Structure Charts
The following structure charts will be used to initialize the system application for the system modules:
Test Environment and Operational Environment
Environment is considered to be the adequate combination of system software and hardware. In TIMS, the test environment and operational environment will be kept separated because operational environment will comprise of the actual program whereas, the development and maintenance of the programs will take place via testing environment. In this way, TIMS can ensure the security and integrity of the system by making the operational environment accessible to certain entities so that operational environment cannot be effected by the performance of testing environment (Shelly & Rosenblatt, 2009).
Installation Process
The developed application system will be implemented on the two environments, comprising of testing and operational environment. In the testing environment, acceptance tests will be conducted to ensure the expected functionality of the system. The critical evaluation will be conducted by the IT staff and IT management and when the acceptable results will be obtained, the system will be made available to the end-users (Shelly & Rosenblatt, 2009).
Guidelines
The guidelines for the installation process as inferred by Shelly and Rosenblatt (2009) are as follows:
The TIMS management has to ensure that the developed system is in accordance to the company’s projected budged and is compliant with the system requirement of the TIMS.
TIMS has to ensure that the decision and judgment made by the IT staff is irrespective of any biasness accounted by the departmental pressure.
TIMS has to ensure that the IT staff and operational staff have the documented guidelines of the system to ensure their adaptability for the new system.
TIMS has to ensure that the evaluation process is conducted in an effective manner to ensure the sustainability of the system in the long run.
Training Plan
The in-house training session will be conducted to reduce cost and ensure the integrity of the training mechanism with the system requirement. The training plan will incorporate the following steps as inferred by Willems and Meinel (2012):
TIMS will analyze all the potential users of the system to assess if they are able to operate the new system.
The users, managers and daily staff will be prioritized for the training mechanism.
The training resources will be developed by means of effective documentation, user guidelines and system tutorials and will be shared with the staff.
The staff will be provided with the hands-on training and the trainer will be associated with the IT staff because the system development and evaluation was conducted by the IT staff and thus, IT staff understands the technicality of the system in an effective manner.
The on-going evaluation will be conducted by the trainer to analyze the extent to which the users’ have become in compliance with the new system.
Data Conversion
The data conversion will take place in which the manual system of TIMS of keeping training records will be replaced by using the Open-Database Connectivity (ODBC) so that different corporate clients of TIMS can communicate with systems due to the ODBC’s feature of incorporating more than one vendor as a time (Shelly & Rosenblatt, 2009).
Changeover Method
The Phased Operation changeover method will be implemented in the TIMS in which the subsystem will be installed in the different functions of TIMS in which part of the system will be implemented to ensure the integrity of the system, and to provide hands on practice to different functions in an effective manner. Since, TIMS is facing the budget and risk constraints, this changeover method will reduce the risk due to its adherence to only one function of the company and will also reduce the cost due to its implementation in one function at a time (Shelly & Rosenblatt, 2009).
References
Shelly, G., & Rosenblatt, H. J. (2009). Systems analysis and design. Cengage Learning.
Willems, C., & Meinel, C. (2012). Online assessment for hands-on cyber security training in a virtual lab. In Global Engineering Education Conference (EDUCON), 1-10.