Identifying the discrepancies and shortcomings of our previous system proved much easier than developing the application architecture and process design of the proposed system. According to the National Institute of Open Schooling, the next step following the initial study was to test the feasibility of the new system. This step included verifying that the proposed process met the needs of the organization, was cost effective and that the process made effective use of company resources, to include people and equipment. “The main goal of feasibility study is not to solve the problem but to achieve the scope.”
(National Institute of Open Schooling)
During the feasibility analysis, we identified which of our current resources could be utilized during the implementation of the new process. We researched the capabilities of our current infrastructure to determine if our network, peripherals and servers could support our proposed solution. This analysis showed that additional hardware, software and connectivity would be required. Although a preexisting intranet was in place, we determined that the load and network traffic that would be produced by the new process’s extensive data transfer warranted a dedicated system. The backbone of the new system was comprised of a new HP ProLiant DL580 G3 Server. According to Hewlett-Packard, the new server’s dual Xeon Processor and 6 gigabytes of read only memory (RAM) would provide sufficient power to support the requirements of the new system. The DL 580’s Integrated Smart Array would also provide ample storage with the capability to house up to 1.2 terabytes (TB) of internal storage. (Hewlett-Packard Development Company, L.P. 2006)
The Essay on Systems Security Ldap Server
F E A T U R E Authentication Gets Tough May 28, 2001 By Michael Ross and Jeff Rubin Your Web presence has grown over the past five years. Shouldn't your authentication and authorization system be growing with it? Today's high-performance Web-based policy-management solutions are secure, scalable, easy to manage and designed for thousands of users in a distributed environment -- not just dozens ...
In addition to the hardware, additional licensing was required for both Windows 2003 Server Enterprise and Microsoft SQL Server. An additional HP ProLiant DL380 G4 Server was also required to support the Linux based Docutron system (www.docutronsystems.com) that would be responsible for storing and cataloging all the association’s documents electronically. Docutron provided us with an off the shelf solution that still had the capabilities to be fine-tuned to the specific needs of our organization. Although future applications would be electronically sent to the Docutron system, previous paper files needed to be imputed into the system to fully establish a paperless filing system. Kodak’s i280 Scanner met this need. This scanner is capable of imputing the prior records at a rate Up to 7,500 pages per day. (Eastman Kodak Company, 2005.) The determination was also made to incorporate two kiosks to allow new members to input their application information from our lobby. Once the hardware to support the new system was identified, the next step was to determine what capabilities and functions the user interface required.
A web-based application developed on ASP.NET technology was chosen for the interface that would provide the connectivity and usability required of the new system. This application was developed from the ground up to utilize the current databases maintained by our organization, as well as, incorporating the benefits of the new Docutron system. The application provided a friendly web-based user interface that allowed members to input their information, schedule courses and make payments. An employee interface was also developed to allow employees to view and verify applications, reproduce receipts and correct any errors. The backend of the application was designed to import the member’s information directly into our association management database and send electric copies of all required documents to the Docutron system where they would be cataloged and stored.
The Term Paper on Data flow diagram 2
... of the system. 2. A context diagram shows all input, output, and data stores of a system. 3. A data flow named “Application Request” ... in implementing your recommendation. How can the IT systems provide value to Peachtree Healthcare patients? Employees? Stakeholders? The ... the business, IT, and medical perspectives. You should provide clear justification for your arguments in the alternatives ...
This process can best be illustrated through the use of a flow diagram 2">data flow diagram. Data flow diagrams provide a way of visually displaying a system at any level of detail. The information within a data flow diagram includes a graphic representation of the system that can show data flows and data processes, as well as indicating the source and destinations of the data. The primary purpose of data flow diagramming is to provide a connection between system developers and end-users and to provide a mutually understood depiction of the system. (Kozar 1997) A data flow diagram can be described as the following.
A data flow diagram (DFD) is a graphical tool that allows analysts (and users) to depict the flow of data in an information system. DFD graphically representing the functions, or processes, which capture, manipulate, store and distribute data between a system and its environment and between components within a system. (Zhu)
References
Eastman Kodak Company, 2005. Kodak i200 Series Scanners. Retrieved February 18, 2007 from: http://www.kodak.com/US/en/dpq/site/TKX/name/i280Scanner_product/show/i280ScannerSpecifications_product
Hewlett-Packard Development Company, L.P., 2006. HP ProLiant DL580 G3 Server series – overview. Retrieved February 18, 2007 from: http://h10010.www1.hp.com/wwpc/us/en/ss/WF05a/15351-241434-241475-241475-f80-408421.html
Introduction to System Analysis and Design. National Institute of Open Schooling Site Retrieved February 18, 2007 from: http://www.nos.org/htm/sad1.htm
Kozar, K., 1997. The Technique of Data Flow Diagramming. Retrieved February 18, 2007 from: http://spot.colorado.edu/~kozar/DFDtechnique.html
Zhu, Z., Requirements Determination and Requirements Structuring. Retrieved on February 18, 2007, from: http://www.umsl.edu/~sauter/analysis/6840_f03_papers/zhu/