The organization of Headspace is one of the most popular and significant medical organizations in New South Wales that treat mental patients. They have noticed that the young people, who have age difference within 18 to 25, are the major victims of mental illness, depression and many others. They require regular treatment due to this type of problems. However, whenever they are being asked about their problems repeatedly, they feel irritated and do not want to communicate. The following report explains about a new project of Headspace, called, New Access for mitigating such issues. Relevant details like non-functional requirements, cloud based solution and SDLC approach would be described here.
Non Functional Requirements
Functionality
It is the most important and noteworthy factor for the FURPS within the project of New Access in Headspace. The treatment process is improved by implementing a better system for their young patients by providing storage for the medical data (Yang et al., 2013). The easy accessibility of the data is the next significant functionality of this system.
Usability
This is the second factor of FURPS for the New Access project. Major uses of the project would be to store the data, when the first time these stories are being narrated as well as the periodical up gradation of the system (Sadiku, Musa & Momoh, 2014). The next important usability is reducing complexity of project or the consumption of time.
Reliability
The third significant and important factor of the FURPS for this project of New Access in Headspace organization is the checking of reliability. This particular factor is being measured by taking into consideration about the reliability of the sources, from which these data are being collected for using them. Moreover, a checking is also required that whether the data is used for treatment purpose or not (Xia et al., 2016). However, there is no chance of lack of reliability in New Access project, since the data is being collected from the patients as well as their family members. Therefore, reliability is highly maintained here.
Performance
This particular factor of FURPS provides the assurance that the respective information system of New Access can provide a better performance to the users. Moreover, a distinct data management is possible here. The lower response time is the important measure of performance as well as various emergency services are provided here.
Security
This is the final non functional requirement of FURPS. The data security is enhanced here and provides a major assurance that the data will not be lost at any cost (Rahimi et al., 2014). New Access project of Headspace would provide such a system, which has no chance of data loss. Moreover, data up gradation is also done here easily and promptly.
Three types of cloud based solutions are possible for New Access project. They are provided below:
iii) Hybrid Cloud: This specific cloud is the proper combination of both private cloud and public cloud and hence the advantages of both of these cloud services are present here.
Strengths of Hybrid Cloud
The major strengths of the hybrid cloud for New Access project are provided below:
Weaknesses of Hybrid Cloud
The major weaknesses of the hybrid cloud for New Access project are provided below:
Predictive SDLC Approach
The predictive approach of SDLC helps to monitor the overall project life cycle by providing a proper project plan, before project initiation. This specific predictive approach could only be applied, when the respective schedule as well as scope of the project is absolutely clear (Aazam & Huh, 2014). The pros and cons of predictive approach are provided below:
Pros:
Cons:
Adaptive SDLC Approach
Adaptive approach is majorly responsible for allowing several types of modifications within the project stages as per the requirements of the clients. Project deliverables are sent to the client in each and every project stage and hence the client gets an idea of the project progress. Moreover, they can even the project deliverables as per choice. The pros and cons of adaptive approach are provided below:
Pros:
Cons:
The most relevant and suitable approach of SDLC for the project of New Access in Headspace would be the predictive approach. This is the major because this predictive SDLC approach is responsible for making a perfect project plan for the project that is to be executed. The cost effectiveness and high efficiency are the other important advantages of this predictive SDLC approach. The entire project of New Access hence would be highly benefitted with this particular approach.
Conclusion
Hence, it is concluded that the project of New Access is the most relevant solution for the treatment of young mental patients in New South Wales, started by Headspace. The most significant purpose of the deployment of New Access project would be that the confidential data or information management is extremely easier. Moreover, the questions faced by them could also be avoided easily and promptly. The young patients will not be disturbed anymore and they would feel secured and the treatment would be completed easily. The above report has provided the description regarding with project with some recommendations for the betterment of the project such as SDLC approach, cloud solution and non-functional requirement.
References
Aazam, M., & Huh, E. N. (2014, August). Fog computing and smart gateway based communication for cloud of things. In Future Internet of Things and Cloud (FiCloud), 2014 International Conference on (pp. 464-470). IEEE.
Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges. Information sciences, 305, 357-383.
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2014, August). On the integration of cloud computing and internet of things. In Future internet of things and cloud (FiCloud), 2014 international conference on (pp. 23-30). IEEE.
Chen, X., Jiao, L., Li, W., & Fu, X. (2016). Efficient multi-user computation offloading for mobile-edge cloud computing. IEEE/ACM Transactions on Networking, (5), 2795-2808.
Moreno-Vozmediano, R., Montero, R. S., & Llorente, I. M. (2013). Key challenges in cloud computing: Enabling the future internet of services. IEEE Internet Computing, 17(4), 18-25.
Pearson, S. (2013). Privacy, security and trust in cloud computing. In Privacy and Security for Cloud Computing (pp. 3-42). Springer, London.
Rahimi, M. R., Ren, J., Liu, C. H., Vasilakos, A. V., & Venkatasubramanian, N. (2014). Mobile cloud computing: A survey, state of art and future directions. Mobile Networks and Applications, 19(2), 133-143.
Sadiku, M. N., Musa, S. M., & Momoh, O. D. (2014). Cloud computing: opportunities and challenges. IEEE potentials, 33(1), 34-36.
Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., & Ren, K. (2016). A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security, 11(11), 2594-2608.
Yang, L., Cao, J., Yuan, Y., Li, T., Han, A., & Chan, A. (2013). A framework for partitioning and execution of data stream applications in mobile cloud computing. ACM SIGMETRICS Performance Evaluation Review, 40(4), 23-32.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download