Technology Solutions 2018-06-25T21:09:03+00:00

Feasibility – Analysis – Design – Development and Testing – Implementation – Evaluation – Maintenance

1. Feasibility Study – At this stage, the information analyst completes a study to determine if the new system under consideration by management is achievable.  The study will look at all aspects and options including the possibility of updating the existing system to the appropriate and necessary technical level needed for each situation.
2. Analysis –At stage 2, both users and IT specialists work together to study and comprehend the specific business requirements.  Working from the results of this study, they will discuss and formulate a list of tasks for moving forward.  At this point, the user and IT specialists sign on joint application design to formalize the business requirements.
3. Design –Stage 3 is the creation of the system’s blueprint.  The technical architecture design includes telecommunications, hardware, and software specifically suited for the system.
4. Development and Testing –This stage of the cycle is completed in two separate phases, the first being the building stage.  At this point the building of the technical architecture, database and programs are executed.  During the second phase of stage 4, the system is tested using the established test scripts, and a comparison made of both the expected and the actual outcomes.
5. Implementation – At this point, the system is in place and used by the actual workforce.   Training is provided to users to ensure the proper operation of the system.  Appropriate user guides and manuals for troubleshooting and future training purposes are provided.
6. Evaluation – To ensure the system continues to run smoothly, this stage allows for periodic evaluations.
7. Maintenance– The importance of this stage becomes evident as the needs and goals of the organization change.  At this point changes to enhance or strengthen may be implemented.


Website Design and Development

Website Design and Development encompasses many different skills and disciplines in the production and maintenance of websites. The different areas of web design include web graphic design; interface design; authoring, including standardized code and proprietary software; user experience design; and search engine optimization.

Server Hosting and Database Administration

A web hosting service is a type of Internet hosting service that allows individuals and organizations to make their website accessible via the World Wide Web. Web hosts are companies that provide space on a server owned or leased for use by clients, as well as providing Internet connectivity, typically in a data center.

Data Recovery and Disaster Preparedness

In computing, data recovery is a process of salvaging (retrieving) inaccessible, lost, corrupted, damaged or formatted data from secondary storage, removable media or files, when the data stored in them cannot be accessed in a normal way. The data is most often salvaged from storage media such as internal or external hard disk drives (HDDs), solid-state drives (SSDs), USB flash drives, magnetic tapes, CDs, DVDs, RAID subsystems, and other electronic devices.

Information Management and Data Warehousing

In computing, a data warehouse (DW or DWH), also known as an enterprise data warehouse (EDW), is a system used for reporting and data analysis, and is considered a core component of business intelligence.[1] DWs are central repositories of integrated data from one or more disparate sources. They store current and historical data in one single place that are used for creating analytical reports for workers throughout the enterprise.[

The discipline whereby all of the information technology resources of a firm are managed in accordance with its needs and priorities. These resources may include tangible investments like computer hardware, software, data, networks and data center facilities, as well as the staff who are hired to maintain them.

Managing this responsibility within a company entails many of the basic management functions, like budgeting, staffing, change management, and organizing and controlling, along with other aspects that are unique to technology, like software design, network planning, tech support etc.[

Information Security Program

Information security (InfoSec) describes activities that relate to the protection of information and information infrastructure assets against the risks of loss, misuse, disclosure or damage.

Information security management (ISM) describes controls that an organization needs to implement to ensure that it is sensibly managing these risks.



Experience – Services

  • Business System Analyst

    The position of Business Systems Analyst has always been Dr. Sullivan’s first love in her long career in the IT industry. She began working as a Business Systems Analyst in 1993 and was immediately drawn to the challenge presented by this position. As a Business… Read more…

  • Computer Systems Analyst

    Dr. Sullivan began working as a Computer Systems Analyst in 1990. During the last 17 years, her ability to research a company’s needs and to make the appropriate recommendations for moving forward has reached a high level of expertise. Dr. Sullivan’s meticulous method of examining… Read more…

  • Database Specialist

    In her position of Database Administrator and Database Analyst, Dr. Sullivan uses her knowledge and substantial experience in IT to protect the integrity of each company’s data. Part of her responsibilities includes making the needed data available to the client and the employees. An understanding… Read more…

  • Software Architect

    Dr. Sullivan’s natural inclination toward both the technical and the mechanical workings of computer systems are assets that have served her well since 2008 in her position as Software Architect. Her technical nature partnered with years of study and hands-on experience has allowed her to… Read more…

  • IT Auditor

    In her position of IT Auditor, Dr. Sullivan creates a solid information technology infrastructure while collaborating with clients to devise and implement policies and procedures to ensure network security. Due to the rapidly changing world of IT, keeping her technological skills current is a prime… Read more…

Quality Information Systems (web or software applications) are the backbone of most business operations today (whether client-facing or internal), yet, according to Research studies “one-third of business stakeholders are dissatisfied with the quality of their current information systems.”

A poorly integrated and tested information system severely effects on an organization’s clients, sales, partnerships, employees and financial bottom line.

Security, cloud computing, virtualization, service-oriented architectures, mobile deployments, and ever-changing compliance requirements all strain the performance of information systems and the abilities of IT department or team.