The acquisition of an Enterprise–wide software system requires careful planning and execution of a multitude of activities unrelated to the actual software systems being deployed.
The Role of the Architect in ERP and PDM System DeploymentGlen Alleman
The architect’s role in the development of an ERP or PDM system is to maintain the integrity of the vision statement produced by the owners, users, and funders of the system.
The Role of the Architect in ERP and PDM System DeploymentGlen Alleman
The architect’s role in the development of an ERP or PDM system is to maintain the integrity of the vision statement produced by the owners, users, and funders of the system.
What Makes a Good Concept of Operations?Glen Alleman
A Concept of Operations is a user-oriented document the describes system characteristics for a proposed systems from the User's perspective. The CONOPs also describes the user organization, mission, and objectives form the integrated systems point of view and is used to communicates overall qualitative and quantitative characteristics to the stakeholders.
Understanding the five immutable principles to project success will help project managers deliver on time, on budget when talking projects of any size, in any domain
The management of software development is fraught with risk: technical risk, market risk, requirements risk, and financial risk. This paper describes nine (9) key management principles for
guiding the development of a software project. These principles are not original. They are taken directly from the work of Norm Brown, the founder and executive Director of the Software Program Managers Network (SPMN).
Planning projects usually starts with tasks and milestones. The planner gathers this information from the participants – customers, engineers, subject matter experts. This information is usually arranged in the form of activities and milestones. PMBOK defines “project time management” in this manner. The activities are then sequenced according to the projects needs and mandatory dependencies.
Delivering programs with less capability than promised, while exceeding the cost and planned durations, distorts decision making, contributes to increasing cost growth to other programs, undermines the Federal government’s credibility with taxpayers and contributes to the public’s negative support for these programs.
Many reasons have been hypothesized and documented for cost and schedule growth. The authors review some of these reasons, and propose that government and contractors use the historical variability of the past programs to establish cost and schedule estimates at the outset and periodically update these estimates with up-to-date risks, to increase the probability of program success. For this to happen, the authors recommend changes to estimating, acquisition and contracting processes.
From Principles to Strategies for Systems EngineeringGlen Alleman
From Principles to Strategies How to apply Principles, Practices, and Processes of Systems Engineering to solve complex technical, operational,
and organizational problems
Capabilities‒Based Planning the capabilities needed to accomplish a mission or fulfill a business strategy
Only when capabilities are defined can we start with requirements elicitation
Increasing the Probability of Project Success with Five Principles and PracticesGlen Alleman
There are many approaches to managing projects in every domain.
This seminar lays the foundations for increasing the probability of project success, no matter the domain, what technology, what approach to delivering the outcomes of the project.
The principles of this approach are immutable.
The practices for implementing the principles are universally applicable.
Each chart in this presentation, contains guidance that can be applied to your project, no matter the domain.
In our short hour here, we’re going to cover a lot of material.
The bibliography contains the supporting materials we can tailor to your individual project
The WBS is the touchstone of all work activities, cost, schedule, and technical performance on the program.
It describes technical, process, and programmatic deliverables over the life of the program
It describes how these deliverables are related through a well formed tree structure – parents and children – defined by MIL-STD-881C
It describes how costs are assigned to this work and these costs roll up to their parents in Control Account and CLINS to the Performance Measurement Baseline (PMB)
Getting To Done - A Master Class WorkshopGlen Alleman
The Principles, Processes, Practices, and Tools to Increase the Probability of successfully completing Project's On-Tiem, On-Budget, and Needed Capabilities
Starting with the development of a Rough Order of Magnitude (ROM) estimate of work and duration, creating the Product Roadmap and Release Plan, the Product and Sprint Backlogs, executing and statusing the Sprint, and informing the Earned Value Management Systems, using Physical Percent Complete of progress to plan.
Establishing schedule margin using monte carlo simulation Glen Alleman
The first order goal is to develop a resource loaded, risk tolerant, Integrated Master Schedule, derived from the Integrated Master Plan that clearly shows the increasing maturity of the program's deliverables, through vertical and horizontal traceability to the program's requirements.
Showing how to Increase the Probability of Project Success by applying the ...Glen Alleman
All projects ‒ Traditional and Agile ‒ operate in the presence of uncertainty that creates risk.
Five Immutable Principles and their supporting Processes and Practices can be used to increase the probability of success in the presence of these uncertainties.
From WBS to Integrated Master ScheduleGlen Alleman
A step by step guide to increasing the Probability of Program success starting with the WBS, developing the Integrated Master Plan and Integrated Master Schedule, risk adjusting the IMS, and measuring progress to plan in units of measure meaningful to the decision makers.
What Makes a Good Concept of Operations?Glen Alleman
A Concept of Operations is a user-oriented document the describes system characteristics for a proposed systems from the User's perspective. The CONOPs also describes the user organization, mission, and objectives form the integrated systems point of view and is used to communicates overall qualitative and quantitative characteristics to the stakeholders.
Understanding the five immutable principles to project success will help project managers deliver on time, on budget when talking projects of any size, in any domain
The management of software development is fraught with risk: technical risk, market risk, requirements risk, and financial risk. This paper describes nine (9) key management principles for
guiding the development of a software project. These principles are not original. They are taken directly from the work of Norm Brown, the founder and executive Director of the Software Program Managers Network (SPMN).
Planning projects usually starts with tasks and milestones. The planner gathers this information from the participants – customers, engineers, subject matter experts. This information is usually arranged in the form of activities and milestones. PMBOK defines “project time management” in this manner. The activities are then sequenced according to the projects needs and mandatory dependencies.
Delivering programs with less capability than promised, while exceeding the cost and planned durations, distorts decision making, contributes to increasing cost growth to other programs, undermines the Federal government’s credibility with taxpayers and contributes to the public’s negative support for these programs.
Many reasons have been hypothesized and documented for cost and schedule growth. The authors review some of these reasons, and propose that government and contractors use the historical variability of the past programs to establish cost and schedule estimates at the outset and periodically update these estimates with up-to-date risks, to increase the probability of program success. For this to happen, the authors recommend changes to estimating, acquisition and contracting processes.
From Principles to Strategies for Systems EngineeringGlen Alleman
From Principles to Strategies How to apply Principles, Practices, and Processes of Systems Engineering to solve complex technical, operational,
and organizational problems
Capabilities‒Based Planning the capabilities needed to accomplish a mission or fulfill a business strategy
Only when capabilities are defined can we start with requirements elicitation
Increasing the Probability of Project Success with Five Principles and PracticesGlen Alleman
There are many approaches to managing projects in every domain.
This seminar lays the foundations for increasing the probability of project success, no matter the domain, what technology, what approach to delivering the outcomes of the project.
The principles of this approach are immutable.
The practices for implementing the principles are universally applicable.
Each chart in this presentation, contains guidance that can be applied to your project, no matter the domain.
In our short hour here, we’re going to cover a lot of material.
The bibliography contains the supporting materials we can tailor to your individual project
The WBS is the touchstone of all work activities, cost, schedule, and technical performance on the program.
It describes technical, process, and programmatic deliverables over the life of the program
It describes how these deliverables are related through a well formed tree structure – parents and children – defined by MIL-STD-881C
It describes how costs are assigned to this work and these costs roll up to their parents in Control Account and CLINS to the Performance Measurement Baseline (PMB)
Getting To Done - A Master Class WorkshopGlen Alleman
The Principles, Processes, Practices, and Tools to Increase the Probability of successfully completing Project's On-Tiem, On-Budget, and Needed Capabilities
Starting with the development of a Rough Order of Magnitude (ROM) estimate of work and duration, creating the Product Roadmap and Release Plan, the Product and Sprint Backlogs, executing and statusing the Sprint, and informing the Earned Value Management Systems, using Physical Percent Complete of progress to plan.
Establishing schedule margin using monte carlo simulation Glen Alleman
The first order goal is to develop a resource loaded, risk tolerant, Integrated Master Schedule, derived from the Integrated Master Plan that clearly shows the increasing maturity of the program's deliverables, through vertical and horizontal traceability to the program's requirements.
Showing how to Increase the Probability of Project Success by applying the ...Glen Alleman
All projects ‒ Traditional and Agile ‒ operate in the presence of uncertainty that creates risk.
Five Immutable Principles and their supporting Processes and Practices can be used to increase the probability of success in the presence of these uncertainties.
From WBS to Integrated Master ScheduleGlen Alleman
A step by step guide to increasing the Probability of Program success starting with the WBS, developing the Integrated Master Plan and Integrated Master Schedule, risk adjusting the IMS, and measuring progress to plan in units of measure meaningful to the decision makers.
As today’s organizations deploy an ever-growing number of complex systems and manage existing or new staff, manual administration of user access to systems becomes costly and ineffective:
• Requesting, routing, approving and acting on requests for new access, in particular for new staff, takes too long. New employees and contractors are unproductive as they wait.
• Too many administrators are tied up in routine user management chores.
• Access is not terminated promptly or reliably when people leave the organization, creating serious security vulnerabilities.
• It is difficult or impossible to say who has access to what systems and data, let alone who had access in the past.
Clearly, these problems call for automation, to consolidate and rationalize the administration of user identity
data across a variety of systems
This document will guide you through the entire life of a successful Identity Management project, including:
• A needs analysis.
• Who to involve in the project.
• How to select the best product.
• Technical design decisions.
• How to effectively roll out the system.
• How to monitor and assure sound ROI.
MIL-STD-498, dated 5 December 1994, is hereby canceled. Information
regarding software development and documentation is now contained in the Institute of
Electrical and Electronics Engineers (IEEE)/Electronics Industries Association (EIA)
standard, IEEE/EIA 12207, “Information technology-Software life cycle processes”.
IEEE/EIA 12207 is packaged in three parts. The three parts are: IEEE/EIA 12207.0,
“Standard for Information Technology-Software life cycle processes”; IEEE/EIA
12207.1, “Guide for ISO/IEC 12207, Standard for Information Technology-Software life
cycle processes-Life cycle data”; and IEEE/EIA 12207.2, “Guide for ISO/IEC 12207,
Standard for Information Technology-Software life cycle processes-Implementation
considerations.”
This document will guide you through the entire life of a successful password management project, including:
• A needs analysis.
• Who to involve in the project.
• How to select the best product.
• Technical design decisions.
• How to effectively roll out the system.
• How to monitor and assure sound ROI.
LEAN OPERATIONS, Review the literature giving detailed examples of where within
industry Lean has been applied, the strategies followed when
implementing, the benefits achieved and whether there are any
lessons to be learned.
Increasing the Probability of Project SuccessGlen Alleman
Risk Management is essential for development and production programs. Information about key cost, performance and schedule attributes are often uncertain or unknown until late in the program.
Risk issues that can be identified early in the program, which may potentially impact the program, termed Known Unknowns, can be alleviated with good risk management. -- Effective Risk Management 2nd Edition, Page 1, Edmund Conrow, American Institute of Aeronautics and Astronautics, 2003
Cost and schedule growth for complex projects is created when unrealistic technical performance expectations, unrealistic cost and schedule estimates, inadequate risk assessments, unanticipated technical issues, and poorly performed and ineffective risk management, contribute to project technical and programmatic shortfalls
Building a Credible Performance Measurement BaselineGlen Alleman
Establishing a credible Performance Measurement Baseline, with a risk adjusted Integrated Master Plan and Integrated Master Schedule, starts with the WBS and connects Technical Measures of progress to Earned Value
Program Management Office Lean Software Development and Six SigmaGlen Alleman
Successfully combining a PMO, Agile, and Lean / 6 starts with understanding what benefit each paradigm brings to the table. Architecting a solution for the enterprise requires assembling a “Systems” with processes, people, and principles – all sharing the goal of business improvement.
This resource document describes the Program Governance Road map for product development, deployment, and sustainment of products and services in compliance with CMS guidance, ITIL IT management, CMMI best practices, and other guidance to assure high quality software is deployed for sustained operational success in mission critical domains.
Seven Habits of a Highly Effective agile project managerGlen Alleman
Recent neurological studies indicate that the role of emotion in human cognition is essential; emotions are not a luxury. Instead, emotions play a critical role in rational decision–making, in perception, in human interaction, and in human intelligence. Habits are the intersection of knowledge, skill, and desire.
The 5 Immutable principles of project managementGlen Alleman
Software development methods are sometimes confused with Project Management principles. There are 5 irreducible principles used to manage projects, no matter the domain or context. We need to assure our development work is guided by these 5 Project Management principles.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
2. 2
1 INTRODUCTION ........................................................................................... 3
1.1 MOTIVATION FOR THE WHITE PAPER ..................................................... 3
1.2 WHERE TO START..................................................................................... 3
1.3 OUTLINE OF THE ACTIVITIES ................................................................... 4
2 SYSTEM ACQUISITION PROCESSES ......................................................... 5
2.1 STAKEHOLDER REQUIREMENTS ................................................................. 5
2.2 SYSTEM REQUIREMENTS............................................................................. 5
2.3 SOFTWARE CONTRACTS AND THE ACQUISITION PROCESS....................... 6
2.4 PROCURING COTS APPLICATIONS .......................................................... 6
3 INFRASTRUCTURE........................................................................................ 7
3.1 NETWORKS................................................................................................. 7
3.2 SERVERS...................................................................................................... 7
3.3 DESKTOPS................................................................................................... 7
3.4 DATABASES ................................................................................................ 7
3.5 LEGACY SYSTEMS....................................................................................... 7
4 PERSONNEL.................................................................................................... 8
4.1 TRAINING .................................................................................................. 8
4.2 RETENTION................................................................................................ 8
4.3 SUPPORT .................................................................................................... 8
4.4 RECRUITING............................................................................................... 8
5 SYSTEM SUPPORT......................................................................................... 9
5.1 SOFTWARE CONFIGURATION CONTROL ................................................... 9
5.2 INSTALLATION AND STARTUP................................................................... 9
5.3 PROBLEM REPORTING AND TRACKING..................................................... 9
5.4 SOFTWARE QUALITY METRICS................................................................... 9
5.5 APPLICATION OF THE CAPABILITY MATURITY MODEL .......................... 9
6 PERFORMANCE ANALYSIS, PREDICTION, & MANAGEMENT.......10
6.1 PERFORMANCE TESTING...........................................................................10
6.2 PERFORMANCE MODELS ...........................................................................10
6.3 PERFORMANCE METRICS...........................................................................10
6.4 PERFORMANCE MEASUREMENTS AND MONITORING ...............................10
7 SYSTEM ARCHITECTURE...........................................................................11
7.1 FEDERATION OF HETEROGENEOUS SYSTEMS...........................................11
7.2 4+1 ARCHITECTURAL VIEW....................................................................11
8 OTHER IMPACTS..........................................................................................12
8.1 MANAGEMENT OF THE VENDORS...........................................................12
8.2 SOFTWARE DEVELOPMENT ENVIRONMENTS ...........................................12
8.3 IT STRATEGY IMPACTS ............................................................................12
3. 3
1 INTRODUCTION
This White Paper is a how to description for deploying Enterprise Wide software
systems. It is focused on identifying the multitude of activities that must take
place to assure a successful outcome.
1.1 MOTIVATION FOR THE WHITE PAPER
There are numerous papers and books describing how to acquire, deploy and
manage large infrastructure based computer systems. This White Paper makes not
attempt to replace or augment this material. The missing component in all this
information is a framework in which to add meaning for the Electronic
Document Management applications and their relationships to other enterprise–
wide applications
1.2 WHERE TO START
1.2.1 Why have an EDM System?
1.2.2 Attributes of EDM
An EDM System has a set of unique attributes not found an any other
enterprise–wide software application.
ü Management of the content – the information contained inside entities is as
important as the the information about entities. The author, publish,
distribute, and update cycle deals with the content of documents and related
information as well as about the documents themselves.
ü Long lived management activities – Archival duration ranging from decades to
permanent storage.
4. 4
ü Compound relationships – between the entities and the users of the entities.
Both parent and child relationships exist in the EDM domain. In addition,
aggregation relationships exist. These relationships place unique demands on
entity indexing and the management of change.
ü Regulatory requirements –
ü Workflow –
ü Infrastructure Foundation –
• ERP
• PDM
1.3 OUTLINE OF THE ACTIVITIES
5. 5
2 SYSTEM ACQUISITION PROCESSES
2.1 STAKEHOLDER REQUIREMENTS
The requirements for the system are defined through the meta–model show in
Figure 1.
Requirement Issue
ResolutionAssumption
Response
Assertion
Conflict
Structural
Interaction
Evaluate Position
1..n
1..n
0..n
0..n1..n
1..n
2
1..1
IsA
Figure 1 – Requirements Metamodel
2.2 SYSTEM REQUIREMENTS
ü Requirements management
ü Requirements traceability
ü Test generation
6. 6
2.3 SOFTWARE CONTRACTS AND THE ACQUISITION PROCESS
2.4 PROCURING COTS APPLICATIONS
2.5 PROJECT MANAGEMENT
ü Task management
ü Risk management
ü Budget
ü Software metrics
• COCOMO
• Reliability prediction
7. 7
3 INFRASTRUCTURE
The infrastructure needed to deploy an enterprise–wide EDM System is driven by
bandwidth. The bandwidth demands are orders of magnitude greater than that
needed by traditional mainframe based terminal applications.
3.1 NETWORKS
3.2 SERVERS
3.3 DESKTOPS
3.4 DATABASES
3.5 LEGACY SYSTEMS
9. 9
5 SYSTEM SUPPORT
5.1 SOFTWARE CONFIGURATION CONTROL
5.2 INSTALLATION AND STARTUP
5.3 PROBLEM REPORTING AND TRACKING
5.4 SOFTWARE QUALITY METRICS
5.5 APPLICATION OF THE CAPABILITY MATURITY MODEL