1
|
- Week 14
- LBSC 690
- Information Technology
|
2
|
- Questions
- Systems analysis
- Building complex systems
- Managing complex systems
- Final exam review
|
3
|
- Systems analysis
- How do we know what kind of system to build?
- User-centered design
- How do we discern and satisfy user needs?
- Implementation
- Management
|
4
|
- First steps:
- Understand the task
- Limitations of existing approaches
- Understand the environment
- Structure of the industry, feasibility study
- Then identify the information flows
- e.g., Serials use impacts cancellation policy
- Only then can you design a solution
|
5
|
- Where does information originate?
- Might come from multiple sources
- Feedback loops may have no identifiable source
- Which parts should be automated?
- Some things are easier to do without computers
- Which automated parts should be integrated?
- What other systems are involved?
- And what information do they contain?
|
6
|
- Process Modeling
- Structured analysis and design
- Entity-relationship diagrams
- Data-flow diagrams
- Object Modeling
- Object-oriented analysis and design
- Unified Modeling Language (UML)
|
7
|
- Acquisition
- Cataloging
- Reference
- Online Public Access Catalog (OPAC)
- Circulation
- Weeding
- Reserve, recall, fines, interlibrary loan, …
- Budget, facilities schedules, payroll, ...
|
8
|
- What functions should be integrated?
- What are the key data flows?
- Which of those should be automated?
|
9
|
- Start with user needs
- Who are the present and future users?
- How can you understand their needs?
- Evaluate available technology
- Off-the-shelf solutions
- Custom-developed applications
- Implement something
- Evaluate it with real users
|
10
|
- Key insight: invest in the design stage
- An hour of design can save a week of debugging!
- The motivation behind DoD Standard 2167
- Requirements
- Specifies what the software is supposed to do
- Specification
- Specifies the design of the software
- Test plan
- Specifies how you will know that it did it
|
11
|
|
12
|
- Build what you think you need
- Perhaps using the waterfall model
- Get a few users to help you debug it
- First an “alpha” release, then a “beta” rel=
ease
- Release it as a product (version 1.0)
- Make small changes as needed (1.1, 1.2, ….)
- Save big changes for a major new release
- Often based on a total redesign (2.0, 3.0, …)
|
13
|
|
14
|
- The waterfall model doesn’t work well
- Requirements usually incomplete or incorrect
- The spiral model is expensive
- Redesign leads to recoding and retesting
|
15
|
- Goal: explore requirements
- Without building the complete product
- Start with part of the functionality
- That will (hopefully) yield significant insight
- Build a prototype
- Focus on core functionality, not in efficiency
- Use the prototype to refine the requirements
- Repeat the process, expanding functionality
|
16
|
|
17
|
- Availability
- Mean Time Between Failures (MTBF)
- Mean Time To Repair (MTTR)
- Capacity
- Number of users for each application
- Response time
- Flexibility
|
18
|
- Batch processing (e.g., recall notices)
- Save it up and do it all at once
- Timesharing (e.g., OPAC)
- Everyone uses the same machine
- Client-Server (e.g., Web)
- Some functions done centrally, others locally
- Peer-to-Peer (e.g., Kazaa)
- All data and computation is distributed
|
19
|
- Retrospective conversion
- Even converting electronic information is expensive
- Management information
- Peak capacity evaluation, audit trails, etc.
- Sometimes costs more to collect than it is worth!
- Training
- Privacy
|
20
|
- Check out Risks Digest for a random date
- http://catless.ncl.ac.uk/Risks
- Pick a random date near your birthday
- Find a case of unexpected consequences
- Try to articulate the root cause
|
21
|
- Critical system availability
- Why can’t we live without these systems?
- Understandability
- Why can’t we predict what systems will do?
- Nature of bugs
- Why can’t we get rid of them?
- Auditability
- How can we learn to do better in the future?
|
22
|
- Telecommunications
- Banking and finance
- Energy
- Transportation
- Emergency services
- Food and agriculture
- Water
- Public health
- Postal and shipping
- Defense industrial base
- Chemical industry and hazardous materials
|
23
|
- Response system
- Analysis, warning, response, recovery
- Threat and vulnerability reduction
- Awareness and training program
- Return on investment, best practices
- Securing government systems
- International cooperation
|
24
|
- Systems analysis
- Required for complex multi-person tasks
- User-centered design
- Multiple stakeholders complicate the process
- Implementation
- Architecture, open standards, …
- Management
- Typically the biggest cost driver
|
25
|
- About 5 questions
- Same question styles as the midterm
- Some may require use of the computer
- Comprehensive - covers the entire course
- Emphasis and structure from the second half
- Two hours
- Post-exam discussion at Bentley’s
|
26
|
|
27
|
- Hardware
- Types of hardware
- Storage hierarchy
- Moore’s law
- Software
- Types of software
- Types of interfaces
|
28
|
- Types of Networks
- LAN, WAN, Internet, Wireless
- Packet Switching
- Ethernet, routers, routing tables
- Layered Architecture and protocols
- TCP/UDP
- IP address/domain name
- Encryption
|
29
|
|
30
|
|
31
|
- Human-machine synergy
- Mental models
- Input and output devices
- Interaction styles
- Direct manipulation, menu, language based
|
32
|
- Programming languages
- Machines require low-level specific instructions
- Humans require high-level abstraction
- Can create any behavior from 3 control structures
- Sequential execution
- Conditional
- Iteration
- Javascript interpreters are in Web browsers
|
33
|
- Structured information
- Field->record->table->database
- Primary key
- Normalized tables (relations)
- Remove redundancy, inconsistency, error
- Easy update, search
- Join links tables together
- Access provides visual operations
|
34
|
- Access “Data Access Pages”
- PHP
- SQL
|
35
|
- Synchronous / Asynchronous
- Remote / local
- One-to-one / many-to-many
- Computer-Supported Cooperative Work
|
36
|
- Huge, dynamic, redundant, and diverse
- Multimedia, multilingual, multicultural
- Deep Web
- Internet Archive
|
37
|
- Exact match
- Term-based ranked retrieval
- Recommender systems
- Web search
- Evaluation
|
38
|
- Ownership
- Equitable access
- Controlled access
- Identity
- Privacy
- Integrity
|
39
|
- Systems analysis
- Software development models
- Managing complex systems
|
40
|
|