Question:
Discuss about the Adaptive and Predictive Methodologies.
Cloud-based solutions enable organizations to manage their IT resources online systems that require minimal physical infrastructures. In essence, the virtualization of resources is the overall defining component of this technology. Nevertheless, the terms that describe this technology evolved recently but the functionalities and operational objectives of the technology have always existed since the inception of information technology (QG, 2017). In essence, cloud solutions represent any access to online resources or information through virtualized networks. Therefore, in the case study at hand, the project proposes a system that will utilize the resources of cloud solutions more so, storage which seems to be a challenging aspect of deploying the envisioned system. Now, a lot of benefits can be experienced when using the cloud technology, most notably the saving of the overall implementation cost of IT infrastructure. In light of this and other benefits, this paper reviews cloud technologies and how they can be integrated with the proposed system. The paper also highlights some of the non-functional requirements of the application and even the development process, which can take several different procedures.
Previously, the functional elements of the system were highlighted where the different capabilities and requirements that needed to meet these functions were given. However, this section steps away from the operational elements of the application and focuses on the user constraints that may limit these functionalities (Terzakis, 2012). These elements include the factors that affect the system’s behaviour when their subjection to external force i.e. the users. Therefore, the non-functional requirements will determine the design of the application based on interaction needs of the end user. For instance, to improve the system performance and usability, a simple system will be needed. At the same time, the integrity of the system’s feature will determine its security attributes.
Modern systems are developed using user-centred procedures in order to enhance the attributes of the non-functional requirements (Ameller & Ayala, 2013). In essence, the developer aims to increase the interaction with the end user by facilitating its performance, resilience and usability. Now, some qualities will determine this outcome and they are:
System integrity – for consistency in performance, the elements of the system such as data must maintain their original developer’s specification.
Accessibility – accessing the system through the various user platforms should not be an issue, be it a PC or mobile device.
Manageability and maintainability – the user should not have to invest extensive resource to maintain the system usability and performance, instead, it should occur seamlessly (Wirfs-Brock & Yoder, 2012).
To enhance their practicality and performance, most systems will have different sections that perform a wide range of functionalities (USDA, 2017). The elements that link these sections are the system interfaces and they too must align with some requirements i.e.:
Coherence – the ability to offer a consistent performance to both elements of a system having a logical and systemic connection.
Stability – arguably the most significant requirement as it will determine the interaction of the linked system as supported by the system interface (IFE, 2017).
A system is often judged by the state of its GUIs (graphical user interfaces) as they propagate the interaction itself. Therefore, their design needs to consider the factors that will promote the ideal elements of non-functional requirements i.e. usability, performance, security and reliability (Android, 2017).
Simplicity and clarity – the interface should have a simple layout that does not stress the user when locating certain functionalities. A simple and clear design will facilitate an optimal interaction.
Conciseness – the interface should only have the necessary functionalities without any other extensive elements that confuse the users.
Integrity – now, security features such as login IDs and passwords will ensure the integrity of the system is maintained. Moreover, they will maintain the user’s confidence in the application’s capabilities (W3, 2017).
These are the requirements that will restrict the functionalities of the system based on their defining factors that induce operational limitations. For instance, the budget of the Headspace project will cause the developer to limit some functionalities. Moreover, the deployment environment e.g. the cloud may use certain standards that will restrict operations to them (Ameller & Ayala, 2013).
System collaboration is a key benefit of cloud-based solutions as it enables an organization or users to communicate and share resources using public channels. Now, this collaboration may depend on the service leased from the service provider, who based on their infrastructure will offer a number of resources (Rajurkar, 2016). Now, although the benefits of cloud technology may vary based on the service models, their general attributes will yield similar features to the end users. Let’s highlights some of these features this technology in the form of strengths and weaknesses.
As a general precaution, the most sensitive information should not be stored in the cloud facilities as the institution cannot guarantee its safety. However, for the rest of the data, security features that will encapsulate the elements of encryption, authentication and authorization will have to be used. For one, the communication channels (access networks) will require end-to-end encryption (E2EE) to protect the infrastructure’s integrity (Aerohive, 2015). This process will be done using a variety of protocols including the secure virtual private networks (VPNs). Secondly, accessing the cloud resources should be personalized based on verifiable user accounts. This requirement will maintain accountability and minimize intrusion instances. Finally, the users (Headspace staff) must be sensitized on the security precautions of cloud technologies as their negligence may account for the biggest data security problems.
A strategic plan is necessary when implementing a system, this plan outlines the requirements and development stages which when combined give the final solution having all the envisioned functionalities. SDLC defines the general process of designing a software or application system where all the necessary parameters are extensively documented and followed. In essence, SDLC will represent a procedure that will have phases such as planning, designing and implementing structures (Franchitti, 2014). This procedure will ensure that all the necessary requirements of the system are satisfied by the final solution. Now, based on the requirements several methods can be used to arrive at the final solution as discussed below.
This approach represents the original method of deploying software solutions where small systems and minimal user requirements facilitate the predictability of the process. In all, the approach will follow a systematic and sequential procedure to implement the necessary package. This procedure will have consistent stages of development where each respective phase will be deployed independently to meet some subsidiary objective (Okoli & Carillo, 2010). Furthermore, the approach will only run the development phases one at a time, an outcome that will necessitate signoff procedures to clear each development stage. Therefore, a given stage of development will only take place after the developers are satisfied with the outcome of the preceding phase.
This approach rewrites the rules of the predictive approach by designing systems through a flexible approach that creates room for any change. Therefore, the system does not predict the requirements and neither does it outline a stringent implementation procedure. Now, to satisfy these requirements, the approach will split the design process into several phases. These phases will then be implemented independently and even concurrently if needed (Bhalerao, Puntambekar, & Ingle, 2009). Therefore, the users or developers may not follow a sequential plan to arrive at the final solutions. Now, having implemented the individual phases, the approach will then collaborate their functionalities to produce the overall system. This collaboration procedure will apply iterative techniques that will repetitively produce different solutions in an effort to optimize the final system.
The Headspace project contains many substantial requirements that essentially will require an agile approach to satisfy them. Among these requirements are the extensive non-functional requirements that will be determined from a large group of people having different preferences. Moreover, the cloud facilities and their integration into the developed system will require extensive functionalities which will regularly require the developers to change the elements of the in-house system. Finally, the project aims to extend the functionalities of the system to the healthcare industry after a successful implementation in the organization at hand (Meso & Jain, 2010). The adaptive approach is the only method that can satisfy these requirements based on the analysis that is given above.
Conclusion
Through this report, the elements, benefits and drawbacks of cloud solutions have been given. In general, cloud resources seem to decrease the overall cost of deploying the proposed system by facilitating the deployment of the system’s infrastructure. Moreover, the same resources will also increase the availability and accessibility of the Headspace system. At the same time, the organization must be wary of the security limitations of the technology as they may affect the integrity of the system thus compromising the objective of the project. Nevertheless, the technology does present a suitable solution for the problems facing the organization, an outcome that will most likely lead to its implementation.
References
Aerohive. (2015). THE BENEFITS OF CLOUD NETWORKING . Aerohive networks, Retrieved 04 October, 2017, from: https://media.aerohive.com/documents/1685209674_Aerohive-Whitepaper-Cloud-Networking.pdf.
Ameller, D., & Ayala, C. (2013). Non-functional Requirements in Architectural Decision Making. TWIN PEAKS, Retrieved 04 October, 2017, from: .
Android. (2017). User Interface . Android developer, Retrieved 04 October, 2017, from: https://developer.android.com/guide/topics/ui/index.html.
Bender, R. (2003). Systems Development Life Cycle: Objectives and Requirements. Retrieved 04 October, 2017, from: https://www.benderrbt.com/Bender-SDLC.pdf.
Bhalerao, S., Puntambekar, D., & Ingle, M. (2009). Generalizing Agile Software Development Life Cycle. /International Journal on Computer Science and Engineering, Retrieved 04 October, 2017, from: https://www.enggjournals.com/ijcse/doc/IJCSE09-01-03-19.pdf.
Franchitti, J. (2014). Software Development Life Cycles (SDLCs). Adaptive Software Engineering, Retrieved 04 October, 2017, from: https://www.nyu.edu/classes/jcf/g22.2440-001_sp09/slides/session3/g22_2440_001_c31.pdf.
IFE. (2017). Systems and Interface Design (SID). Safety Man- Technology- Organisation, Retrieved 04 October, 2017, from: https://www.ife.no/en/ife/departments/system-and-interface-design.
Meso, P., & Jain, R. (2010). AGILE SOFTWARE DEVELOPMENT: ADAPTIVE SYSTEMS PRINCIPLES AND BEST PRACTICES. CONTEMPORARY PRACTICES IN SYSTEMS DEVELOPMENT, Retrieved 04 October, 2017, from: https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.534.3694&rep=rep1&type=pdf.
Okoli, C., & Carillo, K. (2010). The best of adaptive and predictive methodologies: Open source software development, a balance between agility and discipline. Retrieved 04 October, 2017, from: https://chitu.okoli.org/media/pro/research/pubs/OkoliCarillo2010IJAESD.pdf.
(2017). Benefits of cloud computing. Business queensland, Retrieved 04 October, 2017, from: https://www.business.qld.gov.au/running-business/it/cloud-computing/benefits.
QuinStreet. (2013). 5 Reasons to Consider SaaS for Your Business Applications. Datamation, Retrieved 04 October, 2017, from: https://www.oracle.com/us/solutions/cloud/saas-business-applications-1945540.pdf.
Rajurkar, A. (2016). 7 Features of Cloud Computing that give your Business the Edge! Retrieved 04 October, 2017, from: https://www.bodhost.com/blog/features-of-cloud-computing/.
Terzakis, J. (2012). Specifying Effective Non-Functional Requirements. Intel, Retrieved 04 October, 2017, from: https://www.iaria.org/conferences2012/filesICCGI12/Tutorial%20Specifying%20Effective%20Non-func.pdf.
USDA. (2017). Design System Interface. United States Department of Agriculture Farm Service Agency, Retrieved 04 October, 2017, from: https://www.fsa.usda.gov/online-services/sdlc/development-process/high-level-design/design-system-interface/index.
W3. (2017). CSS3 User Interface. Retrieved 04 October, 2017, from: https://www.w3schools.com/css/css3_user_interface.asp.
Wirfs-Brock, R., & Yoder, J. (2012). Testing System Qualities. Wirfs-Brock Associates and The Refactory, Retrieved 04 October, 2017, from: https://www.agilealliance.org/wp-content/uploads/2016/01/TestingSystemQualities-Agile2012.pdf.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download