Question:
Discuss about the Systems Development Life Cycle Methodology.
Cloud computing has received a lot of attention recent years because to the efficiencies and conveniences it provides to business management. In essence, its service extends the availability of information which is a crucial component of the decision-making process. However, despite its widespread application its functionalities and concepts are still not clearly understood by the users. In all, cloud computing offers subscription-based resources and services to users through publicly networked infrastructure (CSCC, 2016). This infrastructure is usually set up by the internet which has a higher reach of the consumers owing to its extensive connectivity. As an organization seeking to better its service delivery structure, Headspace aims to incorporate the resources of cloud solutions where patient’s data will be adequately stored and accessed. Therefore, this report analyzes the various aspects of cloud computing including the security and data ownership requirements (CSCC, Security for Cloud Computing Ten Steps to Ensure Success verison 2.0, 2015). Moreover, the report also highlights the development process of the proposed system and the related non-functional requirements.
In system design, the overall requirements come from the system’s stakeholders and users who demand certain functionalities as well as preferences. From these demands, the developers will analyze and provide consistent requirements based from the raw descriptions. Now, non-functional requirements describe the “how’’ and not the “what” the system can do. Therefore, they will dictate how the system performs certain roles (Kotonya & Sommerville, 1998). Furthermore, unlike functional requirements, they are difficult to test and will only be evaluated using subjective analysis. In general, they are:
These are the factors that affect the system’s run-time behaviour, user’s interaction and the overall package design (Informations, 2012). In this case, we highlight the following elements:
In general, an interface will highlight a common boundary that separate systems that exchange information. In this case, two system exists, the proposed Headspace system and the cloud facility. Furthermore, there is the user interface which will deliver the final solutions and data to the end users (overflow, 2017). Now, all these elements should deliver services to the users using the following attributes (system and UI features):
These are elements that will limit the design of the system, they include manufacturing technology as some users will demands features not accessible to others and the overall design budget. In all, these factors will limit the final solutions within their existing conditions (CSSE).
Cloud-based solutions are considered for this application since they will extend the application of the proposed system by increasing its availability and accessibility (CSCC, Practical Guide to Hybrid Cloud Computing, 2016). However, with these resources, the system will also face some drawbacks as highlighted below.
Cloud storage facilities operate within the digital platform which unlike the physical world is not adequately governed by legal stipulations. Therefore, when adopted, the third party resources will not be governed by the Australian law, which will require other additional measures to protect the data involved. Therefore, as a solution, the Headspace project must first identify a competent service provider with verifiable security standards (CSCC, Security for Cloud Computing Ten Steps to Ensure Success verison 2.0, 2015). Thereafter, the organization should request a proper service agreement detailing the ownership of the data in use. Moreover, the channels of communication between the project and the service provider should be properly encrypted using advanced protocols e.g. end to end encryption. Finally, all users accessing the system must be authenticated and verified based on a predefined access policy.
Software or system development life cycle (SDLC) stands for the conceptual model that is usually applied in the implementation of information systems. In essence, SDLC follows a project management outline where specific developmental stages are used to facilitate the design and deployment of a software package. Now, as its common today, most systems will have different functionalities and requirements which is also usually reflected in the design process where a number of development procedures (methods) are exhibited (Barracliffe, Gardner, Hammond, & Duncan, 2009). Examples of these methods include; predictive SDLC which has models such as the waterfall model and adaptive SDLC which has agile models.
This method generally assumes that the development stage of the system can be predicted and outlined with the utmost accuracy. Furthermore, the approach will assume all the phases of system implementation following a thorough documentation of the requirements. In addition to this, the phases of the system development will follow a sequential structure where each and every stage is executed independently with minimal overlaps. Therefore, each stage must fulfil its requirements before a signoff is given to proceed to the next stage (MIS, 2014).
Unlike the predictive approach that makes all the assumptions at the beginning of the project, the adaptive approach will provide room for system changes by creating a dynamic implementation process. Therefore, any variations in the project’s scope are adequately adopted into the design including changes in personnel, system priorities and requirements (MIS, 2014). Furthermore, to deal with the uncertainty of system changes, the approach breaks down the entire process into smaller subsections which are then implemented concurrently to yield the final system. Moreover, the final system is deployed using iterative procedures which assemble the final solution.
From the description that is given above, the predictive method is suitable for simple projects that have minimal requirements. On the other hand, the adaptive method is seen as a solution for all applications as it caters for all uncertainties. Now, the project at hand already contains a lot of uncertainties, from the unknown cloud service provider to the development process itself. Furthermore, the system requirements may change from time to time owing to the field of application which has many users. Therefore, the adaptive approach offers the best solution for implementing healthcare system (CSCC, Security for Cloud Computing Ten Steps to Ensure Success verison 2.0, 2015).
Conclusion
Cloud computing is rapidly taking over the digital industry because of its extensive benefits and conveniences. In all, a user can access multiple resources that previously were either unavailable or unaffordable. Furthermore, the user can optimize the available resources by applying the flexibility and scalability features of the cloud services. Now, these benefits and application will boost the services of Headspace since it will be able to store and access patient’s records in spite of the practitioners’ location or identity. Moreover, it will improve its service delivery structure since the users will perform their roles using any given device or platform.
References
Barracliffe, M., Gardner, L., Hammond, J., & Duncan, S. (2009). Systems Development Life Cycle (SDLC) Methodology. Information Technology Services, Retrieved 03 October, 2017, from: https://its.ucsc.edu/drb/sdlc/documents/sdlc-handbook-reduced.pdf.
Beauchamp, G. (2009). Non functional requirements. Retrieved 03 October, 2017, from: https://www.smart-ba.com/articles/Non%20functional%20requirements.pdf.
Capes, T. (2011). User Interfaces in Computing. Retrieved 03 October, 2017, from: https://www.cs.toronto.edu/~capestim/csc104/csc104s11/UserInterace.pdf.
CSCC. (2015). Security for Cloud Computing Ten Steps to Ensure Success verison 2.0. Cloud Standards Customer Council, Retrieved 03 October, 2017, from: https://www.cloud-council.org/deliverables/CSCC-Security-for-Cloud-Computing-10-Steps-to-Ensure-Success.pdf.
CSCC. (2016). Practical Guide to Hybrid Cloud Computing. Retrieved 03 October, 2017, from: https://www.cloud-council.org/deliverables/CSCC-Practical-Guide-to-Hybrid-Cloud-Computing.pdf.
CSSE. (n.d.). Design Constraints. Software Engineering Design , Retrieved 03 October, 2017, from: https://teaching.csse.uwa.edu.au/units/CITS2220/lecturenotes/lec09.designconstraints.pdf.
Dignan, L. (2016). Public cloud computing vendors: A look at strengths, weaknesses, big picture. ZDNet, Retrieved 03 October, 2017, from: https://www.zdnet.com/article/public-cloud-computing-vendors-a-look-at-strengths-weaknesses-big-picture/.
Gadgetzz. (2012). Strengths and Weaknesses of Cloud Computing in your Business. Retrieved 03 October, 2017, from: https://gadgetzz.com/2012/07/23/strengths-and-weaknesses-of-cloud-computing/.
Informations. (2012). 3 Essential qualities of information systems. Retrieved 03 October, 2017, from: https://infomotions.com/musings/tricks/manuscript/1500-organizing.html.
Kotonya, G., & Sommerville, V. (1998). Non-functional Requirements. Requirements Engineering Processes and Techniques, Retrieved 03 October, 2017, from: https://www.csm.ornl.gov/~sheldon/cs531/ch8.pdf.
Microsoft. (2017). Chapter 16: Quality Attributes. Design fundamentals, Retrieved 03 October, 2017, from: https://msdn.microsoft.com/en-us/library/ee658094.aspx.
MIS. (2014). The System Development Life Cycle. Retrieved 03 October, 2017, from: https://utexas.instructure.com/courses/1166782/files/38198507/download.
overflow, S. (2017). Software Requirments Specification (SRS): What are ‘System Interfaces’? Retrieved 03 October, 2017, from: https://stackoverflow.com/questions/25728822/software-requirments-specification-srs-what-are-system-interfaces.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download