Bugs in new maintenance releases

Assignment Help Management Information Sys
Reference no: EM13768998

Consider that a management and tracking system developed for marathon runners is going into production tomorrow. The runners will begin using the site in the morning to sign up and track their entries into multiple races. Data was entered for racers that had signed up prior to the system going live. There is a race in four weeks, which allows friends to login and track where the runner is on the course. The season ends in six months and full reports are provided to each runner with their statistics. In your initial response, provide examples of post implementation items you will need to manage and support in the first five days, the first four weeks, and the first six months for the marathon runner management and tracking system.

In responding to your peers, select one of the post implementation items in their post and provide a failure scenario for the post implementation item and a possible resolution for the runners as well as management, assuming the item fails to resolve the problem. For example, an implementation item can be a checkpoint in the first five days in order to ensure runners can reset passwords.

A failure scenario may be that runners that had logins created prior to the production going live will be unable to reset their passwords. Assuming there is an issue where runners are unable to reset passwords, management can resolve the issue. However, management must resolve the issue by approving the database team to run a script to reset all user IDs with create dates, prior to going live. Below is the peer post chosen: "First Five Days Fault management - As errors in the system become apparent, the team will correct them. Maybe one of the data servers has sustained physical damage and must be replaced, for example. Better to take care of that as quickly as possible, before many users start experiencing problems (Rosenblatt, p. 519).

Security risk assessment - The team will closely monitor the network to ensure that no hackers are breaking into the system. Threat categories include human error (such as accidentally deleting files), technical obsolescence (parts of the system are so too out-of-date that they don't function well, or don't interface well with other parts), espionage, and natural disasters (flood, earthquake, etc.). Critical risks will be identified and marked for response during the first four weeks, possibly the first five days (Rosenblatt, p. 525).

Online training - Now that the system is up and running, many people will need training in its use. Online training system costs less than in-person training, and can accommodate busy schedules. Especially at first, it would be valuable to monitor trainees' experience and adjust the online training system to better accommodate their needs (Rosenblatt, p. 480).

First Four Weeks Perfective maintenance - The initial system would work well, but it could always perform even better! Speed of data loading could be increased, for example, letting people access pages faster (Rosenblatt, pp. 511-512).

Adaptive maintenance - I might add enhancements such as support for mobile devices. For example, the initial application might run only on Web browsers (so it would be ready on time), and once it was up and running, I could add iOS and Android mobile capabilities (Rosenblatt, p. 511).

Network security upgrades -Encryption levels might be raised, permissions adjusted to deny access to risky users, firewalls upgraded, and so on (Rosenblatt, pp. 531-540). First Six Months Maintenance releases - Updated versions of the marathon tracking system could be released as the project team responds to user requests and completes "nice-to-have" features.

For example, maybe users will complain that the system crashes at certain points, so the developers will fix those bugs in new maintenance releases (Rosenblatt, p. 517).

Risk control - Cyber-attacks can happen at any time. And unintentional errors can also expose the system to threats. The team will continue monitoring and responding to potential security risks (Rosenblatt, p. 526).

Backup and recovery - The system will collect data throughout its running period. This will become especially critical when reports are generated and delivered to marathon runners.

The team will back up data on hard drives and in the cloud, and will retain the data for a significant period of time after the marathons are over, in case anyone requests reports (Rosenblatt, pp. 540-542).

Verified Expert

Reference no: EM13768998

Questions Cloud

Summarizing the key points and conclusions : Utilizing the information you compiled for your literature review paper, and the feedback you received from your instructor about the literature review, prepare a 10-15-minute PowerPoint presentation on your topic, summarizing the key points and c..
The web abounds with junk science issue : Explain the actions that you believe need to be developed and implemented to accomplish change.
Compile a list of methods to stop different cyber crimes : Compile a list of methods to stop different cyber crimes. Using the book and other resources, write a 1 to 1 ½ page paper (using APA style formatting) on methods to either catch or stop cyber criminals. Explain the different methods in detail
How much must pinnacle partners pay for the bond : Suppose that it is August 13, 2013 and that Pinnacle Partners plans to buy a Treasury bond that matures in May 2042. The bond pays coupons semi-annually on May 15 and November 15 of each year. The Ask quote for this bond is 112:18 and it pays an annu..
Bugs in new maintenance releases : System crashes at certain points, so the developers will fix those bugs in new maintenance releases - Cyber-attacks can happen at any time. And unintentional errors can also expose the system to threats.
Advantages and disadvantages of each type of write-blocker : Discuss the major advantages and disadvantages of each type of write-blocker and explain which type you will use on the crime scene
The trust fund earns a five percent rate of return : Arnold Ziffle established a trust fund that provides $75,000 in scholarships each year for worthy students. The trust fund earns a 5 percent rate of return. How much money did Ziffle contribute to the fund assuming that only the interest income is di..
What obstacles can you expect to encounter : You're a detective working at a local police department. What do you need to do to gather evidence from these computers, and what obstacles can you expect to encounter during this process
Explaining what a hash value is and why it is important : Compose a 1 page narrative, explaining what a hash value is and why it's important in computer forensics. Include the activities that you just conducted using Karen's Hasher, documenting your hash values and discuss why the hash value changed

Reviews

Write a Review

Management Information Sys Questions & Answers

  Show the role of information systems

Information Systems Role - Show the role of information systems in achieving excellence in healthcare service.

  Relationship between customer service and inventory levels

Relationship between customer service and inventory levels? Impact to costs - What is the relationship between customer service and specific levels of inventory? How does that relationship impact cost?

  How to protect an organization

From the e-Activity, explain, in your own words, each security compliance measure and how each, in general, is designed to protect an organization

  Challenges of managing a supply chain

Challenges of Managing a Supply Chain - determine which is the most challenging to manage effectively. Provide specific examples to support the response.

  Wal-mart''s use of technology in logistics

Wal-Mart's Use of Technology in Logistics and Does Wal-Mart use IT effectively in its logistical operations

  California city uses a police-beat allocation system it is

california city uses a police-beat allocation system it is an example of what?a california city uses a police-beat

  How will technology impact business over the next 10

how will technology impact business over the next 10 years?predict how technology will positively impact business over

  Explain about project life cycle phases and componets

Project Life Cycle Phases and Componets - Your role as project manager requires you to use a variety of tools to help through the process. The Marketing Manager has asked you to research and write about the various tools that are available to the ..

  Discusses rfp and its role in the purchasing process

What is an RFP, and what critical tasks does it facilitate in the purchasing process? and Discusses RFP and its role in the purchasing process.

  The importance of managing employees and technologywhat

the importance of managing employees and technologywhat technological changes are affecting the general managers job in

  Ways in which information system are transforming business

Describe three (3) ways in which information system are transforming business. What is information systems literacy? How does it differ from computer literacy

  Keep your organizations is secure

Keeping Information Secure - Describe what you would do as a CIO of an organization to keep your organizations IS secure.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd