior
experience using UNCG’s VPN and server infrastructure?
4.5 Will this service require training of ITS Support Staff to properly support
10/1/2014 PAGE 8 OF 13 Worksheet for Scoping and Sizing
Template Version 2.0
this service?
No
Yes
If yes, please describe any training or certifications that are necessary and if costs
are associated with this training, whether these costs are budgeted.
9. ITS Requirements Worksheet
For Scoping and Sizing Work V2.0
5. Application/Service/System Requirements N/A
5.1 Please briefly describe the basic architecture of the system/application. Please
attach architecture summary from vendor and diagram, if available.
5.1.1 Is the application an “end-user” application presenting itself to clients via a
web browser or other end-user interface?
5.1.1.1 If Web-based what are the supported browsers?
5.2.1.2 What are the supported web servers?
5.1.2 Is this a “back office” application which performs a function in conjunction
with other systems without user involvement?
5.1.3 Is this a “client/server” application involving software installations of
specific end-user desktop software plus server-side software components?
5.1.3.1 If client-server, what are the desktop requirements?
5.1.3.2 What protocol is used to communicate from the desktop to the
application?
5.1.4 Are any other specialized devices needed for system/application (i.e. PDAs,
scanners, cameras, point-of-sale devices)? If so, please list.
5.1.5 What operating system(s) are supported/preferred? If multiple operating
systems are supported by the vendor, can we determine which option if the focus
for primary development by the vendor? Ask vendor to supply percentages for
the distribution of different operating systems among their clients who use the
product.
5.1.6 What middleware and version is required to support the application?
(java, php, etc)
5.1.7 Is a database required? If so, what is supported/preferred? If multiple
database options are available, can we determine which option is the focus for
primary development by the vendor?
10/1/2014 PAGE 9 OF 13 Worksheet for Scoping and Sizing
Template Version 2.0
10. ITS Requirements Worksheet
For Scoping and Sizing Work V2.0
5.1.8 Please attach any available white paper, release notes, install guide, or
technical specifications available from the vendor
5.1.9 Does the application require network storage mapped to desktop?
10/1/2014 PAGE 10 OF 13 Worksheet for Scoping and Sizing
Template Version 2.0
Details:
Shared among what population?
How much data?
How will access to this data be controlled? (ex: open to all
application users, limited by application administrator, etc)
5.2 Is the system or application creating an authoritative data source within itself?
No
Yes, if so:
What other places might need to use/have this data? For this installation, only
5.3 Is the system or application available via remote hosting or must the
application be hosted in-house by ITS?
Remote
ITS-hosted
If both are an option, please note details:
5.4 Will the end-users of this application be required to authenticate within the
application before use?
5.5.1 How will the username and passwords be managed within the
application (creation, deletion, changes)?
5.5.2 Is the UNCG username and password desired for use or will the
application use an internal authentication database?
5.5 Will the application administrator(s) be required to authenticate internally
within the application before performing administrative functions, or does the
application administrative functions rely solely on standard file system
security to allow updates?
11. ITS Requirements Worksheet
For Scoping and Sizing Work V2.0
5.6 What is the authorization model? (In other words, what determines which
functions or data users are allowed to do or see?)
5.7.1 How are the privileges managed within the application? (It may be
necessary to request information from vendor regarding standards to be used
with the application.)
5.7.2 It is planned or desired that the application take advantage of existing
external authorization data (for example, Banner Security, AD roles, etc.?)
5.7 Has the client addressed creation of the Business Continuity plan for this
10/1/2014 PAGE 11 OF 13 Worksheet for Scoping and Sizing
Template Version 2.0
application?
5.8 What is the expected Recovery Time? In other words, how long can this
application be unavailable (worst case) if a hardware failure/data
corruption/major natural or man-made disaster occurs?
5.9 What is the expected Recovery Point? In other words, how much data loss
(typically data entered since the last backup or remote save operation) can the
business process withstand in the event of a disaster?
6. Networking Needs N/A
6.1 What are the expected bandwidth requirements?
Low (< 1000kbps)
Medium (10 -100Mpbs)
High (> 100Mbps)
6.2 Does your application need to communicate with resources on the Internet for
normal operation, patching, or maintenance?
No
Yes
12. ITS Requirements Worksheet
For Scoping and Sizing Work V2.0
6.2.1 If yes, is your application able to communicate with HTTP protocol through
a proxy system?
10/1/2014 PAGE 12 OF 13 Worksheet for Scoping and Sizing
Template Version 2.0
No
Yes
Don’t Know
6.2.2 Please specify the Internet resources by domain named and IP address
ranges that will be used for patching and maintenance functions:
6.3 Does your application/developers require regular remote access to any
currently deployed server resources that reside on UNCG’s network?
No
Yes
6.4 Does your application require communications with any network protocols
other than Internet Protocol Version 4 (IPv4)?
No
Yes
Please note: UNCG operates a routed IPv4 network only. Other protocols at
OSI layer 2 only can be supported within limited logical and geographical
segmented areas, and if needed, must be evaluated on a case by case basis?
6.5 Does your application require any unique Dynamic Host Configuration
Protocol (DHCP) options be presented to client workstations?
No
Yes, if so, please specify:
6.6 Does your application interoperate with Active Directory?
No
Yes
Don’t Know
13. ITS Requirements Worksheet
For Scoping and Sizing Work V2.0
If yes, please specify any required AD objects and service accounts:
6.7 Is your application compatible with NT Lan Manager (NTLM) version2 and
Windows 2003/2008 Kerberos authentication? Please note: UNCG will not support
NT LAN Manager Authentication due to its cryptographic weaknesses.
10/1/2014 PAGE 13 OF 13 Worksheet for Scoping and Sizing
Template Version 2.0
No
Yes
Don’t Know
6.8 Does your application store sensitive restricted data in a local database format?
No
Yes
If yes, is the data appropriately encrypted using Federal Information
Processing Standards (FIPS) 197 approved Advanced Encryption Standard?
No
Yes
7.0 Interview Participants:
ITS Service Assurance /Project Management:
IT Technical Resources:
Client Resources:
Vendors:
Functional Client Contact: