Evaluate alternatives to the company self-hosting the site

Assignment Help Computer Engineering
Reference no: EM132187677

Question: Term Paper: Website Migration Project

Tony's Chips has recently been sold to a new independent company. The new company has hired you to manage a project that will move the old Website from an externally hosted solution to an internal one. The company's leadership is very concerned about redundancy for their site, insisting that a back-up site be available as a failover in case the main site goes down. In addition, they want the site redesigned to allow customers to order products online.

As part of your job, you must complete a 10-to-15 page paper that follows this project through the system development life cycle (SDLC).

This assignment will require you to do the following:

1. Discuss what it will take to build a Web architecture, move an existing Website with minimal downtime, and provide a disaster recovery solution to ensure the site is always available.

i. The Web architecture should describe and justify operating system choices (i.e., Linux, Apache, MYSQL, PHP, Windows, IIS, SQL, etc.).

2. Evaluate alternatives to the company self-hosting the site.

3. Build a Gantt chart using Microsoft Project or equivalent software, showing all tasks associated with implementing the Website.

4. The chart should include a minimum of five (5) tasks, each with three (3) sub-tasks.

5. Explain and justify the system architecture you have selected.

6. Illustrate the system architecture using Visio or equivalent software.

7. Create a use case that documents the event of a customer ordering a bag of chips from the new Website.

8. The use case should include a graphical representation using Visio or equivalent software and a text description of the events.

9. Discuss the support operations that the internally hosted Website will require after implementation.

10. Explain how you will evaluate the performance of the new site and the success of your project.

The specific Course Learning Outcomes associated with this assignment are:

• Design high-level logical system characteristics (user interface design, design of data, and information requirements).

• Use contemporary CASE tools in process and data modeling.

• Use technology and information resources to research issues in systems analysis and development.

• Write clearly and concisely about Systems Analysis and Development topics using proper writing mechanics and technical style conventions.

Reference no: EM132187677

Questions Cloud

Summarize the attack using given data : For each of the three articles you selected, summarize the attack. Include the date of the attack, the type of attack, who or what was affected.
List the files in the current directory : These labs should be performed on the Kali Linux operating system that you installed in Before you begin this lab, log in to it and exercise the following.
Overview of key issues addressed in the section : Analysis and Critical Thinking Thoughtful analysis is performed to help situate the evidence within the team argument and provide engagement with the topic
What you have done and comment on your work : Additionally, using your Week 3 discussion submission attachment (your spreadsheet using the SUM function), create two new tabs.
Evaluate alternatives to the company self-hosting the site : Discuss what it will take to build a Web architecture, move an existing Website with minimal downtime, and provide a disaster recovery solution to ensure.
Describe the principle of least privilege : Read five articles and discuss the principle of least privilege in at least 500 words. Explain how this principle impacts data security.
What is your monthly mortgage payment : Now suppose you borrowed P0 on a 15-year mortgage at r annual interest rate compounded daily. What is your monthly mortgage payment M15
Identify potential sales and department store transactions : Imagine that you have been hired as the database administrator for a local department store. The department store has recently expanded by opening.
How the method can be used to plan out the system : Analyze how the method can be used to plan out the system effectively and ensure that the number of transactions does not produce record-level locking.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Define the concept of a six-stage add pipeline

It is required to compute Ci = Ai + Bi (i = 1- 50), where A, B, and C are arrays of floating-point numbers, using a six-stage add pipeline.

  Define an enumerated type bird-type made up of bird names

Define an enumerated type Bird_Type made up of bird names. Define an integer component array data type Siting_Type indexed by Bird_Type.

  Describe in brief salient features of amd opteron processor

Describe in brief salient features of the AMD Opteron processor. Comment briefly on whether such a processor should provide hardware support for multithreading.

  Write an essay defining the information security strategy

Write an essay defining the information security strategy and policy for the business or organization you chose

  Discuss governance of information within organizations

Examine the principles requiring governance of information within organizations

  Cfl pumping lemma

Utilize the CFL pumping Lemma in order to show each of these languages not to be context-free.

  In what ways would your organization use its crm to gain

the purpose of this assignment is to understand customer relationship management crm and crm systems within the

  In privacy deborah g johnson presents arguments designed to

in privacy deborah g. johnson presents arguments designed to show that the greater capacity of computers to gather and

  What is the optimum frame size for frame relay transmission

What is the optimum frame size for frame relay transmission in terms of throughput and delay?

  How data mining can threaten privacy

Explain what "shield" you think is appropriate for the last computer program you developer for a specific user.

  Determines shipping charges based on the number of items

Write a program that a large Internet merchandise provider determines its shipping charges based on the number of items purchased.

  Write an arduino c language function printstr

Write an ARDUINO C function called strlen() that determines the length of a null-terminated ASCII string. Pass a 16-bit address pointer to the first element of the string to the function. Return the length, excluding the null byte.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd