Six Sigma
Philosophy of Six Sigma (7 steps)
Responsibility for Total Quality Management
* Early commitment to quality from the analyst and business users
Structured Walkthroughs
Who is Involved in Structured Walkthroughs?
The Top-Down Approach
Advantages of the Top-Down Approach
Modular Development
• Breaking the programming into logical, manageable portions or modules • Works well with top-down design • Each individual module should be functionally cohesive, accomplishing only one function
Advantages of Modular Development
Guidelines for Modular Programming
Testing, Maintenance, and Auditing
The Testing Process
Program Testing with Test Data
Link Testing with Test Data
• Also referred to as string testing • Checks to see if programs that are interdependent actually work together as planned • Test for normal transactions • Test with invalid data
Full System Testing with Test Data
Full System Testing with Live Data
Maintenance Practices
Auditing
• Having an expert who is not involved in setting up or using the system examine information in order to ascertain its reliability
• There are internal and external auditors
• Internal auditors study the controls used in the
information system to make sure that they are adequate
• External auditors are used when the information system processes data that influences a company’s financial statements
Client-Server Technology
Advantage of Client-Server Model
• Advantage—greater computer power and greater opportunity to customize applications
Disadvantage of Client-Server Model
more expensive and applications must be written as two separate software components each running on separate machines
Cloud Computing
• Organizations and individual users can use: – Web services
– Database services
– Application services over the Internet
• Done without having to invest in corporate or personal hardware, software, or software tools
• A large collection of corporate users jointly bear the
lowered cost
• Realize increases in peak-load capacity
• Companies also hope to improve their ability to perform disaster recovery
Cloud Computing Trade-Offs
• One major decision is whether to use an external cloud
provider (public cloud) or an internal one (private cloud)
• Sometimes the decision to use a public cloud has to do with how critical it is for the company to strategically control data
• A hybrid approach, in which more critical data linked to strategic aims and corporate intellectual property are held in a private cloud, and less critical data for the same organization makes use of a public cloud, may be a solution
Factors in Choosing a Cloud Provider
• If a client of the cloud services provider is hacked, how will it adversely affect other businesses the cloud provider is hosting?
• How can your client be sure data are completely deleted from cloud systems when these systems are eventually decommissioned?
• Are the data architectures being used by the cloud provider standard and transparent so if the client wants to switch providers it would be realistic to do so?
proprietary programming structures in use, making transferring data out of the question?
• How can your client be certain that no one at the cloud provider or their staff working for other clients has access to your organization’s data?