Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave

Task 1: Background of the project

The initial part of your proposal should describe the scenario and how your solution applies to the problem. It should specify the overall system to meet the stated requirement.

Provide a detailed specification of your solution, including costing and sources. Costing should be researched (for a UK sourcing). It should specify the machine components or sub-systems appropriate to the requirement.

Describe a testing process to ensure that important specifications and characteristics are met. It should also evaluate the performance of the proposed system

Describe the Software solution as an overall integrated system, from the organisations point of view, and how it would typically work in practice. It should compare currently available operating systems and suggest how these can be customised.

A test plan document. This explains your strategy for testing of the hardware and software components before installation.

User documentation. This is like an “office IT instruction sheet” for all staff and users to read. It explains to the user how to use the system.

A security policy for your solution. This is your suggested strategy for ensuring system-wide security.

A Health and Safety document for the use of the organisation. It should also demonstrate that the system meets health and safety requirements.

 The higher management of Creative Developer Limited is aimed at expanding their business in the near future: this report contains the details of the hardware and software solutions that have been proposed to facilitate the solution.

 In section 2 (task 1) of the report, the proposed solution along, with its system specifications have been provided. In section 3 (task 2), the process for testing the hardware solution has been discussed along a discussion on various Operating Systems and the software solution that has been proposed.  The test plans, the user documentation, the health and security plans and the system security policies to be implemented in the organization have been provided in section 4 of the report.

 The organization being considered, Creative Developer Limited or the CDL, is an established software application and web development organization.  It had been operating at the Stratford region of London. A current market research undertaken by the representatives of the organization indicate that the number of customers to whom they could serve is increasing steadily (Patterson  and Hennessy  2013). The higher management of the organization is thus of the opinion that improving the infrastructure of the organization would help them to optimize the processes of catering to the requirements of target customers (Siewiorek  and Swarz 2014). At present, the organization employs 2 developers who design software applications, one designer for the development of graphics applications, 4 developers having expertise in web development and three other developers who are employed for performing miscellaneous development activities.

a. The scenario and the systems solution

In order to meet the requirements of the organization, the following solutions are being recommended to the management of Creative Developer Limited:

Development of an official website or web-portal through which the target customers would be able to communicate with the representatives of the organizations (Patterson and Hennessy 2013).

The utilization of cloud based platforms for facilitating the access to application suites useful for the development of software and the web based applications (Wolf 2012).

The implementation of a network of the computer system that would be used for the operational activities of the organization, ore specifically for the purpose of graphics designing and development of software and web developments (Siewiorek and Swarz  2014). 

The website that has been recommended to be implemented in the organization would facilitate the process of branding and promoting the services that Creative Developer Limited is capable of providing to the customers (Sekanina  2012).  The website would also allow the representatives of the organization to communicate with their customers, besides providing information on those application or software solutions that have been developed for their customers previously (Hoffmann,  Hoffmann  and Söllner  2013).  On the other hand, the cloud based development platform would allow the designers to gain access to cloud based application development tools, besides facilitating the storage of the designed modules.

The utilization of cloud based developmental tools would be useful in reducing a number of   investments that the management would have to make  for  the  procurement of such  applications, as  cloud based platforms allow  the users to  gain access to  such resources on  a shared basis and pay as per usage. The cloud based storage would also allow the employees to gain access to files from anywhere and anytime: thus escalating the development process (Wolf  2012). 

 Last but not the least, the development of the network of hi-tech computer devices would increase the efficiency of the operational activities of the organization, along with the inter-organizational communication process.

  The following hardware and software solutions are being recommended to the higher management of Creative Developer Limited:

 We recommend the Packard Bell OneTwo M D6020uk All-in-one PC, having a sleek and sophistic design, to be installed in Creative Developer Limited. This desktop personal computer is installed with the latest Windows 7 Operating software and would be easier to install in the office cubicles as the model has been specifically designed for fitting into small desk spaces (Müller  and Paul  2013). 

b. Systems specification of the solution being provided

 The specifications of this desktop PC have been provided in the following section: 

 The Microprocessor

Type of processor

Intel Pentium Dual-Core T4300 processor

Memory Clock Speed (RAM)

800MHz FSB (Computerhope.com  2016).

L2 Cache

2MB (Encarnacao, Lindner and Schlechtendahl   2012). 

Chipset

Intel Graphics Media Accelerator 4500 M

 

Clock Speed (Processor)

2.1GHz

 The

Screen Size

20’’ inch

 

Screen resolution

1600x900

Technology

TOUCH PANEL

Contrast ratio: 1000:1 (Computerhope.com  2016).

 The Sound system

 Type

Integrated on  the PCI Slot ( that is the motherboard)

Speaker Type

Stereo speakers

 The Memory

  Type

Capacity: 3GB,

 DDR2 memory (Encarnacao, Lindner and Schlechtendahl   2012). 

(RAM)

800MHz FSB

 The

Hard Drive

1 TB Hard Drive

HDD rotation speed (Manna  and Pnueli,  2012). 

7200rpm, Type:  SATA

 The Operating System

 The preloaded

Genuine Windows® 7 (Hatley  and Pirbhai  2013). 

Operating System type  

64-bits

 
 

 The  Peripherals

a. DVD Rewriter

b. Built-in wireless (802.11b/g/n)

c. Integrated Graphics

d. Digital TV Tuner (Hatley  and Pirbhai  2013). 

 

Card reader

5 in 1 ( supports :,SD, xD, SD HC, MS Pro,MS, MMC)

Optical drive

TRAY SUPER MULTI DVDRW (Siewiorek and Swarz  2014). 

 At present, the market price of this hardware would be around £379.00 (Packard Bell 2016).

 This particular hardware set has been recommended as the hardware specifications of the machine indicate that the software applications required for the operational activities of the organization would be well supported. Besides this, the manufactures have incorporated enough RAM facility to run the basic web application development tools like that of Adobe Photoshop, Microsoft Visio, and Dreamweaver.

Several cloud platforms are available these days which can be used solely for the purpose developing software applications (Valilai  and Houshmand 2013). Utilizing such tools do not require any particular hardware specification and the costs of these services vary greatly based on the products being used and the   extent of usage.

 The system specification of the website that would be designed for Creative Developer Limited has been provided   in the following table: 

  At present, developing an efficient website containing the above mentioned features would require an investment of around £35,000 approximately.b. iii. The web based communication toolIn this section of the report, the system specifications, that is, the features and utilities of the web based communication tool, have been discussed in brief.  The features have been decided based on the requirements of the client and include the following: 
  • Supported by all leading Operating Systems, like that of Windows, iPhone, Android, etc.

  • Designed for supporting instant messaging and video calling features (Biltoft‐Jensen et al. 2014).

  • Would support group and point to point conference calls.

  • Designed for cumulative call transfer facilities (Dmoz.org 2016).
  • Would provide access to all local contacts instantly and contact lists would be updated with new contacts automatically (Linsley 2014). 
 It is expected that the development of the customized web application tool and its installation in the computing devices utilized by the employees of Creative Developer Limited would cost £10000.00 approximately. 3. Task 2: a. Testing process for the hardware system In this section of the report, we provide the details of the testing procedures that should be utilized to estimate the efficiency of the designed system before it is commissioned. It is worth mentioning that the testing process should be conducted before finalizing the vendor and the model of the computing devices to be installed in an organization. Besides this, the availability of the specific requirements of the client helps in estimating the efficiency of any ICT system supported by the said hardware system (Maddox   2015). In general, the following testing processes are utilized for hardware testing:Physical inspection: The physical inspection of the hardware systems should include an inspection of the following features (Neumann  2011):The quality of the construction of the machines: The computing devices that are being provided to the employees of Creative Developer Limited should be of strong and solid build, such that they able to withstand the high usage to be made (Börjesson and Feldt 2012 ). Thus, the quality of the construction of the hardware products, including the placement of the various switches and ports should be checked (Polian  2014).The physical design: The design and the layout of the machines need to be through tested in order to make sure that the following systems are well designed and built:the airflow and the cooling systems (Gross, Fraser  and Zeller  2012 ).The condition of the switches, pins, jacks and ports included in the hardware setup (Leigh et al. 2014).iii. The built, design and the rigidity of the cases (Kolawa et al. 2013).The fitting of the various subparts (Raman 2012).the ease with which the various parts of the machines can be replaced during the servicing process: as for example, unscrewing and re-screwing a large number of tiny bolts  would  essentially slow  down the servicing process when a large number  of machine parts need to be replaced.  Thus, models having such specifications should not be considered by the IT team of Creative Developer Limited (Börjesson  and Feldt  2012 ).Last but not the least the power supply components of the computer hardware need to be checked for their efficiency and quality(Spichkova, Schmidt  and Peake  2014).Testing using software: Apart from the above mentioned physical testing process, invoking software base stress testing is also encouraged so as to detect the faulty hardware systems (Kuo,   Chien,   and Kim  2013).   Several software bundles are available on the market that can be utilized for stress testing various hardware components, like that  of Prime95 for stress testing CPUs, MemTest86+ for testing the RAM, FurMark for testing the GPU and so  on and so forth ( Feitelson   2015). b. The software solution In this section of the report, we provide the details of the software solutions that are being designed for the Creative Developer Limited so as to assist them in their business expansion.i. The software system being developed In order to assist Creative Developer Limited to expand their business and cater to the requirements of the ever increasing customer base, we have emphasized on the processes which would be utilized for communicating with the said clients (Wang  and Tao  2012). Thus, it has been decided that an efficient official website of the organization would be developed, which would help the process of marketing and branding for the organization (Valacich  2012 ). Information regarding the services offered by the Creative Developer Limited and glimpses of the products that have been custom made for other clients. Customers would also be able to communicate with the representatives of the organization and those who express their interests in using the facilities, would be encouraged to create customer profiles by submitting their personal details on the portal (Johnson  2015 ).  These customer profiles would eventually lead to the generation of unique customer ids which in turn would facilitate the process of post sales customer services.  Besides this, a web based communication tool would be custom designed for Creative Developer Limited. It has already been mentioned that the customer base to which the organization could provide services to is steadily increasing and that the organization has plans for future expansions. Thus, the web based communication tool would facilitate collaborative work between teams located in separate locations (Wheeler   2013).     Thus, it can be said that the proposed software system would only help the organization to cater to the needs of their newly found customers by would also help the employees through the application development processes.ii. Currently available operating systems At present, the following types of operating systems are readily available in the market.Real time operating systems:  A RTOS or  real time operating system  that has been custom designed to support  applications that generate data in real  time (Lister  2013).  Needles to say, these multitasking operating systems are suitable for supporting embedded systems like devices used for controlling household appliances, programmable thermostats, robots used in various industries, equipment  utilized  in scientific research, etc.  Examples of a real time operating system are VxWorks, RTLinux, QNX,etc.Single User, Single Tasking Operating Systems:  As the name suggest, such operating systems allow a single task from a single user to run at a time.   The operating systems installed in the palm held devices are examples of single user single tasking OS ( Tsichritzis  and Bernstein  2014).Single User, Multi Tasking Operating Systems:As suggested by the description of the OS, such operating systems allow several applications from a single user to run simultaneously.   Most of the computing devices and the laptops that awe use today run on such Operating Systems (Stallings 2013).  The Microsoft built Windows OS; Mac built OS X, and Linux are some of the most commonly used Single User Multi Tasking Operating Systems ( Tsichritzis  and Bernstein 2014).Multi user operating system:A multi user OS allows various applications from numerous users to operate simultaneously. The OS itself makes sure that resources demanded by these applications are available and schedules them accordingly (Hansen 2013). Unix servers are the most commonly utilized Multi user operating systems. As mentioned in Task 1, the application utilized by the employees of Creative Developer Limited would be well supported by Windows 7: thus, this particular OS would be utilized. However, it is worth mentioning that most of the single multi tasking operating system allow the users to perform a wide range of customization and personalization: a facility that is not available with the other types of OSs (Lister  2013).4. Task 3: a. The test plans document  In this section of the report, we provide a brief description of the various tests that have to be performed before the hardware and software systems are incorporated into the operational activities of Creative Developer Limited.Testing the hardware:Tests should be conducted so as to make sure that the operating system boots properly and that the OS provides a smooth run (Chupilko  2012).The applications like Adobe Photoshop and Dreamweaver are considered to be RAM hungry applications: thus simultaneous utilization of these applications would be useful in assessing the quality of the RAM (Ece.uprm.edu 2016).Writing and compiling codes in the above mentioned applications, besides making attempts to upload or down load information from the internet and utilizing the FTP services, would be helpful in testing the efficiency of the processor (Hardware Software Co-Design for JPEG Encoder Test Bench 2012).  The computer hardware being tested could be considered to be highly efficient if no lagging or crashing of the system is reported during the above mentioned test procedures (Martin   2011).Testing the software:  The following components of the proposed software solution need to be tested before installation:UI testing: The user interfaces of the website and the communication tool (Denton, Moody and Bennett 2016).Data base integrity testing: The database systems running at the back end of the website (Mahmud, Cypher, Haber and Lau 2012)Performance testing:The links that the help the users to move from one part of the website to the other.The response time of the said applications.Load Testing: Testing the efficiency and the performance of the website and the web based communication tool when a large number of users are logged in to the systems (Goebel 2016).Security Testing: Verifying the mechanisms that that user would utilize for logging in to the system or accessing the data stored in the enterprise databases (Sce.uhcl.edu 2016).b. User documentation A user document is generated by the ICT consultancy so as to provide useful information to the end users of an ICT system.  In this section of the report, an insight to the user documentation custom designed for Creative Developer Limited has been provided.Getting started:  The website that has been developed would contain the following pages:The home page (Hindmarsh  and Serban  2012).Our servicesOur clientsProducts designed by usGet to know usContact usThe site mapCommunication with the client would be feasible by the utilization of the web based communication application that is embedded in the website.Getting accessIn order to utilize the web based communication tool, you have to log in to the web portal using the password and id provided by the system administrator (Tolman et al. 2014).

  Domain name (Proposed)

www. creativedevelopers.com (Wahab et al. 2014).

Search engine optimization

Accessible to all leading search engines (Goh et al. 2013)

List of  web pages

1.  The  home page

2.  Our services

3. Our clients

4.   Products designed by us

5.  Get to know us (Urueña, Muñoz and Larrabeiti  2014).

6. Contact us

7.  The site map

Layout  and style

 The layout

 Uniform layout  containing the official logo of the organization

Navigation

 Common navigation bar for all web pages (Linsley  2014). 

Other  requirements

Accessibility

 Complies with accessibility criteria mentioned in the World Wide Web Consortium Web Accessibility Initiative or the W3C WAI level A Guidelines (Valilai  and Houshmand  2013).

Code Validation

 All codes would be validated according to the World Wide Web Consortium  or the  W3C specifications (de Castro Salgado,   Leitão  and de Souza  2013).

In case you forget your password or id, please contact your system administrator. Add contacts: New contacts would be automatically added to your contact list, as and when you refresh the tool.


Searching contacts: Contacts present in your list can be searched using their first names or by using the employee ids (Earle, Rosso  and Alexander  2015 ).


Making calls: When you select a specific contact, you would be provided with various call options to choose from.


Making conference calls: In order to conduct conference calls, you have to select a contact while being on a call with someone else, using the instructions provided above. The call options would be displayed, chose the one you are currently using. In case your contact responses to the call, a conference call would be set up.

In this section of the report, we provide a brief description of the security policies that need to be implemented by the higher management of Creative Developer Limited.

All system level passwords are to be managed by the IT administrator. The employees would not be allowed to create passwords of their own (Ifinedo 2012).

All the passwords being used for increasing the level of security of the said computer system should be maintained in the global password database of the organization.

All user level passwords including those utilized to access emails and data base information must be changed periodically.

The system should reduce the storage of sensitive client information to the minimum levels.

Task 2

The access to such sensitive information must be controlled by the IT administrator (Safa, Von Solms  and Furnell  2016).

The employees of the organization would not be allowed to make copies of the enterprise information in their personal detachable devices, nor would they be able to send any attachments through emails, while using the network provided by the organization.

Corporate standard anti-virus programs should be used for ensuring the security of the hardware components of the computing devices and that of the enterprise information stored in these machines (Vance and Siponen 2012).

The anti-virus programs should be downloaded from the official sites and be updated on a regular basis.

The employees of the organization should be repeatedly made aware of the fact that an email sent from an unknown source might actually be sent with malicious intents: thus, they should not download or open any attachment sent by unknown ids (Safa, Von Solms and Furnell  2016).

It is expected that the management of Creative Developer Limited would provide up to a certain level of privacy to the employees of the organization in terms of information generation and usage: however, it must be made clear to the employees that the data or the information that are generated using the corporate computer network provided by the organization are to be considered as the intellectual properties of the organization itself (Siponen and Vance 2014).

The higher management of the organization would have the right to conduct audits of the computer systems and networks used by employees so as to ensure that the above mentioned policies are being abided by (Ifinedo 2012).

 In this section of the report, we provide a brief detail of the Health and Safety policies that must be implemented by the higher management of Creative Developer Limited.

The employees of the organization must be made aware of the fact that they should not bring in any edible material, like foods or drinks, in the work stations. This particular policy would be useful in avoiding spilling of food material on the computer devices which might even lead to short circuits (Lundgren  and McMakin  2013).

All the live or open wires within the work floor areas must be concealed within insulator material, and the employees should immediately inform the concerned authorities in case live and/ or open wires are noticed (O’Neill et al. 2013).

The computer devices being used by the employees should not be subjected to direct heat, smoke or moisture (Ab.ust.hk 2016).

Task 3

In case of any servicing work, the following rules are to be followed:

Before servicing any machine, all the wires or connectors supplying power to the system must be unplugged (Sitesafe.org.nz 2016).

Additional care must be taken when the employees attempt to work with electric switches.

All cables should be unplugged if the employees need the access in to the CPU cabinet (Safeworkaustralia.gov.au   2016).

 In the light of the discussion made in the report, the following recommendations are being provided to the higher management of the Creative Developer Limited:

In spite of the fact that the development and the implementation of the proposed solutions would require the management to invest a hefty amount, yet the management should opt for the installation as the proposed systems would increase the efficiency of the operational activities of the organization.

The higher management of the organization should implement a detailed security policy in the organization in order to secure the enterprise data.

Strict health and safety policies must also be implemented so as to avoid fatal mishaps or accidents.

The testing plans provided in the report should be followed before the incorporation of the proposed solutions within the operational activities of the organization.

References

Ab.ust.hk,. 2016. Setting a health and safety policy. Ab.ust.hk. Retrieved 27 January 2016, from https://www.ab.ust.hk/hseo/Dhsmr/sample.htm

Biltoft‐Jensen, A., Trolle, E., Christensen, T., Islam, N., Andersen, L. F., Egenfeldt‐Nielsen, S., and Tetens, I. 2014. WebDASC: a web‐based dietary assessment software for 8–11‐year‐old Danish children. Journal of Human Nutrition and Dietetics, 27(s1), 43-53.

Börjesson, E., and Feldt, R. 2012, April. Automated system testing using visual GUI testing tools: A comparative study in industry. In Software Testing, Verification and Validation (ICST)  2012 IEEE Fifth International Conference on (pp. 350-359). IEEE.

Chupilko, M. 2012. Developing test systems for multi-modules hardware designs. Programming And Computer Software, 38(1), 34-42. https://dx.doi.org/10.1134/s036176881201001x

Computerhope.com,. 2016. How can I test for hardware failures in my computer?. Computerhope.com. Retrieved 27 January 2016, from https://www.computerhope.com/issues/ch001088.htm

De Castro Salgado, L. C., Leitão, C. F., and de Souza, C. S. 2013. A Case Study: Re-designing the AVIS Website. In A Journey Through Cultures (pp. 69-114). Springer London.

Denton, A., Moody, D., and Bennett, J.   2016. Usability Testing as a Method to Refine a Health Sciences Library Website. Medical Reference Services Quarterly, 35(1), 1-15. https://dx.doi.org/10.1080/02763869.2016.1117280

Dmoz.org,.   2016. DMOZ - Computers: Security: Policy: Sample Policies. Dmoz.org. Retrieved 27 January 2016, from https://www.dmoz.org/Computers/Security/Policy/Sample_Policies/

Earle, R. H., Rosso, M. A., and Alexander, K. E. 2015, July. User preferences of software documentation genres. In Proceedings of the 33rd Annual International Conference on the Design of Communication (p. 46). ACM.

Conclusion

Ece.uprm.edu,.   2016. Test plan. Retrieved 27 January 2016, from https://ece.uprm.edu/~icom5047/documents/OtherDocuments/TestPlan.pdf

Encarnacao, J. L., Lindner, R., and Schlechtendahl, E. G. 2012. Computer aided design: fundamentals and system architectures. Springer Science and Business Media.

Feitelson, D. G. 2015. Workload modeling for computer systems performance evaluation. Cambridge University Press.

Goebel, J.   2016. Hardware Testing and System Qualification: Procedures to Evaluate Commodity Hardware and Production Cluster. Retrieved 27 January 2016, from https://www.slac.stanford.edu/cgi-wrap/getdoc/slac-pub-9761.pdf

Goh, K. N., Chen, Y. Y., Daud, S. C., Sivaji, A., and Soo, S. T.  2013. Designing a Checklist for an E-Commerce Website Using Kansei Engineering. In Advances in Visual Informatics (pp. 483-496). Springer International Publishing.

Gross, F., Fraser, G., and Zeller, A. 2012, June. EXSYST: search-based GUI testing. In Proceedings of the 34th International Conference on Software Engineering (pp. 1423-1426). IEEE Press.

Hansen, P. B. (Ed.). 2013. Classic operating systems: from batch processing to distributed systems. Springer Science and Business Media.

Hardware Software Co-Design for JPEG Encoder Test Bench. 2012. INTERNATIONAL JOURNAL ON Advances In Information Sciences And Service Sciences, 4(2), 258-266. https://dx.doi.org/10.4156/aiss.vol4.issue2.32

Hatley, D., and Pirbhai, I. 2013. Strategies for real-time system specification. Addison-Wesley.

Hindmarsh, A. C., and Serban, R.  2012. User Documentation for cvodes v2. 7.0.

Hoffmann, A., Hoffmann, H., and Söllner, M.  2013, June. Fostering initial trust in applications–developing and evaluating requirement patterns for application websites. In 21st European Conference on Information Systems (ECIS), Utrecht, The Netherlands.

Ifinedo, P. 2012. Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers and Security, 31(1), 83-95.

Johnson, J. A. 2015, April. Designing Websites for Adults 55+: Toward Universal Design. In Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems (pp. 2449-2450). ACM.

Kolawa, A. K., Jakubiak, N. M., Lambert, M. L., Haaker, W., and Gandhi, N. 2013. U.S. Patent No. 8,448,148. Washington, DC: U.S. Patent and Trademark Office.

Kuo, W., Chien, W. T. K., and Kim, T. 2013. Reliability, Yield, and Stress Burn-in: A Unified Approach for Microelectronics Systems Manufacturing and Software Development. Springer Science and Business Media.

Leigh, Darren, Clifton Forlines, Daniel Wigdor, and Steven Leonard Sanders. "Latency measuring and testing system and method." U.S. Patent Application 14/316,177, filed June 26  2014.

Linsley, P. 2014. U.S. Patent No. 8,713,172. Washington, DC: U.S. Patent and Trademark Office.

Lister, A. 2013. Fundamentals of operating systems. Springer Science and Business Media.

Lundgren, R. E., and McMakin, A. H. 2013. Risk communication: A handbook for communicating environmental, safety, and health risks. John Wiley and Sons.

Maddox, P. 2015. Testing a distributed system. Queue, 13(7), 10.

Mahmud, J., Cypher, A., Haber, E., and Lau, T. 2012. Design and industrial evaluation of a tool supporting semi-automated website testing. Software Testing, Verification And Reliability, 24(1), 61-82. https://dx.doi.org/10.1002/stvr.1484

Manna, Z., and Pnueli, A. 2012. The temporal logic of reactive and concurrent systems: Specification. Springer Science and Business Media.

Martin, G. 2011. Will hardware and software be codesigned? [review of "A Practical Introduction to Hardware/Software Codesign" (Schaumont, P.R.; 2010)]. IEEE Design and Test Of Computers, 28(2), 70-73. https://dx.doi.org/10.1109/mdt.2011.41

Müller, S. M., and Paul, W. J. 2013. Computer architecture: complexity and correctness. Springer Science and Business Media.

Neumann, T. 2011. Efficiently compiling efficient query plans for modern hardware. Proc. VLDB Endow., 4(9), 539-550.

O’Neill, S., Martinov-Bennie, N., Cheung, A., and Wolfe, K.  2013. Issues in the measurement and reporting of work health and safety performance: a review. Safe Work Australia, Safety Institute of Australia and CPA Australia.

Packard bell,. 2016. Retrieved 27 January 2016, from Packard bell: https://www.pcworld.co.uk/gbuk/packard-bell-computing/desktop-pcs/desktop-pcs/1093_8225_71255_1698_xx/xx-criteria.html https://www.algoworks.com/

Patterson, D. A., and Hennessy, J. L.  2013. Computer organization and design: the hardware/software interface. Newnes.

Polian, I. 2014. Hardware security and test: Friends or enemies?. It - Information Technology, 56(4).

Raman, A. 2012. Universal Analog Hardware Test Bench. IETE Journal Of Education, 53(2), 89-96.

Safa, N. S., Von Solms, R., and Furnell, S.   2016. Information security policy compliance model in organizations. computers and security, 56, 70-82.

Safeworkaustralia.gov.au,.   2016. Home - Safe Work Australia. Safeworkaustralia.gov.au. Retrieved 27 January 2016, from https://www.safeworkaustralia.gov.au/sites/.../organisation-needs-organsations

Sce.uhcl.edu,.   2016. Example: Test Plan. Sce.uhcl.edu. Retrieved 27 January 2016, from https://sce.uhcl.edu/helm/RUP_course_example/courseregistrationproject/artifacts/test/plans/test_plan_arch.htm

Sekanina, L. 2012. Evolvable components: from theory to hardware implementations. Springer Science and Business Media.

Siewiorek, D., and Swarz, R. 2014. Reliable Computer Systems: Design and Evaluatuion. Digital Press.

Siponen, M., and Vance, A.  2014. Guidelines for improving the contextual relevance of field surveys: the case of information security policy violations.European Journal of Information Systems, 23(3), 289-305.

Sitesafe.org.nz,. 2016. Health and safety policy Retrieved 27 January 2016, from https://www.sitesafe.org.nz/Category?Action=ViewandCategory_id..

Spichkova, M., Schmidt, H., and Peake, I. 2014. From abstract modelling to remote cyber-physical integration/interoperability testing. arXiv preprint arXiv:1403.1005.

Stallings, W. 2013. Operating Systems: Internals and Design Principles: International Edition. Pearson Higher Ed.

Tolman, H., Accensi, M., Alves, H., Ardhuin, F., Bidlot, J., Booij, N., ... and Foreman, M. 2014. User manual and system documentation of Wavewatch III version 4.18.

Tsichritzis, D. C., and Bernstein, P. A. 2014. Operating systems. Academic Press.

Urueña, M., Muñoz, A., and Larrabeiti, D. 2014. Analysis of privacy vulnerabilities in single sign-on mechanisms for multimedia websites.Multimedia Tools and Applications, 68(1), 159-176.

Valacich, J. S. (2012, June). Designing effective web sites: How academic research influences practice. In Information Technology Interfaces (ITI), Proceedings of the ITI 2012 34th International Conference on (pp. 15-20). IEEE.

Valilai, O. F., and Houshmand, M. 2013. A collaborative and integrated platform to support distributed manufacturing system using a service-oriented approach based on cloud computing paradigm. Robotics and computer-integrated manufacturing, 29(1), 110-127.

Vance, A., and Siponen, M. T. 2012. IS security policy violations: a rational choice perspective. Journal of Organizational and End User Computing (JOEUC), 24(1), 21-41.

Wahab, A. A., Ahmad, F., Baharom, F., and Yahaya, J. 2014. A case study of quality evaluation from consumers’ perspectives on Malaysian B2C e-commerce websites. Management and Technology in Knowledge, Service, Tourism and Hospitality, 19.

Wang, N., and Tao, T. 2012. Designing and Implementation of Audio Product Sales Website. In Information and Business Intelligence (pp. 349-356). Springer Berlin Heidelberg.

Wheeler, A. 2013. Designing brand identity.

Wolf, M. 2012. Computers as components: principles of embedded computing system design. Elsevier.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2016). Hardware And Software Solutions For Creative Developer Limited. Retrieved from https://myassignmenthelp.com/free-samples/testing-process-scenario.

"Hardware And Software Solutions For Creative Developer Limited." My Assignment Help, 2016, https://myassignmenthelp.com/free-samples/testing-process-scenario.

My Assignment Help (2016) Hardware And Software Solutions For Creative Developer Limited [Online]. Available from: https://myassignmenthelp.com/free-samples/testing-process-scenario
[Accessed 15 November 2024].

My Assignment Help. 'Hardware And Software Solutions For Creative Developer Limited' (My Assignment Help, 2016) <https://myassignmenthelp.com/free-samples/testing-process-scenario> accessed 15 November 2024.

My Assignment Help. Hardware And Software Solutions For Creative Developer Limited [Internet]. My Assignment Help. 2016 [cited 15 November 2024]. Available from: https://myassignmenthelp.com/free-samples/testing-process-scenario.

Get instant help from 5000+ experts for
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing: Proofread your work by experts and improve grade at Lowest cost

loader
250 words
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Plagiarism checker
Verify originality of an essay
essay
Generate unique essays in a jiffy
Plagiarism checker
Cite sources with ease
support
close