Thursday, October 3, 2019

Examining The Key Characteristics Of Rup Information Technology Essay

Examining The Key Characteristics Of Rup Information Technology Essay Initially select the rational unified process development methodology .The unified process was development in main by joining together Jacobsons use case modeling Boochs object oriented methods and Rumbaya,s object Modeling Techniques (OMT) , Many other object- oriented methods also contributed to developing this process. The goal at the rational Unified Process is to enable the production at highest quality software that meets end- user needs within predictable schedules and budgets. The Rational unified Process captures some of the best current software Development practices in a form that is tail arable for a wide range of projects and organization. The Key characteristics of RUP The Rational Unified processes in an iterative process. Built into the iterative approach is the flexibility to accommodate new requirements or tactical changes in business object. The rational behind the rational unified process is focus on models. Rather than paper documents is to minimize the overhead associated with generating and maintaining documents and to minimize the relevant information content. The Rational Unified Process place strong emphasis on building systems based on a through understand of how the delivered system will be used. The Rational Unified Process supports object oriented techniques each model is object Rational Unified Process models are based on the concepts of objects and classes and the use the UML as its notation. The Rational Unified Process configurable process although no single process suitable for all software development organizations. The Rational Unified Process is failorble and can be scaled to fit the needs of project ranging from small software development to large development organizations. The Rational Unified Process encourage on going quality control and risk management. Phases of RUP Should modified The Rational Unified Process is structured along two dimensions Time division of the life cycle into phases and iterations. Process components- productions of specific set of artifacts with well defined activities. Both dimensions must be taken in to account for a project to succeed. Structuring a project along the time dimension involves the adoption of the following time based four phases. Inception- specifying the project vision Elaboration-planning the necessary activities and require resources specifying the features and designing the architecture. Construction- building the product as a series of incremental iterations. Transition-Supplying the product to the user community. Structuring the project along the process component dimension include the following activities. Business modeling the identification of desired system capabilities and user needs. Requirements- a narration of the system vision along with a set of functional and non functional requirements. Analysis and design a description of how the system will be realized in the implementation phase. Implementation the production of the code that will result in an executable system. Testing the verification of the entire system deployment the delivery of the system and user training to the customer. Within each phase are a number of iterations. Iteration represents a complete development cycle form requirements capture in analysis to implementation testing which result in the realse of an executable product constitutly a subset of the final project under development which then is grown incrementally form iteration to iteration becomes the final system. During the elaboration the focus turns towards analysis and design. In construction implementation is the control activity and transition centers on developments Work breakdown structure With refer to project proposal the entire work break down structure represent Project schedule With referenced to the project proposal entire project plan submitted using MS project Cost estimation With respect to feasibility study in chaper2 the initial cost estimation carried out concerning three areas Total software cost , total hardware cost, total human laybour Risk managing Risk Identification in Inception Phase Identification risk is one management tool in nine project management principles. therefore should be proper method assess unknown risk can be generate and impact of risk and prepare resist to the risk .mainly critical path activities will generate risk if one goes wrong that might effect to total project related wasting time money. Therefore to minimize the risk used contingency plan. Given below is the few or risk associated with certain activities Risk on requirement gathering and analysing identifying incorrect requirements out of scope Risk associated in changing system architecture and technologies several times to fulfil additional requirement made by clients. Risk of design incorrect architecture Risk associated with reusing software component Risk associate din poor project planning in time management and resources management Risk associate with using open source tools to development process Risk associate on hardware used for the project compatibility for requirements After identifying risk it can be categorizes in to three risk namely project risk, product risk, business risk .To overcome risk and identify the proper solution use risk management process Risk Identification Risk Analysis Risk Planning Risk Monitoring List of potential risks Prioritizes risk list Risk avoidance and contingency plans Risk assessment With related risk analysis concern about security risk as in order to identify possible risk caused as physically, from software to destroy information on database as follows Physical risk Fire: Place fire extinguishers that suitable for all type of fires in every floor especially near server rooms and check continuous time intervals Flood: Place the server room as well equipment higher levels where the impact minimum Earthquakes: Locate back up server in separate location where earthquakes are minimise Tsunami: To prevent risk place the servers remote locations Equipment theft: To prevent the risk can used security cameras and security guard with lock doors to server rooms Software risk: Hacking: Used firewall protection, place intrusion detection system Eavesdropping: Used strong encryption when transferring data through the system which difficult crack the encription using complex algorithm Virus: Place co operate virus guard which consist of large virus database in order stand quarantine such a risk Information theft: Place hybrid intrusion detection system and used strong password policy

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.