Task 1: Background of the project
The initial part of your proposal should describe the scenario and how your solution applies to the problem. It should specify the overall system to meet the stated requirement.
Provide a detailed specification of your solution, including costing and sources. Costing should be researched (for a UK sourcing). It should specify the machine components or sub-systems appropriate to the requirement.
Describe a testing process to ensure that important specifications and characteristics are met. It should also evaluate the performance of the proposed system
Describe the Software solution as an overall integrated system, from the organisations point of view, and how it would typically work in practice. It should compare currently available operating systems and suggest how these can be customised.
A test plan document. This explains your strategy for testing of the hardware and software components before installation.
User documentation. This is like an “office IT instruction sheet” for all staff and users to read. It explains to the user how to use the system.
A security policy for your solution. This is your suggested strategy for ensuring system-wide security.
A Health and Safety document for the use of the organisation. It should also demonstrate that the system meets health and safety requirements.
The higher management of Creative Developer Limited is aimed at expanding their business in the near future: this report contains the details of the hardware and software solutions that have been proposed to facilitate the solution.
In section 2 (task 1) of the report, the proposed solution along, with its system specifications have been provided. In section 3 (task 2), the process for testing the hardware solution has been discussed along a discussion on various Operating Systems and the software solution that has been proposed. The test plans, the user documentation, the health and security plans and the system security policies to be implemented in the organization have been provided in section 4 of the report.
The organization being considered, Creative Developer Limited or the CDL, is an established software application and web development organization. It had been operating at the Stratford region of London. A current market research undertaken by the representatives of the organization indicate that the number of customers to whom they could serve is increasing steadily (Patterson and Hennessy 2013). The higher management of the organization is thus of the opinion that improving the infrastructure of the organization would help them to optimize the processes of catering to the requirements of target customers (Siewiorek and Swarz 2014). At present, the organization employs 2 developers who design software applications, one designer for the development of graphics applications, 4 developers having expertise in web development and three other developers who are employed for performing miscellaneous development activities.
a. The scenario and the systems solution
In order to meet the requirements of the organization, the following solutions are being recommended to the management of Creative Developer Limited:
Development of an official website or web-portal through which the target customers would be able to communicate with the representatives of the organizations (Patterson and Hennessy 2013).
The utilization of cloud based platforms for facilitating the access to application suites useful for the development of software and the web based applications (Wolf 2012).
The implementation of a network of the computer system that would be used for the operational activities of the organization, ore specifically for the purpose of graphics designing and development of software and web developments (Siewiorek and Swarz 2014).
The website that has been recommended to be implemented in the organization would facilitate the process of branding and promoting the services that Creative Developer Limited is capable of providing to the customers (Sekanina 2012). The website would also allow the representatives of the organization to communicate with their customers, besides providing information on those application or software solutions that have been developed for their customers previously (Hoffmann, Hoffmann and Söllner 2013). On the other hand, the cloud based development platform would allow the designers to gain access to cloud based application development tools, besides facilitating the storage of the designed modules.
The utilization of cloud based developmental tools would be useful in reducing a number of investments that the management would have to make for the procurement of such applications, as cloud based platforms allow the users to gain access to such resources on a shared basis and pay as per usage. The cloud based storage would also allow the employees to gain access to files from anywhere and anytime: thus escalating the development process (Wolf 2012).
Last but not the least, the development of the network of hi-tech computer devices would increase the efficiency of the operational activities of the organization, along with the inter-organizational communication process.
The following hardware and software solutions are being recommended to the higher management of Creative Developer Limited:
We recommend the Packard Bell OneTwo M D6020uk All-in-one PC, having a sleek and sophistic design, to be installed in Creative Developer Limited. This desktop personal computer is installed with the latest Windows 7 Operating software and would be easier to install in the office cubicles as the model has been specifically designed for fitting into small desk spaces (Müller and Paul 2013).
b. Systems specification of the solution being provided
The specifications of this desktop PC have been provided in the following section:
The Microprocessor
Type of processor |
Intel Pentium Dual-Core T4300 processor |
Memory Clock Speed (RAM) |
800MHz FSB (Computerhope.com 2016). |
L2 Cache |
2MB (Encarnacao, Lindner and Schlechtendahl 2012). |
Chipset |
Intel Graphics Media Accelerator 4500 M |
Clock Speed (Processor) |
2.1GHz |
The |
|
Screen Size |
20’’ inch |
Screen resolution |
1600x900 |
Technology |
TOUCH PANEL Contrast ratio: 1000:1 (Computerhope.com 2016). |
The Sound system |
|
Type |
Integrated on the PCI Slot ( that is the motherboard) |
Speaker Type |
Stereo speakers |
The Memory |
|
Type |
Capacity: 3GB, DDR2 memory (Encarnacao, Lindner and Schlechtendahl 2012). |
(RAM) |
800MHz FSB |
The |
|
Hard Drive |
1 TB Hard Drive |
HDD rotation speed (Manna and Pnueli, 2012). |
7200rpm, Type: SATA |
The Operating System |
|
The preloaded |
Genuine Windows® 7 (Hatley and Pirbhai 2013). |
Operating System type |
64-bits |
The Peripherals |
|
a. DVD Rewriter b. Built-in wireless (802.11b/g/n) c. Integrated Graphics d. Digital TV Tuner (Hatley and Pirbhai 2013). |
|
Card reader |
5 in 1 ( supports :,SD, xD, SD HC, MS Pro,MS, MMC) |
Optical drive |
TRAY SUPER MULTI DVDRW (Siewiorek and Swarz 2014). |
At present, the market price of this hardware would be around £379.00 (Packard Bell 2016).
This particular hardware set has been recommended as the hardware specifications of the machine indicate that the software applications required for the operational activities of the organization would be well supported. Besides this, the manufactures have incorporated enough RAM facility to run the basic web application development tools like that of Adobe Photoshop, Microsoft Visio, and Dreamweaver.
Several cloud platforms are available these days which can be used solely for the purpose developing software applications (Valilai and Houshmand 2013). Utilizing such tools do not require any particular hardware specification and the costs of these services vary greatly based on the products being used and the extent of usage.
The system specification of the website that would be designed for Creative Developer Limited has been provided in the following table:
At present, developing an efficient website containing the above mentioned features would require an investment of around £35,000 approximately.b. iii. The web based communication toolIn this section of the report, the system specifications, that is, the features and utilities of the web based communication tool, have been discussed in brief. The features have been decided based on the requirements of the client and include the following:- Supported by all leading Operating Systems, like that of Windows, iPhone, Android, etc.
- Designed for supporting instant messaging and video calling features (Biltoftââ¬ÂJensen et al. 2014).
- Would support group and point to point conference calls.
- Designed for cumulative call transfer facilities (Dmoz.org 2016).
- Would provide access to all local contacts instantly and contact lists would be updated with new contacts automatically (Linsley 2014).
Domain name (Proposed) |
www. creativedevelopers.com (Wahab et al. 2014). |
Search engine optimization |
Accessible to all leading search engines (Goh et al. 2013) |
List of web pages |
1. The home page 2. Our services 3. Our clients 4. Products designed by us 5. Get to know us (Urueña, Muñoz and Larrabeiti 2014). 6. Contact us 7. The site map |
Layout and style |
|
The layout |
Uniform layout containing the official logo of the organization |
Navigation |
Common navigation bar for all web pages (Linsley 2014). |
Other requirements |
|
Accessibility |
Complies with accessibility criteria mentioned in the World Wide Web Consortium Web Accessibility Initiative or the W3C WAI level A Guidelines (Valilai and Houshmand 2013). |
Code Validation |
All codes would be validated according to the World Wide Web Consortium or the W3C specifications (de Castro Salgado, Leitão and de Souza 2013). |
In case you forget your password or id, please contact your system administrator. Add contacts: New contacts would be automatically added to your contact list, as and when you refresh the tool.
Searching contacts: Contacts present in your list can be searched using their first names or by using the employee ids (Earle, Rosso and Alexander 2015 ).
Making calls: When you select a specific contact, you would be provided with various call options to choose from.
Making conference calls: In order to conduct conference calls, you have to select a contact while being on a call with someone else, using the instructions provided above. The call options would be displayed, chose the one you are currently using. In case your contact responses to the call, a conference call would be set up.
In this section of the report, we provide a brief description of the security policies that need to be implemented by the higher management of Creative Developer Limited.
All system level passwords are to be managed by the IT administrator. The employees would not be allowed to create passwords of their own (Ifinedo 2012).
All the passwords being used for increasing the level of security of the said computer system should be maintained in the global password database of the organization.
All user level passwords including those utilized to access emails and data base information must be changed periodically.
The system should reduce the storage of sensitive client information to the minimum levels.
Task 2
The access to such sensitive information must be controlled by the IT administrator (Safa, Von Solms and Furnell 2016).
The employees of the organization would not be allowed to make copies of the enterprise information in their personal detachable devices, nor would they be able to send any attachments through emails, while using the network provided by the organization.
Corporate standard anti-virus programs should be used for ensuring the security of the hardware components of the computing devices and that of the enterprise information stored in these machines (Vance and Siponen 2012).
The anti-virus programs should be downloaded from the official sites and be updated on a regular basis.
The employees of the organization should be repeatedly made aware of the fact that an email sent from an unknown source might actually be sent with malicious intents: thus, they should not download or open any attachment sent by unknown ids (Safa, Von Solms and Furnell 2016).
It is expected that the management of Creative Developer Limited would provide up to a certain level of privacy to the employees of the organization in terms of information generation and usage: however, it must be made clear to the employees that the data or the information that are generated using the corporate computer network provided by the organization are to be considered as the intellectual properties of the organization itself (Siponen and Vance 2014).
The higher management of the organization would have the right to conduct audits of the computer systems and networks used by employees so as to ensure that the above mentioned policies are being abided by (Ifinedo 2012).
In this section of the report, we provide a brief detail of the Health and Safety policies that must be implemented by the higher management of Creative Developer Limited.
The employees of the organization must be made aware of the fact that they should not bring in any edible material, like foods or drinks, in the work stations. This particular policy would be useful in avoiding spilling of food material on the computer devices which might even lead to short circuits (Lundgren and McMakin 2013).
All the live or open wires within the work floor areas must be concealed within insulator material, and the employees should immediately inform the concerned authorities in case live and/ or open wires are noticed (O’Neill et al. 2013).
The computer devices being used by the employees should not be subjected to direct heat, smoke or moisture (Ab.ust.hk 2016).
Task 3
In case of any servicing work, the following rules are to be followed:
Before servicing any machine, all the wires or connectors supplying power to the system must be unplugged (Sitesafe.org.nz 2016).
Additional care must be taken when the employees attempt to work with electric switches.
All cables should be unplugged if the employees need the access in to the CPU cabinet (Safeworkaustralia.gov.au 2016).
In the light of the discussion made in the report, the following recommendations are being provided to the higher management of the Creative Developer Limited:
In spite of the fact that the development and the implementation of the proposed solutions would require the management to invest a hefty amount, yet the management should opt for the installation as the proposed systems would increase the efficiency of the operational activities of the organization.
The higher management of the organization should implement a detailed security policy in the organization in order to secure the enterprise data.
Strict health and safety policies must also be implemented so as to avoid fatal mishaps or accidents.
The testing plans provided in the report should be followed before the incorporation of the proposed solutions within the operational activities of the organization.
Ab.ust.hk,. 2016. Setting a health and safety policy. Ab.ust.hk. Retrieved 27 January 2016, from https://www.ab.ust.hk/hseo/Dhsmr/sample.htm
Biltoftââ¬ÂJensen, A., Trolle, E., Christensen, T., Islam, N., Andersen, L. F., Egenfeldtââ¬ÂNielsen, S., and Tetens, I. 2014. WebDASC: a webââ¬Âbased dietary assessment software for 8–11ââ¬Âyearââ¬Âold Danish children. Journal of Human Nutrition and Dietetics, 27(s1), 43-53.
Börjesson, E., and Feldt, R. 2012, April. Automated system testing using visual GUI testing tools: A comparative study in industry. In Software Testing, Verification and Validation (ICST) 2012 IEEE Fifth International Conference on (pp. 350-359). IEEE.
Chupilko, M. 2012. Developing test systems for multi-modules hardware designs. Programming And Computer Software, 38(1), 34-42. https://dx.doi.org/10.1134/s036176881201001x
Computerhope.com,. 2016. How can I test for hardware failures in my computer?. Computerhope.com. Retrieved 27 January 2016, from https://www.computerhope.com/issues/ch001088.htm
De Castro Salgado, L. C., Leitão, C. F., and de Souza, C. S. 2013. A Case Study: Re-designing the AVIS Website. In A Journey Through Cultures (pp. 69-114). Springer London.
Denton, A., Moody, D., and Bennett, J. 2016. Usability Testing as a Method to Refine a Health Sciences Library Website. Medical Reference Services Quarterly, 35(1), 1-15. https://dx.doi.org/10.1080/02763869.2016.1117280
Dmoz.org,. 2016. DMOZ - Computers: Security: Policy: Sample Policies. Dmoz.org. Retrieved 27 January 2016, from https://www.dmoz.org/Computers/Security/Policy/Sample_Policies/
Earle, R. H., Rosso, M. A., and Alexander, K. E. 2015, July. User preferences of software documentation genres. In Proceedings of the 33rd Annual International Conference on the Design of Communication (p. 46). ACM.
Conclusion
Ece.uprm.edu,. 2016. Test plan. Retrieved 27 January 2016, from https://ece.uprm.edu/~icom5047/documents/OtherDocuments/TestPlan.pdf
Encarnacao, J. L., Lindner, R., and Schlechtendahl, E. G. 2012. Computer aided design: fundamentals and system architectures. Springer Science and Business Media.
Feitelson, D. G. 2015. Workload modeling for computer systems performance evaluation. Cambridge University Press.
Goebel, J. 2016. Hardware Testing and System Qualification: Procedures to Evaluate Commodity Hardware and Production Cluster. Retrieved 27 January 2016, from https://www.slac.stanford.edu/cgi-wrap/getdoc/slac-pub-9761.pdf
Goh, K. N., Chen, Y. Y., Daud, S. C., Sivaji, A., and Soo, S. T. 2013. Designing a Checklist for an E-Commerce Website Using Kansei Engineering. In Advances in Visual Informatics (pp. 483-496). Springer International Publishing.
Gross, F., Fraser, G., and Zeller, A. 2012, June. EXSYST: search-based GUI testing. In Proceedings of the 34th International Conference on Software Engineering (pp. 1423-1426). IEEE Press.
Hansen, P. B. (Ed.). 2013. Classic operating systems: from batch processing to distributed systems. Springer Science and Business Media.
Hardware Software Co-Design for JPEG Encoder Test Bench. 2012. INTERNATIONAL JOURNAL ON Advances In Information Sciences And Service Sciences, 4(2), 258-266. https://dx.doi.org/10.4156/aiss.vol4.issue2.32
Hatley, D., and Pirbhai, I. 2013. Strategies for real-time system specification. Addison-Wesley.
Hindmarsh, A. C., and Serban, R. 2012. User Documentation for cvodes v2. 7.0.
Hoffmann, A., Hoffmann, H., and Söllner, M. 2013, June. Fostering initial trust in applications–developing and evaluating requirement patterns for application websites. In 21st European Conference on Information Systems (ECIS), Utrecht, The Netherlands.
Ifinedo, P. 2012. Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers and Security, 31(1), 83-95.
Johnson, J. A. 2015, April. Designing Websites for Adults 55+: Toward Universal Design. In Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems (pp. 2449-2450). ACM.
Kolawa, A. K., Jakubiak, N. M., Lambert, M. L., Haaker, W., and Gandhi, N. 2013. U.S. Patent No. 8,448,148. Washington, DC: U.S. Patent and Trademark Office.
Kuo, W., Chien, W. T. K., and Kim, T. 2013. Reliability, Yield, and Stress Burn-in: A Unified Approach for Microelectronics Systems Manufacturing and Software Development. Springer Science and Business Media.
Leigh, Darren, Clifton Forlines, Daniel Wigdor, and Steven Leonard Sanders. "Latency measuring and testing system and method." U.S. Patent Application 14/316,177, filed June 26 2014.
Linsley, P. 2014. U.S. Patent No. 8,713,172. Washington, DC: U.S. Patent and Trademark Office.
Lister, A. 2013. Fundamentals of operating systems. Springer Science and Business Media.
Lundgren, R. E., and McMakin, A. H. 2013. Risk communication: A handbook for communicating environmental, safety, and health risks. John Wiley and Sons.
Maddox, P. 2015. Testing a distributed system. Queue, 13(7), 10.
Mahmud, J., Cypher, A., Haber, E., and Lau, T. 2012. Design and industrial evaluation of a tool supporting semi-automated website testing. Software Testing, Verification And Reliability, 24(1), 61-82. https://dx.doi.org/10.1002/stvr.1484
Manna, Z., and Pnueli, A. 2012. The temporal logic of reactive and concurrent systems: Specification. Springer Science and Business Media.
Martin, G. 2011. Will hardware and software be codesigned? [review of "A Practical Introduction to Hardware/Software Codesign" (Schaumont, P.R.; 2010)]. IEEE Design and Test Of Computers, 28(2), 70-73. https://dx.doi.org/10.1109/mdt.2011.41
Müller, S. M., and Paul, W. J. 2013. Computer architecture: complexity and correctness. Springer Science and Business Media.
Neumann, T. 2011. Efficiently compiling efficient query plans for modern hardware. Proc. VLDB Endow., 4(9), 539-550.
O’Neill, S., Martinov-Bennie, N., Cheung, A., and Wolfe, K. 2013. Issues in the measurement and reporting of work health and safety performance: a review. Safe Work Australia, Safety Institute of Australia and CPA Australia.
Packard bell,. 2016. Retrieved 27 January 2016, from Packard bell: https://www.pcworld.co.uk/gbuk/packard-bell-computing/desktop-pcs/desktop-pcs/1093_8225_71255_1698_xx/xx-criteria.html https://www.algoworks.com/
Patterson, D. A., and Hennessy, J. L. 2013. Computer organization and design: the hardware/software interface. Newnes.
Polian, I. 2014. Hardware security and test: Friends or enemies?. It - Information Technology, 56(4).
Raman, A. 2012. Universal Analog Hardware Test Bench. IETE Journal Of Education, 53(2), 89-96.
Safa, N. S., Von Solms, R., and Furnell, S. 2016. Information security policy compliance model in organizations. computers and security, 56, 70-82.
Safeworkaustralia.gov.au,. 2016. Home - Safe Work Australia. Safeworkaustralia.gov.au. Retrieved 27 January 2016, from https://www.safeworkaustralia.gov.au/sites/.../organisation-needs-organsations
Sce.uhcl.edu,. 2016. Example: Test Plan. Sce.uhcl.edu. Retrieved 27 January 2016, from https://sce.uhcl.edu/helm/RUP_course_example/courseregistrationproject/artifacts/test/plans/test_plan_arch.htm
Sekanina, L. 2012. Evolvable components: from theory to hardware implementations. Springer Science and Business Media.
Siewiorek, D., and Swarz, R. 2014. Reliable Computer Systems: Design and Evaluatuion. Digital Press.
Siponen, M., and Vance, A. 2014. Guidelines for improving the contextual relevance of field surveys: the case of information security policy violations.European Journal of Information Systems, 23(3), 289-305.
Sitesafe.org.nz,. 2016. Health and safety policy Retrieved 27 January 2016, from https://www.sitesafe.org.nz/Category?Action=ViewandCategory_id..
Spichkova, M., Schmidt, H., and Peake, I. 2014. From abstract modelling to remote cyber-physical integration/interoperability testing. arXiv preprint arXiv:1403.1005.
Stallings, W. 2013. Operating Systems: Internals and Design Principles: International Edition. Pearson Higher Ed.
Tolman, H., Accensi, M., Alves, H., Ardhuin, F., Bidlot, J., Booij, N., ... and Foreman, M. 2014. User manual and system documentation of Wavewatch III version 4.18.
Tsichritzis, D. C., and Bernstein, P. A. 2014. Operating systems. Academic Press.
Urueña, M., Muñoz, A., and Larrabeiti, D. 2014. Analysis of privacy vulnerabilities in single sign-on mechanisms for multimedia websites.Multimedia Tools and Applications, 68(1), 159-176.
Valacich, J. S. (2012, June). Designing effective web sites: How academic research influences practice. In Information Technology Interfaces (ITI), Proceedings of the ITI 2012 34th International Conference on (pp. 15-20). IEEE.
Valilai, O. F., and Houshmand, M. 2013. A collaborative and integrated platform to support distributed manufacturing system using a service-oriented approach based on cloud computing paradigm. Robotics and computer-integrated manufacturing, 29(1), 110-127.
Vance, A., and Siponen, M. T. 2012. IS security policy violations: a rational choice perspective. Journal of Organizational and End User Computing (JOEUC), 24(1), 21-41.
Wahab, A. A., Ahmad, F., Baharom, F., and Yahaya, J. 2014. A case study of quality evaluation from consumers’ perspectives on Malaysian B2C e-commerce websites. Management and Technology in Knowledge, Service, Tourism and Hospitality, 19.
Wang, N., and Tao, T. 2012. Designing and Implementation of Audio Product Sales Website. In Information and Business Intelligence (pp. 349-356). Springer Berlin Heidelberg.
Wheeler, A. 2013. Designing brand identity.
Wolf, M. 2012. Computers as components: principles of embedded computing system design. Elsevier.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2016). Hardware And Software Solutions For Creative Developer Limited. Retrieved from https://myassignmenthelp.com/free-samples/testing-process-scenario.
"Hardware And Software Solutions For Creative Developer Limited." My Assignment Help, 2016, https://myassignmenthelp.com/free-samples/testing-process-scenario.
My Assignment Help (2016) Hardware And Software Solutions For Creative Developer Limited [Online]. Available from: https://myassignmenthelp.com/free-samples/testing-process-scenario
[Accessed 15 November 2024].
My Assignment Help. 'Hardware And Software Solutions For Creative Developer Limited' (My Assignment Help, 2016) <https://myassignmenthelp.com/free-samples/testing-process-scenario> accessed 15 November 2024.
My Assignment Help. Hardware And Software Solutions For Creative Developer Limited [Internet]. My Assignment Help. 2016 [cited 15 November 2024]. Available from: https://myassignmenthelp.com/free-samples/testing-process-scenario.