Examining The Key Characteristics Of Rup Information Technology Essay

Initially select the rational unified process development methodology .The unified process was development in main by joining together Jacobson’s use case modeling Booch’s object oriented methods and Rumbaya,s object Modeling Techniques (OMT) , Many other object- oriented methods also contributed to developing this process.

The goal at the rational Unified Process is to enable the production at highest quality software that meets end- user needs within predictable schedules and budgets. The Rational unified Process captures some of the best current software Development practices in a form that is tail arable for a wide range of projects and organization.

The Key characteristics of RUP

The Rational Unified processes in an iterative process. Built into the iterative approach is the flexibility to accommodate new requirements or tactical changes in business object.

The rational behind the rational unified process is focus on models. Rather than paper documents is to minimize the overhead associated with generating and maintaining documents and to minimize the relevant information content.

The Rational Unified Process place strong emphasis on building systems based on a through understand of how the delivered system will be used.

The Rational Unified Process supports object oriented techniques each model is object Rational Unified Process models are based on the concepts of objects and classes and the use the UML as its notation.

The Rational Unified Process configurable process although no single process suitable for all software development organizations. The Rational Unified Process is failorble and can be scaled to fit the needs of project ranging from small software development to large development organizations.

Read also  File Systems and Permissions Summary

The Rational Unified Process encourage on going quality control and risk management.

Phases of RUP

Should modified

The Rational Unified Process is structured along two dimensions

Time division of the life cycle into phases and iterations.

Process components- productions of specific set of artifacts with well defined activities.

Both dimensions must be taken in to account for a project to succeed.

Structuring a project along the time dimension involves the adoption of the following time based four phases.

Inception- specifying the project vision

Elaboration-planning the necessary activities and require resources specifying the features and designing the architecture.

Construction- building the product as a series of incremental iterations.

Transition-Supplying the product to the user community.

Structuring the project along the process component dimension include the following activities.

Business modeling the identification of desired system capabilities and user needs.

Requirements- a narration of the system vision along with a set of functional and non functional requirements.

Analysis and design a description of how the system will be realized in the implementation phase.

Implementation the production of the code that will result in an executable system.

Testing the verification of the entire system deployment the delivery of the system and user training to the customer.

Within each phase are a number of iterations. Iteration represents a complete development cycle form requirements capture in analysis to implementation & testing which result in the realse of an executable product constitutly a subset of the final project under development which then is grown incrementally form iteration to iteration becomes the final system.

During the elaboration the focus turns towards analysis and design. In construction implementation is the control activity and transition centers on developments

Read also  The Outline Of Cloud Computing Information Technology Essay

Work breakdown structure

With refer to project proposal the entire work break down structure represent

Project schedule

With referenced to the project proposal entire project plan submitted using MS project

Cost estimation

With respect to feasibility study in chaper2 the initial cost estimation carried out concerning three areas Total software cost , total hardware cost, total human laybour

Risk managing

Risk Identification in Inception Phase

Identification risk is one management tool in nine project management principles. therefore should be proper method assess unknown risk can be generate and impact of risk and prepare resist to the risk .mainly critical path activities will generate risk if one goes wrong that might effect to total project related wasting time money. Therefore to minimize the risk used contingency plan.

Given below is the few or risk associated with certain activities

Risk on requirement gathering and analysing identifying incorrect requirements out of scope

Risk associated in changing system architecture and technologies several times to fulfil additional requirement made by clients.

Risk of design incorrect architecture

Risk associated with reusing software component

Risk associate din poor project planning in time management and resources management

Risk associate with using open source tools to development process

Risk associate on hardware used for the project compatibility for requirements

After identifying risk it can be categorizes in to three risk namely project risk, product risk, business risk .To overcome risk and identify the proper solution use risk management process

Risk Identification

Risk Analysis

Risk Planning

Risk Monitoring

List of potential risks

Read also  A Definition Of Modulation Transfer Functions Information Technology Essay

Prioritizes risk list

Risk avoidance and contingency plans

Risk assessment

With related risk analysis concern about security risk as in order to identify possible risk caused as physically, from software to destroy information on database as follows

Physical risk

Fire:

Place fire extinguishers that suitable for all type of fires in every floor especially near server rooms and check continuous time intervals

Flood:

Place the server room as well equipment higher levels where the impact minimum

Earthquakes:

Locate back up server in separate location where earthquakes are minimise

Tsunami:

To prevent risk place the servers remote locations

Equipment theft:

To prevent the risk can used security cameras and security guard with lock doors to server rooms

Software risk:

Hacking:

Used firewall protection, place intrusion detection system

Eavesdropping:

Used strong encryption when transferring data through the system which difficult crack the encription using complex algorithm

Virus:

Place co operate virus guard which consist of large virus database in order stand quarantine such a risk

Information theft:

Place hybrid intrusion detection system and used strong password policy

Order Now

Order Now

Type of Paper
Subject
Deadline
Number of Pages
(275 words)