Bugs in new maintenance releases

Assignment Help Management Information Sys
Reference no: EM13768998

Consider that a management and tracking system developed for marathon runners is going into production tomorrow. The runners will begin using the site in the morning to sign up and track their entries into multiple races. Data was entered for racers that had signed up prior to the system going live. There is a race in four weeks, which allows friends to login and track where the runner is on the course. The season ends in six months and full reports are provided to each runner with their statistics. In your initial response, provide examples of post implementation items you will need to manage and support in the first five days, the first four weeks, and the first six months for the marathon runner management and tracking system.

In responding to your peers, select one of the post implementation items in their post and provide a failure scenario for the post implementation item and a possible resolution for the runners as well as management, assuming the item fails to resolve the problem. For example, an implementation item can be a checkpoint in the first five days in order to ensure runners can reset passwords.

A failure scenario may be that runners that had logins created prior to the production going live will be unable to reset their passwords. Assuming there is an issue where runners are unable to reset passwords, management can resolve the issue. However, management must resolve the issue by approving the database team to run a script to reset all user IDs with create dates, prior to going live. Below is the peer post chosen: "First Five Days Fault management - As errors in the system become apparent, the team will correct them. Maybe one of the data servers has sustained physical damage and must be replaced, for example. Better to take care of that as quickly as possible, before many users start experiencing problems (Rosenblatt, p. 519).

Security risk assessment - The team will closely monitor the network to ensure that no hackers are breaking into the system. Threat categories include human error (such as accidentally deleting files), technical obsolescence (parts of the system are so too out-of-date that they don't function well, or don't interface well with other parts), espionage, and natural disasters (flood, earthquake, etc.). Critical risks will be identified and marked for response during the first four weeks, possibly the first five days (Rosenblatt, p. 525).

Online training - Now that the system is up and running, many people will need training in its use. Online training system costs less than in-person training, and can accommodate busy schedules. Especially at first, it would be valuable to monitor trainees' experience and adjust the online training system to better accommodate their needs (Rosenblatt, p. 480).

First Four Weeks Perfective maintenance - The initial system would work well, but it could always perform even better! Speed of data loading could be increased, for example, letting people access pages faster (Rosenblatt, pp. 511-512).

Adaptive maintenance - I might add enhancements such as support for mobile devices. For example, the initial application might run only on Web browsers (so it would be ready on time), and once it was up and running, I could add iOS and Android mobile capabilities (Rosenblatt, p. 511).

Network security upgrades -Encryption levels might be raised, permissions adjusted to deny access to risky users, firewalls upgraded, and so on (Rosenblatt, pp. 531-540). First Six Months Maintenance releases - Updated versions of the marathon tracking system could be released as the project team responds to user requests and completes "nice-to-have" features.

For example, maybe users will complain that the system crashes at certain points, so the developers will fix those bugs in new maintenance releases (Rosenblatt, p. 517).

Risk control - Cyber-attacks can happen at any time. And unintentional errors can also expose the system to threats. The team will continue monitoring and responding to potential security risks (Rosenblatt, p. 526).

Backup and recovery - The system will collect data throughout its running period. This will become especially critical when reports are generated and delivered to marathon runners.

The team will back up data on hard drives and in the cloud, and will retain the data for a significant period of time after the marathons are over, in case anyone requests reports (Rosenblatt, pp. 540-542).

Verified Expert

Reference no: EM13768998

Questions Cloud

Summarizing the key points and conclusions : Utilizing the information you compiled for your literature review paper, and the feedback you received from your instructor about the literature review, prepare a 10-15-minute PowerPoint presentation on your topic, summarizing the key points and c..
The web abounds with junk science issue : Explain the actions that you believe need to be developed and implemented to accomplish change.
Compile a list of methods to stop different cyber crimes : Compile a list of methods to stop different cyber crimes. Using the book and other resources, write a 1 to 1 ½ page paper (using APA style formatting) on methods to either catch or stop cyber criminals. Explain the different methods in detail
How much must pinnacle partners pay for the bond : Suppose that it is August 13, 2013 and that Pinnacle Partners plans to buy a Treasury bond that matures in May 2042. The bond pays coupons semi-annually on May 15 and November 15 of each year. The Ask quote for this bond is 112:18 and it pays an annu..
Bugs in new maintenance releases : System crashes at certain points, so the developers will fix those bugs in new maintenance releases - Cyber-attacks can happen at any time. And unintentional errors can also expose the system to threats.
Advantages and disadvantages of each type of write-blocker : Discuss the major advantages and disadvantages of each type of write-blocker and explain which type you will use on the crime scene
The trust fund earns a five percent rate of return : Arnold Ziffle established a trust fund that provides $75,000 in scholarships each year for worthy students. The trust fund earns a 5 percent rate of return. How much money did Ziffle contribute to the fund assuming that only the interest income is di..
What obstacles can you expect to encounter : You're a detective working at a local police department. What do you need to do to gather evidence from these computers, and what obstacles can you expect to encounter during this process
Explaining what a hash value is and why it is important : Compose a 1 page narrative, explaining what a hash value is and why it's important in computer forensics. Include the activities that you just conducted using Karen's Hasher, documenting your hash values and discuss why the hash value changed

Reviews

Write a Review

Management Information Sys Questions & Answers

  What software trends are relevant to managers

Management Information Systems - Software Trends and What kinds of software and software trends are relevant to managers?

  Differences between how individuals make and carry out

differences between how individuals make and carry out decisions about computers and how companies make and carry out

  What issues should the systems analysts and programmers

What issues should the systems analysts and programmers discuss before they proceed and as a systems analyst on this project, how would you describe your primary responsibilities, and how could you contribute to the quality of the finished product?

  Hot technologiesvisit a web site of an information

hot technologiesvisit a web site of an information systems-related content provider such as informationweek

  Analyze the key information management

Prepare a PowerPoint presentation where you describe and analyze the key information management and quantitative techniques/statistics that you recommend for the new plant

  Create a test plan that conforms to the owasp standards

In your Lab Report file, create a test plan that conforms to the OWASP standards and includes the following elements. You will be responsible for determining what to document in this report based on what you learned in your research

  How cloud computing might play a role in their future

Discuss and explain how cloud computing might play a role in their future. Discuss and explain how virtualization can be utilized to better connect the three stores

  Phases of system designwhat is the primary target of

phases of system designwhat is the primary target of systems design and what phases are included in the systems

  Mobile communications technologywhat is the advantage of

mobile communications technologywhat is the advantage of mobile communications technology? and how it effects in

  The answer to operations and supply chain

the answer to operations and supply chain managementoperations and supply chain managementthe concepts

  Explain the importance of your selected indicators

Prepare a paper in which you describe the importance of your selected indicators. Include an answer to the following question: What information would be required to utilize these performance indicators to evaluate the performance of a supply chain?

  Description of information systemsgive a specific example

description of information systemsgive a specific example of how a company illustrates the three key principles of good

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd