What kinds of activities should the response times include

Assignment Help Computer Engineering
Reference no: EM133511733

Discussion Post: Stakeholders

A university hosts a department of archaeology, a department of natural history, and a medical school. The three faculties decided to jointly produce an openly accessible, widely advertised online archive to display documents and images of their holdings, including static medical images of archaeological and zoological artifacts. The system will also contain links to the catalog of the university's library so one can research related holdings. The system will be built by the university's IT department with occasional assistance from the computer science department. Funding will be provided by the national government and private foundations. Quick response times are an explicitly but vaguely stated condition for funding. As a performance engineer, you have been asked to join the team that will design and build this system.

Question A. Identify the stakeholders who have an interest in response time requirements. Explain the possible range of resource requirements and time needed for the delivery of images and captions.

Question B. What kinds of activities should the response times include?

Question C. At what points in the delivery chain does a response time begin and end?

Question D. How will you negotiate response time budgets with the various stakeholders?

Reference no: EM133511733

Questions Cloud

Discuss what you believe are key features of the koban : Discuss what you believe are key features of the koban as it operates in Japan and which of the features (physical or conceptual) you believe could be adapted
Creating better outcomes for optimum health and wellness : patients with be improved on when applying these factors in to practice thus, creating better outcomes for optimum health and wellness
Analyze the key reasons why it is important to address : Analyze the key reasons why it is important to address these differences when preparing the initial project plan.
Explain the idea of utilitarianism by jeremy bentham : Explain the idea (theory) of utilitarianism by Jeremy Bentham, that (1) a nation should do whatever is necessary to lead to the greatest possible happiness for
What kinds of activities should the response times include : What kinds of activities should the response times include? How will you negotiate response time budgets with the various stakeholders?
Which state closest to maryland has an established homeland : How does this state's approach to structuring its homeland security office affect its ability to communicate and collaborate with the Department of Homeland
How will this strategy be most beneficial for the problem : Why did you select this search strategy, and how will this strategy be most beneficial for the problem? How did your role as leader assist you in making
Identify the tool you selected and explain why : Identify the tool you selected and explain why it is most appropriate for assessing your organization as it relates to the treatment of pressure ulcers
How does this state approach to structuring its homeland : Which approach did this state use when establishing its homeland security office (stand-alone security unit, stand-alone emergency management

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write a program using the concept of function overloading

Write a C++ program using the concept of function overloading for the following options- Main Menu.

  Briefly discuss the internal and environmental risks

Briefly discuss the internal, external, and environmental risks, which might be likely to affect the business and result in loss of the facility, loss of life.

  Develop a website in google sites

Develop a Website in Google Sites. Using the same organization and its informational content, develop the Google Site following the below directions.

  Evaluate a computer program for syntactic and semantic

INTRODUCTION TO PROGRAMMING-Level I Semester I-National Council for Higher Education- BACHELOR OF SCIENCE IN SOFTWARE ENGINEERING.

  Create application that list accounts from a dictionary

Create an application that list accounts from a Dictionary Object. Create an Account Class that contains an ID, Name, and Balance.  Disaply the account in a ListBox.

  Explain the potential vulnerabilities and risks associated

Explain the potential vulnerabilities and risks associated with IoT devices, such as insecure configurations, weak authentication, and lack of encryption.

  How governmental regulatory efforts attempt to reconcile

Discuss how governmental regulatory efforts, both through mandated standards and pollution license auctions, attempt to reconcile the four who's.

  How much dram does the device have

What is the IOS version? How much DRAM does the device have? How many ethernet and serial interfaces does the router have?

  Describe the common types of scenario planning

Contingency planning is a risk mitigation process for developing back-up plans in anticipation of events (scenarios) that might disrupt ‘business as usual'.

  Create a gui application that allows the user to calculate

A retail company must file a monthly sales tax report listing the total sales for the month, and the amount of state and county sales tax collected.

  CS2413 Data Structures Problem - Priority Circular Queue

CS2413 Data Structures assignment help and solutions, Texas Tech University - essential functions to insert and remove elements

  Recall the optimal page replacement algorithm

The victim page chosen by the algorithm is the one that will not be used the longest period of time. Can this algorithm exhibit Belady's anomaly?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd