Discuss about the Tele Health for Non Functional Requirements.
With the modernization and advent of technology cloud based mobile solutions are increasingly becoming the need and requirement for the day to day functioning of many organizations and individual alike. These solutions are being delivered as per the specifications and requirements. This report explores pros and cons of cloud based solutions and mobile solutions. While these means certainly adds to the productivity of any organization, it is very important to ensure that these are implemented properly with right measures in place for information and data security. SDLC- Software Development Life Cycle is also explained in this report.
While internet is an important part and aspect of mobile based solutions, it is not always necessary to utilize these. There are the solutions for its users to make the information and means to access connected to them on their go. With the help of Mobile based solutions event geographical hurdles can be overcome easily.
There are a set of components which are used to have access to the Mobile Based Solutions. The first requirement would be Wireless Data Network that is used for the services and solutions, which needs network got the exchange of information between different locations and devices. Next requirement would be wireless data modems, which is needed to connect to any wireless network with no cables. An appropriate mobile device as per the requirements are also needed to on which the solutions can be accessed over or run over. Another important device is middleware that sits between the network and the device.
Any technological or computing solution which uses cloud solutions uses a grid for the purpose of data storing, data handling and data managing instead of a local machine. These solutions make use of models for growth, planning and distributions.
Software as a Service (SAS): Under this model every facility and the uses are supplied by the solution provider and are them made available to the users over a grid. Grid in most cases is internet. The solution provider, with their services, brings along a set of features and benefits for their clients. Some the features and benefits are explained below:
Under this model, it’s comparatively simpler for the client to get the facilities and applications. System upkeep and maintenance is taken care by the service provider and the client don’t need to worry about these. There are many feature and benefits of a service platform which are mentioned below:
Under this model cloud computing are provided by subcontracting various tools and devices like hardware, storage, productivity and contribution together along with the grid parts. This model brings, along with it, many remarkable benefits and features. Some of which are mentioned below:
While the technology has been growing at much faster pace today, threats to data and system security is also growing along with it. Cloud and mobile based solutions are also today exposed to a number of threats from the predators of data and information. Data security issue today has become one of the main issues of discussions and concerns for cloud and mobile based solutions.
The service provider and the users of these services need to decide clearly regarding the admission, endorsement validation. These are important to ensure reliability and secrecy in the system. For example, if data encryption is part of the security feature then sharing of community keys, mutual keys and personal keys also needs to be decided as well as their security requirements needs to be resolved.
If there are multiple or more clients and owners are involved there might be some problem or issue with the proprietorship & its assessment. This needs to be sanctioned along with various data package.
Shared Access
In cloud based system its fairly common to have Multi-tenant design, which means that there will be many authorized consumers, who will be sharing among themselves various usages means like hardware, storage and memory. This presents itself with a potential exposure risk to the pooled resources and the personal data stored over the cloud.
Availability
Acceptance of accessibility and errors is a service that all service providers claim to provide. But, there is still a long way to go for these services to be robust. It is still not completely secure. Data Accessibility is one of the most pressing security hazards today.
Interface: One of the great strength of the mobile and cloud based solutions is the interface as the interface required for the development as well as the one on deployment has strong technology behind it.
Maintainability and manageability: These requirements can be easily achieved with the cloud and mobile based solutions. These can be managed easily and these also have a defined structure that doesn’t need much maintenance.
Portability: There are the solutions for its users to make the information and means to access connected to them on their go. With the help of Mobile based solutions event geographical hurdles can be overcome easily.
Reliability: With managed solutions and services, reliable services are something that comes easy through these solutions.
Both the cloud and mobile based solutions have safety constraints which affect the data security and also presents with the users, network and device threats. Authorization controls, authentication, defined encryption and access control are the issues that need to be focused upon and prioritized. Denial of service, account hijacking, malware attacks, data loss and data breach are some of the security issues, which are very common with cloud and mobile based solutions.
Non-functional requirements explain the overall attributes and qualities of the resulting system. Restrictions are applied by non-functional requirements on products which are in process of development or are developed. Each and every external constraint that the product needs to meet is specified by the non-functional requirements. Examples of non-functional requirements are: safety, performance, security, reliability and usability.
They are divided into below classifications as per the IEEE:
They are also divided into External, Product and Process Requirements. External Requirements consists of Interoperability Requirements, Economic constraints and Legal constraints. Product requirements comprise of Safety, Reliability, Usability and Efficiency Requirements. Efficiency requirement is further divided into performance and capacity requirements. Process requirements comprise of Standard, Implementation and Delivery Requirements.
Product Requirements: These are the requirements in which all features, which is required to be possessed by system are clearly mentioned.
NFRs play an important role in Critical Systems. Following are key principles of Critical Systems:
With the help of SDLC- Software Development Life Cycle proper steps to develop software is defined. Predictive SDLC is a organized approach. It defines the following steps:
There are a few pros and cons which are associated with this approach. Following are the advantages that this approach extends:
There are a few disadvantages that are with this methodology. Following are the disadvantages mentioned:
It is a methodology, which executes the software development on the ad-hoc basis. It doesn’t follow any structured approach. It is a plan which is driven in nature instead of structure driven.
Following are the advantages of adaptive SDLC:
There are a few disadvantages as well with the adaptive SDLC, which are mentioned below:
Conclusion
Mobile and cloud based solutions are very common in the present era and have the set of advantages and disadvantages. These are reliable and portable solutions but suffer from the drawbacks of safety and security in terms of the data protection and information security. Adaptive software development life cycle has been suggested to develop the mobile and cloud based solutions as it is plan driven in nature and can adapt to the changes of the industry.
References
Iskwiki.upd.edu.ph. (2016). Mobile Solutions – iskWiki!. [online] Available at: https://iskwiki.upd.edu.ph/index.php/Mobile_Solutions#.VzXsXTB97IU [Accessed 13 May 2016].
Okoli, C. (2016). 1st ed. [ebook] Available at: https://chitu.okoli.org/media/pro/research/pubs/OkoliCarillo2010IJAESD.pdf [Accessed 13 May 2016].
Grimes, R. (2016). The 5 cloud risks you have to stop ignoring. [online] InfoWorld. Available at: https://www.infoworld.com/article/2614369/security/the-5-cloud-risks-you-have-to-stop-ignoring.html [Accessed 13 May 2016].
SearchCloudComputing. (2016). What is SPI model (SaaS, PaaS, IaaS)? – Definition from WhatIs.com. [online] Available at: https://searchcloudcomputing.techtarget.com/definition/SPI-model [Accessed 13 May 2016].
Staff, V. (2016). Top 10 cloud computing risks and concerns. [online] V3.co.uk. Available at: https://www.v3.co.uk/v3-uk/news/2343547/top-10-cloud-computing-risks-and-concerns [Accessed 13 May 2016].
Support.rackspace.com. (2016). Understanding the Cloud Computing Stack: SaaS, PaaS, IaaS. [online] Available at: https://support.rackspace.com/white-paper/understanding-the-cloud-computing-stack-saas-paas-iaas/ [Accessed 13 May 2016].
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download