Premium Essay

Nt1330 Unit 9 Final Paper

Submitted By
Words 593
Pages 3
In order to accommodate for , and mitigate against the risk of database configuration and implementation mismatch( see risk priority 1), the development team must be able to provide the following:
1. Specific documentation stating what database software is supported by the RMT.
2. Generate and apply specific tests against supported RDBMS.
3. Provide configuration examples for the supported RDBMS software
4. Work with client, and provide support for RDBMS software that is out of scope for integration.
5. Generate scenarios in documentation that explains “like” configurations of the databases.
By enforcing a rigid set of examples and tests against the supported RDBMS software, working with the client to ensure that these match specific requirements for development, and providing helpful support when the issue may arise, much of this risk is mitigated by providing a specific path on how to compensate for the risk.
6. Technical Process Plans
This section addresses the processes and mechanics behind the RMT development team’s plans to analysis, construct and test the source code based on the client’s needs.
6.1 Process Model …show more content…
Internally, the development team may organize and develop within the assigned periods for deliverables in a pseudo – agile fashion, building epics stories and tasks in conjunction with the overall planning strategy for the team. This model is heavily influenced by the Department of defense model for government acquisition planning with lean development phases. This model helps to achieve larger scale planning for acquisition and management, but provide more flexibilityto the development teams tasked with

Similar Documents

Premium Essay

Nt1330 Unit 9 Final Paper

...FL Company provides support responsible for the Computing Services through its Help Desk that 40,000 staffs spread over six geographic for providing support. Unresolved problems are passed from Guardian to CSSD T1 or T2 staff, and T2 pass to T3 vendors. For each transfer they will document status in IMS. There are about 1,000 requests are taken per day, and about 50 requests/day have unknown resolution and are never closed. So far, there are15,000 open requests of which more than half are more than one year old. Q: Why there are many unclosed tickets? A: Because there is no efficient solution been found to fix the user’s problem or even the company doesn’t have enough time to review all the coming requests in time. (This answer has TWO sub-questions to be analyzed) Q: Why there is no efficient solution for user to fix their problem? A: Because KEDB doesn’t contain as many unknown errors as it should be in its database and also each tier doesn’t have good enough knowledge to solve users’ problems. (This answer has TWO sub questions to be analyzed) Q: Why KEDB doesn’t have enough solutions for problems in database? A: Because there is no timely update of KEDB. Q: Why there is no update of KEDB? A: Because there is no established clarification of duties for each tier. Q: Why there are no duty clarifications for each tier? A: Because the duties are not assigned clear enough in their job descriptions. ...

Words: 864 - Pages: 4

Premium Essay

Nt1330 Unit 9 Final Paper

... Geni.com provides its users with appropriate privacy settings and policies. Here are multiple ways Geni has incorporated privacy settings within its website: Each profile created is split into two categories: private profiles and public profiles. Private profiles consist of living relatives and minors, and can be viewed and edited by the family group, Geni curators or Geni employees. Public profiles consist of deceased relatives, presumed deceased relatives and public figures. They can be viewed by anyone but only edited by tree collaborators, relatives, Geni curators and employees. Geni curators are volunteer users that are granted special privileges to help maintain and improves the quality of the social network. To be granted this position, they are nominated through a voting process and must sign a Non Disclosure Agreement to guarantee that they will keep all information confidential. Curators are able to assist users in fixing their family trees (for examples: helping merge family tree). Geni employees are similar to curators, except they are granted full access to users profiles and information. This is so that they can provide customer support, check abuse complaints and resolve problems. On the Geni website, there is an option to “social share” your tree. This means to link Geni to outside applications such as your Facebook account. This cannot happen without attaining the users permission first. Granting Geni permission could also allow for release of personal information...

Words: 570 - Pages: 3

Premium Essay

Nt1330 Unit 9 Final Paper

...Question1: List five services provided by an operating system, and explain how each creates convenience for users. In which cases would it be impossible for user-level programs to provide these services? Explain your answer. Services provided by an operating system .the following are examples of services provided by an operating system context switching & scheduling, which allocate process cpu time to execute its instructions . Memory management , which deals with allocating memory to process .  Context switching &scheduling which allocate a process cpu time to execute its instructions .  Memory management, which deals with allocating memory to process.  Interposes the communication, which deal with facilities to allow concurrently running the process to communicate with each each others .  File system which provide higher level files out of low level unstructured data on disk .  High levels I/O facilities , which free a process from the low level details of interrupt handling . Program execution: the contents are upload on operating system of a file into memory and brings it to the execution. The user cannot trust on os properly and allocate cup time. The main purpose of a cpu is to execute instructions .the cpu executes the binary representations Of the instructions, i.e., machine code .since programs can be very large, and since cups have limited memory, programs are stored in memory (RAM). However, cups do its processing on pc.execution of computer and software engineering...

Words: 1162 - Pages: 5

Premium Essay

Nt1330 Unit 9 Final Paper

...1. Your organization keeps paper records for ten years, and you are purging records for destruction. What concern do you have with staff pulling records strictly based on the ten-year indicator? Primarily, every facility should have a detailed policy and procedure manual for destruction of personal health information (PHI). If it is the policy to destroy records that are ten years and older, when selecting records to be destroyed they need to pass through legal holds check. Organizations who do not operate under their destruction policies uniformly or where destruction happens conflicting the policy, a court may permit a jury to assume a negligence suit against the facility. Whereas, if the record were accessible, it would have revealed that...

Words: 508 - Pages: 3

Premium Essay

Nt1330 Unit 9 Final Paper

...the fulfillment center and then locates the product in the warehouse to send it to the packaging and the shipping department • Packaging: After the order is processed the packaging department will safely pack the order and then weigh the the package to obtain the shipping costs and then label the package after acquiring the customer information • Tracking: After the package is shipped from the warehouse/Order fulfillment Center, the package is then tracked till it reaches the customer c) Information that is created or changed is listed below: • Inventory of stock is updated • Availability of packing materials such as boxes, tape etc. • Location or status of the order that is shipped from the warehouse • Invoice is completed Question 9: a) Why would we want to take online customer returns at the stores? b) List what information needs to be shared with the store. c) list what information is created or changed? Answer: a) We would want to take the online customer returns at the stores because • The employees can check for the damages on the spot when the customer returns the order • It reduces the transportation costs for the delivery or exchange of the product. This is because the business is able to save the costs of sending the replaced products through mail. • This results to better customer service as ¬ This is a faster service ¬ This includes face to face interaction with the customer • It makes the process faster as it can be replaced if the products are in stock...

Words: 1322 - Pages: 6

Premium Essay

Nothing

...practices, various media and interconnection components), networking devices and their specifications and functions. Students will practice designing physical network solutions based on appropriate capacity planning and implementing various installation, testing and troubleshooting techniques for a computer network. Where Does This Course Belong? | | | NT2799 | | | | | | | | NSA Capstone | | | | | | | Project | | | | | NT2580 | | | NT2670 | NT2640 | | PT2520 | | Introduction to | | | | | | | | | | | Email and Web | | | | | Information | | | | IP Networking | | Database Concepts | | | | | Services | | | | | Security | | | | | | | | | | | | | | | | NT1330 | | | NT1230 | NT1430 | | PT1420 | | Client-Server | | | Client-Server | | | Introduction to |...

Words: 10839 - Pages: 44

Premium Essay

Unit

...ITT TECHNICAL INSTITUTE NT1310 Physical Networking GRADED ASSIGNMENTS ------------------------------------------------- Student Professional Experience Project NSA SPE Project 1 (to be completed by the end of NT1310): Install, Configure, Test, Maintain and/or Document the Worksite Local Area Network and Its Components Purpose The purpose of the Student Professional Experience (SPE) project is to provide you an opportunity for work experience in your field or in a related field to add to your résumé. You may have an opportunity to serve your community or work for a local employer for a project that will take between 20 and 30 hours. Project Logistics Career Services will identify an employer with needs in the following areas: Network related tasks (mostly confined to the LAN and Microsoft Windows Server 2008 environments) Students are expected to practice various skills discussed in all the technical courses in Quarters 1 through 3 of the NSA program at an employer’s site on network related tasks (more confined to the LAN and Microsoft Windows Networking with Server 2008 environments) that would involve installation, configuration, testing, maintenance and documentation of the worksite network and its components, and to properly document the technical information in all involved activities. Such documentation will be used as the source material for Items 2 and 3 defined in the Deliverables section of this document. Possible example projects could...

Words: 6762 - Pages: 28