Monday, June 3, 2019
Examining The Key Characteristics Of Rup Information Technology Essay
Examining The Key Characteristics Of Rup In micturateation Technology EssayInitially select the sane unified process development regularityology .The unified process was development in main by joining together Jacobsons use case moulding Boochs object oriented methods and Rumbaya,s object Modeling Techniques (OMT) , Many other object- oriented methods also contributed to developing this process.The goal at the rational Unified Process is to change the wareion at highest quality parcel that meets end- user needs within predictable schedules and budgets. The Rational unified Process captures some of the best current software Development practices in a form that is tail arable for a wide range of digests and organization.The Key characteristics of RUPThe Rational Unified processes in an iterative process. reinforced into the iterative approach is the flexibility to accommodate new requirements or tactical changes in business object.The rational behind the rational unified process is focalisation on models. Rather than paper documents is to minimize the overhead associated with generating and maintaining documents and to minimize the relevant information content.The Rational Unified Process place strong emphasis on building systems based on a through understand of how the delivered system will be used.The Rational Unified Process supports object oriented techniques separately model is object Rational Unified Process models are based on the concepts of objects and classes and the use the UML as its notation.The Rational Unified Process configurable process although no single process suitable for all software development organizations. The Rational Unified Process is failorble and can be scaled to fit the needs of project ranging from small software development to large development organizations.The Rational Unified Process encourage on going quality control and luck guidance.Phases of RUPShould specialThe Rational Unified Process is structured along two d imensionsTime division of the life cycle into phases and iterations.Process components- productions of specific set of artifacts with well be activities.Both dimensions must be taken in to account for a project to succeed.Structuring a project along the time dimension involves the adoption of the spare-time activity time based four phases.Inception- specifying the project visionElaboration-planning the necessary activities and require resources specifying the features and designing the architecture.Construction- building the product as a series of incremental iterations.Transition-Supplying the product to the user community.Structuring the project along the process component dimension include the following activities.Business modeling the identification of desired system capabilities and user needs.Requirements- a narration of the system vision along with a set of functional and non functional requirements.Analysis and design a description of how the system will be realized in the implementation phase.Implementation the production of the code that will result in an executable system.Testing the verification of the entire system deployment the spoken language of the system and user training to the customer.Within each phase are a number of iterations. Iteration represents a complete development cycle form requirements capture in analysis to implementation testing which result in the realse of an executable product constitutly a subset of the final project under development which indeed is grown incrementally form iteration to iteration becomes the final system.During the elaboration the focus turns towards analysis and design. In construction implementation is the control activity and transition centers on developmentsWork breakdown structureWith refer to project proposal the entire work break down structure representProject scheduleWith referenced to the project proposal entire project plan submitted using MS projectCost estimationWith respect to feasib ility study in chaper2 the initial cost estimation carried out concerning three areas Total software cost , total hardware cost, total human laybour seek managingRisk Identification in Inception PhaseIdentification risk is one management tool in nine project management principles. therefore should be proper method assess unknown risk can be start and impact of risk and prepare resist to the risk .mainly critical path activities will generate risk if one goes wrong that might effect to total project related wasting time money. Therefore to minimize the risk used hap plan.Given below is the few or risk associated with certain activitiesRisk on requirement gathering and analysing identifying incorrect requirements out of scopeRisk associated in changing system architecture and technologies several times to fulfil additional requirement made by clients.Risk of design incorrect architectureRisk associated with reusing software componentRisk associate din poor project planning in time management and resources managementRisk associate with using open source tools to development processRisk associate on hardware used for the project compatibility for requirementsAfter identifying risk it can be categorizes in to three risk namely project risk, product risk, business risk .To overcome risk and identify the proper solution use risk management processRisk IdentificationRisk AnalysisRisk PlanningRisk MonitoringList of potential risksPrioritizes risk listRisk evasion and contingency plansRisk assessmentWith related risk analysis concern about security risk as in order to identify viable risk caused as physically, from software to destroy information on database as followsPhysical riskFirePlace fire extinguishers that suitable for all flake of fires in every floor especially near server rooms and check continuous time intervalsFloodPlace the server room as well equipment higher levels where the impact minimumEarthquakesLocate back up server in separate location where earthquakes are minimiseTsunamiTo prevent risk place the servers remote locationsEquipment theftTo prevent the risk can used security cameras and security guard with lock doors to server roomsSoftware riskHackingUsed firewall protection, place intrusion detection systemEavesdroppingUsed strong encryption when transferring data through the system which difficult crack the encription using multifactorial algorithmVirusPlace co operate virus guard which consist of large virus database in order stand quarantine such(prenominal) a riskInformation theftPlace hybrid intrusion detection system and used strong password policy
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.