In the past, setting up multiple data centres was the only way the accessibility of data resources in an organization’s ICT environment. This outcome increased the overall cost of operations as the data centres were determined by the size and number of users or branches. Furthermore, the implementation of information systems was defined by a challenging process that required constant and continuous replication of its defining elements on all the data centres of a given organization. Now, fast track to today and these limitations or challenges have been eliminated by the growth of cloud computing where multiple resources are hosted online and are accessed when needed (Kim, 2009). A similar objective is held by Headspace, a medical organization that deals with a lot of information owing to its treatment procedures of mental illnesses. In essence, a cloud solution is being sorted out as an alternative to meet the needs of the IT resources (Mu-Hsing Kuo, 2011). This report highlights the elements of cloud computing where its defining components are investigated. Furthermore, the report analyses the structure of the system including its development procedure.
A system’s performance is determined by a wide range of factors, most of which are not necessarily inclined to the functional elements. In this case, the functional requirements will represent the factors that determine the system’s operations. On the other hand, the non-functional requirements are the abstract elements that define the processes of achieving the said operations (Alsaleh & Haron, 2016). Furthermore, these elements are determined by the user’s preferences and their interactions with the system. Because of this outcome, non-functional requirements are measured using subjective factors such as the system’s behaviour or user experience.
These are the defining attributes of a system, for instance, Google, the search engine, is widely used because of its availability and simplicity (Singh & Tripathi, 2012). These are the focus elements in this section. Therefore, the system at hand should have the following qualities:
Consider the various aspects of an information system such as storage, processing and presentation. These functional elements interact with one another to give the functionalities of the system (Microsoft, 2017). Therefore, various stages of input and output are experienced, the true definition of an interface where system components interact to exchange content over a boundary.
A vital boundary between the users and the software package where the actual system interaction takes place (Microsoft, 2017). Therefore, the following requirements must be met:
Unlike the functional requirements that are determined by the capabilities and operations needed, the non-functional requirements are dictated by the ability of the system to fulfil all the user’s preferences. Therefore, satisfying these requirement based on the technical elements is the biggest constraint of the system. Furthermore, other subsidiary elements such as budget and timeline will also affect the functionality of the final system (Dorsey, 2005).
Although cloud technology holds all the answers to the problem facing Headspace, its implementation will require an analysis of the existing service models. Now, some models will offer more control than others but will also increase the overall risk of the system’s security. Therefore, a balance is needed between the user’s requirements and the constraint of the technology. As a result of these requirements, the following benefits and weaknesses can be expected while using cloud solutions (Bisong & Rahman, 2011).
A significant disadvantage of cloud-based solutions is the security of the online facilities. For one, they are a constant target for cyber intruders as they hold more content than any other online resource. Furthermore, since they can be accessed from any location, they do not fall under the jurisdiction of any country. Therefore, the only solution to this problem is to implement proper security features to the cloud and access facility (Headspace system). So, the first step is to contract a reliable service provider with a good track record. Secondly, the standardization of the security measure where all access devices should maintain a certain minimal protection level e.g. authentication and encryption using multiple factor parameters (Obrutsky, 2016). Finally, isolate the access to the data resource based on the user’s roles i.e. Headspace staff should only access the record they need and not all of them. In all, these security features will account for all the data used which will maintain the data integrity and ownership.
Planning and implementation procedures are a crucial component of project management. By themselves, these component define the success of the project based on the requirements given. Now, SDLC (system development life cycle) is usually the project plan for designing and implementing software solutions. In essence, it will define the requirements, preferences and the implementation phases (Velmourougan, Davachelvan, & Ravimohan, 2010). This definition provides a logical procedure for developing the system, an outcome that guarantees the results. In this instance, two different methods of implementing solutions are highlighted; predictive and adaptive SDLC.
A classical approach to implementing solutions, where traditional procedure are consulted to satisfy the users’ requirements. This approach will predict (as the name suggests) the development plan based on the initial requirements and assessments. In addition to this prediction, the approach will document a logical and sequential procedure for developing the solution. Therefore, similar to the general or classical procedure of SDLC, the stages of development i.e. planning, designing, implementing (coding), testing and deployment will be followed. Furthermore, once the process has started, the method will not allow any significant changes to its structure. Moreover, each development phase will be executed independently having a specific timeline (Scroggins, 2014). So, each subsequent development stage will only start after the previous stage is completed.
This method is all about the user’s preferences and their requirements as it implements projects using a flexible approach that caters for any immediate needs. Therefore, the process could be in its final stages but be able to accommodate a last minute system alteration. Furthermore, the implementation process does not follow a sequential plan but instead will divide it into several logical groups that are deployed at the same time. In all, the approach will define a number of development phases using the available requirements, for instance, the project at hand could be divided based on its functionalities i.e. interface, database and data analyzer (Rabbi & Beg, 2015). These phases are then combined to form the final solution where several optimization phases are conducted repetitively.
By all accounts, the adaptive approach presents the best solution for the project at hand as it has the best features and implementation procedure. For one, the development process will be able to accommodate any new requirements that are identified by the organization’s stakeholders. Furthermore, the final system will have a desirable structure owing to the user-centred approach adopted by the method (Rabbi & Beg, 2015). Therefore, the Headspace system will not only satisfy the functional requirement but also the non-functional elements which are the main focus of this report. Now, in a world where the predictive approach is used, the final solutions will only have a consistent implementation process that will most likely fail to live up to the users’ expectations.
Conclusions
Through the services of cloud solutions organizations, today are able to deploy multiple IT resources in single instances. This outcome has facilitated the growth of the digital environment which today hosts most of the information systems. Headspace cannot guarantee the treatments given to its patient because it lacks a structure to store their detailed account (stories), elements that determine the treatments. However, with cloud solutions, this limitation will be eliminated and this will improve the services of the institution.
References
Alsaleh, S., & Haron, H. (2016). The Most Important Functional and Non-Functional Requirements of Knowledge Sharing System at Public Academic Institutions: A Case Study. Lecture Notes on Software Engineering, Retrieved 04 October, 2017, from: https://www.lnse.org/vol4/242-IT084.pdf.
Bisong, A., & Rahman, S. (2011). AN OVERVIEW OF THE SECURITY CONCERNS IN ENTERPRISE CLOUD COMPUTING. International Journal of Network Security & Its Applications (IJNSA),, Retrieved 04 October, 2017, from: https://arxiv.org/pdf/1101.5613.
Bowman, S. (2013). Impact of Electronic Health Record Systems on Information Integrity: Quality and Safety Implications. PMC, Retrieved 04 October, 2017, from: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3797550/.
Chitu, O., & Kevin, C. (2012). The best of adaptive and predictive methodologies: open source software development, a balance between agility and discipline . Spectrum Research Repository, Retrieved 04 October, 2017, from: https://spectrum.library.concordia.ca/7098/.
Coursera. (2017). Design Better User Interfaces. Retrieved 04 October, 2017, from: https://www.coursera.org/specializations/user-interface-design.
Dorsey, P. (2005). Top 10 Reasons Why Systems Projects Fail. Dulcian, Inc, Retrieved 04 October, 2017, from: https://sites.hks.harvard.edu/m-rcbg/ethiopia/Publications/Top%2010%20Reasons%20Why%20Systems%20Projects%20Fail.pdf.
Kim, W. (2009). Cloud Computing: Today and Tomorrow. JOURNAL OF OBJECT TECHNOLOGY, Retrieved 04 October, 2017, from: https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.591.2485&rep=rep1&type=pdf.
Microsoft. (2017). Chapter 16: Quality Attributes. Design fundamentals, Retrieved 04 October, 2017, from: https://msdn.microsoft.com/en-us/library/ee658094.aspx.
Mu-Hsing Kuo, A. (2011). Opportunities and Challenges of Cloud Computing to Improve Health Care Services. PMC, Retrieved 04 October, 2017, from: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3222190/.
Obrutsky, S. (2016). Cloud Storage: Advantages, Disadvantages and Enterprise Solutions for Business. Research gate, Retrieved 04 October, 2017, from: https://www.researchgate.net/publication/305508410_Cloud_Storage_Advantages_Disadvantages_and_Enterprise_Solutions_for_Business.
Rabbi, F., & Beg, A. (2015). An Improved & Adaptive Software Development Methodology. Computer Engineering and Intelligent Systems, Retrieved 04 October, 2017, from: https://iiste.org/Journals/index.php/CEIS/article/download/248/133.
Scroggins, R. (2014). SDLC and Development Methodologies. Global Journal of Computer Science and Technology: CSoftware & Data Engineering, Retrieved 04 October, 2017, from: https://computerresearch.org/index.php/computer/article/download/148/148/.
Singh, P., & Tripathi, A. (2012). Treating NFR as First Grade for Its Testability. Journal of Software Engineering and Applications, Retrieved 04 October, 2017, from: https://file.scirp.org/Html/3-9301547_26213.htm. .
Singh, U. (2015). 11 Pros and Cons of Cloud Computing Everyone Should Know. LinkedIn, Retrieved 04 October, 2017, from: https://www.linkedin.com/pulse/11-pros-cons-cloud-computing-everyone-should-know-umesh-singh.
Velmourougan, P., Davachelvan, P., & Ravimohan, S. (2010). Evolving A New Model (SDLC Model-2010) For Software Development Life Cycle (SDLC). IJCSNS International Journal of Computer Science and Network Security, Retrieved 04 October, 2017, from: https://paper.ijcsns.org/07_book/201001/20100115.pdf.
Wolak, R. (2017). DISS 725 – System Development: Research Paper 1 SDLC on a Diet. Retrieved 04 October, 2017, from: https://codecourse.sourceforge.net/materials/System-Development-Life-Cycle.html.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download