Evaluate alternatives to the company self-hosting the site

Assignment Help Computer Engineering
Reference no: EM132187677

Question: Term Paper: Website Migration Project

Tony's Chips has recently been sold to a new independent company. The new company has hired you to manage a project that will move the old Website from an externally hosted solution to an internal one. The company's leadership is very concerned about redundancy for their site, insisting that a back-up site be available as a failover in case the main site goes down. In addition, they want the site redesigned to allow customers to order products online.

As part of your job, you must complete a 10-to-15 page paper that follows this project through the system development life cycle (SDLC).

This assignment will require you to do the following:

1. Discuss what it will take to build a Web architecture, move an existing Website with minimal downtime, and provide a disaster recovery solution to ensure the site is always available.

i. The Web architecture should describe and justify operating system choices (i.e., Linux, Apache, MYSQL, PHP, Windows, IIS, SQL, etc.).

2. Evaluate alternatives to the company self-hosting the site.

3. Build a Gantt chart using Microsoft Project or equivalent software, showing all tasks associated with implementing the Website.

4. The chart should include a minimum of five (5) tasks, each with three (3) sub-tasks.

5. Explain and justify the system architecture you have selected.

6. Illustrate the system architecture using Visio or equivalent software.

7. Create a use case that documents the event of a customer ordering a bag of chips from the new Website.

8. The use case should include a graphical representation using Visio or equivalent software and a text description of the events.

9. Discuss the support operations that the internally hosted Website will require after implementation.

10. Explain how you will evaluate the performance of the new site and the success of your project.

The specific Course Learning Outcomes associated with this assignment are:

• Design high-level logical system characteristics (user interface design, design of data, and information requirements).

• Use contemporary CASE tools in process and data modeling.

• Use technology and information resources to research issues in systems analysis and development.

• Write clearly and concisely about Systems Analysis and Development topics using proper writing mechanics and technical style conventions.

Reference no: EM132187677

Questions Cloud

Summarize the attack using given data : For each of the three articles you selected, summarize the attack. Include the date of the attack, the type of attack, who or what was affected.
List the files in the current directory : These labs should be performed on the Kali Linux operating system that you installed in Before you begin this lab, log in to it and exercise the following.
Overview of key issues addressed in the section : Analysis and Critical Thinking Thoughtful analysis is performed to help situate the evidence within the team argument and provide engagement with the topic
What you have done and comment on your work : Additionally, using your Week 3 discussion submission attachment (your spreadsheet using the SUM function), create two new tabs.
Evaluate alternatives to the company self-hosting the site : Discuss what it will take to build a Web architecture, move an existing Website with minimal downtime, and provide a disaster recovery solution to ensure.
Describe the principle of least privilege : Read five articles and discuss the principle of least privilege in at least 500 words. Explain how this principle impacts data security.
What is your monthly mortgage payment : Now suppose you borrowed P0 on a 15-year mortgage at r annual interest rate compounded daily. What is your monthly mortgage payment M15
Identify potential sales and department store transactions : Imagine that you have been hired as the database administrator for a local department store. The department store has recently expanded by opening.
How the method can be used to plan out the system : Analyze how the method can be used to plan out the system effectively and ensure that the number of transactions does not produce record-level locking.

Reviews

Write a Review

Computer Engineering Questions & Answers

  The readings for this week mention six stages of the

the readings for this week mention six stages of the systems development life cycle. there are other models however

  Determine the inner surface temperature of the window

A double-door wood-framed window with glass glazing and metal spacers is being considered for an opening that is 1.2 m high and 1.8 m wide in the wall.

  Write code for the methods double-stack

Write code for the methods Double_stack( ), push_a( ), push_b( ), pop_a( ), and pop_b( ) to handle the two stacks within one Double_stack.

  Define the main function that repeatedly calls the motion

A control system applies a force to an actuator proportional to the voltage of a signal coming into the control system. It is desired not to allow actuator to quiver back and forth in the presence of small corrections near zero-force point.

  Simulating the turing machine

Describe how to simulate the Turing machine along with singly infinite tape on the Turing machine with the doubly infinite tape. (Be sure to handle the can't move left" special case.) Describe how to simulate the Turing machine with the doubly inf..

  How might html be used to support edi between the companies

You are working for company that want to begin electronic data interchange with two other companies. How might HTML be use to support EDI between the companies?

  What points should be used for interior elimination method

What four points should be used for the interior elimination method if the input is assumed to be randomly distributed within a circle?

  Determine the productivity rate and standards of performance

Determine the productivity rate, standards of performance, and types of forms that can be used for tracking purposes. (A 3-page response is required.)

  What is the keyspace of the one-time pad for a ciphertext

Suppose you wish to encrypt the messsge BEYONCE using the one time pad with the key RIHANNA.

  Questionseparate following c program into appropriate

questionseparate following c program into appropriate lexemes using discussion as a guide.float limitedsquarex float

  While is it important to denormalize a database

What is the meaning of denormalization, and why can it be desirable? Provide an example.

  What is static and dynamic binding

What is static and dynamic binding? Explain with example how you can implement dynamic binding.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd