Evaluate alternatives to the company self-hosting the site

Assignment Help Computer Engineering
Reference no: EM132187677

Question: Term Paper: Website Migration Project

Tony's Chips has recently been sold to a new independent company. The new company has hired you to manage a project that will move the old Website from an externally hosted solution to an internal one. The company's leadership is very concerned about redundancy for their site, insisting that a back-up site be available as a failover in case the main site goes down. In addition, they want the site redesigned to allow customers to order products online.

As part of your job, you must complete a 10-to-15 page paper that follows this project through the system development life cycle (SDLC).

This assignment will require you to do the following:

1. Discuss what it will take to build a Web architecture, move an existing Website with minimal downtime, and provide a disaster recovery solution to ensure the site is always available.

i. The Web architecture should describe and justify operating system choices (i.e., Linux, Apache, MYSQL, PHP, Windows, IIS, SQL, etc.).

2. Evaluate alternatives to the company self-hosting the site.

3. Build a Gantt chart using Microsoft Project or equivalent software, showing all tasks associated with implementing the Website.

4. The chart should include a minimum of five (5) tasks, each with three (3) sub-tasks.

5. Explain and justify the system architecture you have selected.

6. Illustrate the system architecture using Visio or equivalent software.

7. Create a use case that documents the event of a customer ordering a bag of chips from the new Website.

8. The use case should include a graphical representation using Visio or equivalent software and a text description of the events.

9. Discuss the support operations that the internally hosted Website will require after implementation.

10. Explain how you will evaluate the performance of the new site and the success of your project.

The specific Course Learning Outcomes associated with this assignment are:

• Design high-level logical system characteristics (user interface design, design of data, and information requirements).

• Use contemporary CASE tools in process and data modeling.

• Use technology and information resources to research issues in systems analysis and development.

• Write clearly and concisely about Systems Analysis and Development topics using proper writing mechanics and technical style conventions.

Reference no: EM132187677

Questions Cloud

Summarize the attack using given data : For each of the three articles you selected, summarize the attack. Include the date of the attack, the type of attack, who or what was affected.
List the files in the current directory : These labs should be performed on the Kali Linux operating system that you installed in Before you begin this lab, log in to it and exercise the following.
Overview of key issues addressed in the section : Analysis and Critical Thinking Thoughtful analysis is performed to help situate the evidence within the team argument and provide engagement with the topic
What you have done and comment on your work : Additionally, using your Week 3 discussion submission attachment (your spreadsheet using the SUM function), create two new tabs.
Evaluate alternatives to the company self-hosting the site : Discuss what it will take to build a Web architecture, move an existing Website with minimal downtime, and provide a disaster recovery solution to ensure.
Describe the principle of least privilege : Read five articles and discuss the principle of least privilege in at least 500 words. Explain how this principle impacts data security.
What is your monthly mortgage payment : Now suppose you borrowed P0 on a 15-year mortgage at r annual interest rate compounded daily. What is your monthly mortgage payment M15
Identify potential sales and department store transactions : Imagine that you have been hired as the database administrator for a local department store. The department store has recently expanded by opening.
How the method can be used to plan out the system : Analyze how the method can be used to plan out the system effectively and ensure that the number of transactions does not produce record-level locking.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Find the minimum frame size

if switch is used; theoritically, is there any limitation for frame size and why ?

  Analyze why getty image embraced agile methodologies

Analyze why Getty Image embraced Agile methodologies. Speculate on the result if Agile methodologies were not embraced in this situation.

  What are the different types of paths

What are the different types of paths? What are two common functions for representing graphs? Can you think of other functions?

  What is an algorithm

What is an algorithm? Please explain after watching below YouTube video. The response must be typed, single spaced.

  The printed newspaper''s popularity is declining

Some people lament the fact that the printed newspaper's popularity is declining so alarmingly that some of the children of the new generations have never read (or will read) a printed newspaper.

  Advantages and disadvantages of compilers and interpreters

choose a problematic situation that you think a Java program can solve or make easier.

  Draw the decision tree

A café in Newport has two purchasing decisions; buy high quality bread or lower quality bread for its customers. They can purchase the high quality bread.

  What s difference between real resource and virtual resource

What s the difference between real resource and virtual resource? What are goals of an OS resource allocation function? Describe the conflicts between them.

  Write a function called fare that computes the bus fare

Using Matlab, write a function called fare that computes the bus fare one must pay in a given city based on the distance travelled.

  Which areas of the data life cycle are the most challenging

Determine which areas of the data life cycle are the most challenging to control and explain why (i.e., creation, access, use, transmission, storage).

  Finds the closest pair with one member of pair in each half

Give an algorithm that, given a set of 2/V points, half with positive .r coordinates, finds the closest pair with one member of the pair in each half.

  What can individuals and organizations do to secure personal

What can individuals and organizations do to secure personal and proprietary information from these attacks?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd