INTRODUCTION (Milestone One)
As a data analysis intern at Sharpe Style LTD, I was tasked with various functions, which included the analyzing of the business domain and other business processes. Also, I was involved in the process of documenting the business processes and examining their integration with technology.
The system develops process is executed using various procedures that help in ensuring that all factor in the development process is addressed. This results in a business development life cycle (Galbreth & Shor, 2010). The process begins with the identification of technological need that needs to be addressed. A research exercise is then conducted to establish the existence of this gap in the business environment. The research exercise is meant to determine the viability of the business proposal that is underway. This will help in making a decision on whether to engage in the business or not. The requirements necessary to prepare the business plan will be determined and prepared. This will allow the business plan to be well integrated into the business processes. The implementation stage of the life cycle is one of the most crucial sections of the entire project (Otto, 2009). The implementation of the project will require a market survey, to determine the most suitable form of implementation. Also, the financial status of the business will be evaluated to determine the most affordable method of implementing the proposed project.
It is crucial to have a database that will help in storing and managing information about the company. Sharpe Style Company has various information needs. The company needs to gather information from the public and the market to enable it to run its daily operations. Therefore, there is a need to have a storage that will help it in ensuring this information is stored safely and securely (Li-Chiou & Lixin, 2012). Using online platforms such as cloud computing will provide an adequate means of storing information for the company. The use of online platforms provides a secure method for storing data that the company will need to conduct its operations. Also, it also has some special benefits that the company will enjoy while dealing with the information they store. If the company needs to retrieve any information, it can be done within a short time and at any time necessary.
Maintain two separate databases are also important for the company. A physical hard copy of the same information can be stored in servers that are located within the compound of the company (Gilstrap, 2012). This will provide for easy access of the information by the company. The purpose of maintaining the separate database records is to ensure that one acts as a backup copy of the information stored by the company. If some information is lost due to human errors, the company through the backup records can retrieve the same information. To sustain these two servers, the company will need to have a separate software integration system that will help in managing both the data servers that the company has (Rivest, 2008). Furthermore, security features will have to be installed on the servers to prevent attacks from people who have malicious interests in the company’s data.
NEEDS AND OPTIONS: WEBSITE (Milestone Three)
The company will need to establish a company website that they will use to interact with the consumers in the market. People can gain access to the website at any time they want and from anywhere they are. This will provide convenience to the consumers when it comes to interacting with the company. The website should be developed din such a manner that it will be able to retrieve information from the company servers and relay the same information to the consumers in real-time (Johnson & Lam, 2010). However, a limit to the type and amount of information to be shared with consumers should be set. For example, a consumer will be able to access a certain amount of information from the company that is relevant to them. Any additional information or highly sensitive information will be beyond their reach.
Making it convenient for the consumers to access this information is highly crucial for the company. The company can implement the use of mobile services. With the use of mobile phones, customers can be able to access all the information they require at any location (Majumdar, 2010). Mobile phones are more convenient than any other form of gathering information from the company servers. For security purposes, the company should install the necessary security features to help in curbing any malicious activities that may arise from the service provided to companies.
Security is another feature that should be addressed by the company. While providing all these services to the consumers, there are various security risks that should be addressed (Choi, Fershtman & Gandal, 2010). Malicious people may attack the company servers remotely, which may affect the information stored by the company in various ways. These malicious attacks may have different gain objectives. However, the most common objective is to gather unauthorized information from the company servers. People can install virus software that will be used to affect the company servers and steal information. On this note, the company can install firewall and antivirus software in their systems. This software will help in preventing access to any unauthorized connection that attempts to gain access to the information stored on the company servers. Secondly, the company can store the sensitive information on a separate server (Knight et al., 2007). This will minimize the chances of any unauthorized persons from gaining access to the information.
HARDWARE AND SOFTWARE (Milestone Four)
Also, the hardware requires software to manage its operations. The software should be designed and customized for the company (Lee, 2013). This will ensure that all the requirements and desires of the company are achieved. The software should be designed in a manner that will help in managing the hardware that had been installed.
CONCLUSION (Due for Final Submission in Module Seven)
The company has a bright future ahead and can continue the same trend in ensuring that it remains in business (August & Tunca, 2008). The company can continue monitoring the response from the market after implementing these changes. After that, the company can make the necessary adjustments in its technological structure to ensure that their operations are well managed. This way, the market will be attracted to the company because it is providing them with efficient services. In this case, the company will increase its revenue earnings.
Appendix A
Requirements Document
Fill in the sections in red with your information from the research you have completed the requirements and limitations of online and mobile computing. Once you have replaced the red text with your own, make sure all the text in your document has been changed to black.
Online and Mobile Computing: Requirements Document (Version 1.0)
Project: Expanding Business to Online and Mobile Computing
1. Introduction
This document contains the system requirements and limitations for expanding the business to online and mobile computing. These requirements have been derived from several sources, noted in the reference section of the requirements document.
2. Purpose of This Document
We expect business executives to understand the requirements and limitations of online and mobile computing through the use of this document.
3. Requirements
This section will give the reader an overview of the requirements for expanding a business to online and mobile computing.
3.1. User Requirements
1. Mobile phone
2. Internet connection
3. Registered mobile services from the company
3.2. System Requirements
1. System servers
2. High-speed processors
3. Large storage space
3.3. Interface Requirements
1. Internet browser
2. Proficiency in use of computers
3. Easy to understand language
4. Limitations
This section will give the reader information on known limitations for expanding a business to online and mobile computing.
Lack of mobile understanding
Computer illiteracy
Financial power
Appendix B
Flowchart
Appendix C
Options Matrix
References
August, T., & Tunca, T. I. (2008). Let the Pirates Patch? An Economic Analysis of Software
Security Patch Restrictions. Information Systems Research, 19(1), 48–70. INFORMS Press.
Boh, W. F., Slaughter, S. A., & Espinosa, J. A. (2007). Learning from Experience in Software
Development: A Multilevel Analysis. Management Science, 53(8), 1315–1331. INFORMS Press.
Choi, J. P., Fershtman, C., & Gandal, N. (2010). Network Security: Vulnerabilities and
Disclosure Policy. The Journal of Industrial Economics, 58(4), 868–894. Wiley Press.
Johnson, B. R., & Lam, S. K. (2010). Self-organization, Natural Selection, and Evolution:
Cellular Hardware and Genetic Software. Bioscience, 60(11), 879–885. Oxford University Press.
Gilstrap, S. S. (2012). Shifting the Burden in Software Licensing Agreements. The Yale Law
Galbreth, M. R., & Shor, M. (2010). The Impact of Malicious Agents on the Enterprise Software
Industry. MIS Quarterly, 34(3), 595–612. University of Minnesota Press.
Knight, C. G., Knight, S. H. E., Massey, N., Aina, T., Christensen, C., Frame, D. J., Allen, M.
R. (2007). Association of Parameter, Software, and Hardware Variation with Large-Scale Behavior across 57,000 Climate Models.Proceedings of the National Academy of Sciences of the United States of America, 104(30), 12259–12264. National Academy of Sciences Press.
Li-Chiou Chen, & Lixin Tao. (2012). Teaching Web Security using Portable Virtual
Labs. Journal of Educational Technology & Society, 15(4), 39–46. International Forum of Education Technology & Society Press.
Lee, R. S. (2013). Vertical Integration and Exclusivity in Platform and Two-Sided Markets. The
American Economic Review, 103(7), 2960–3000. American Economic Association Press.
Majumdar, R. (2010). Indian Electronics Hardware Industry: Growth and Productivity (1993-
2004). Economic and Political Weekly, 45(14), 72–77. Economic and Political Weekly Press.
Otto, P. N. (2009). Reasonableness Meets Requirements: Regulating Security And Privacy In
Software. Duke Law Journal, 59(2), 309–342. Duke University School of Law Press.
Rivest, R. L. (2008). On the Notion of 'Software Independence' in Voting
Systems. Philosophical Transactions: Mathematical, Physical and Engineering Sciences, 366(1881), 3759–3767. Royal Society Press.