DEVELOPMENT CYCLE PROGRESSION STEPS
Feasibility – Analysis – Design – Development and Testing – Implementation – Evaluation – Maintenance
1. Feasibility Study – At this stage, the information analyst completes a study to determine if the new system under consideration by management is achievable. The study will look at all aspects and options including the possibility of updating the existing system to the appropriate and necessary technical level needed for each situation.
2. Analysis –At stage 2, both users and IT specialists work together to study and comprehend the specific business requirements. Working from the results of this study, they will discuss and formulate a list of tasks for moving forward. At this point, the user and IT specialists sign on joint application design to formalize the business requirements.
3. Design –Stage 3 is the creation of the system’s blueprint. The technical architecture design includes telecommunications, hardware, and software specifically suited for the system.
4. Development and Testing –This stage of the cycle is completed in two separate phases, the first being the building stage. At this point the building of the technical architecture, database and programs are executed. During the second phase of stage 4, the system is tested using the established test scripts, and a comparison made of both the expected and the actual outcomes.
5. Implementation – At this point, the system is in place and used by the actual workforce. Training is provided to users to ensure the proper operation of the system. Appropriate user guides and manuals for troubleshooting and future training purposes are provided.
6. Evaluation – To ensure the system continues to run smoothly, this stage allows for periodic evaluations.
7. Maintenance– The importance of this stage becomes evident as the needs and goals of the organization change. At this point changes to enhance or strengthen may be implemented.
Website Design and Development
Website Design and Development encompasses many different skills and disciplines in the production and maintenance of websites. The different areas of web design include web graphic design; interface design; authoring, including standardized code and proprietary software; user experience design; and search engine optimization.
Server Hosting and Database Administration
A web hosting service is a type of Internet hosting service that allows individuals and organizations to make their website accessible via the World Wide Web. Web hosts are companies that provide space on a server owned or leased for use by clients, as well as providing Internet connectivity, typically in a data center.
Data Recovery and Disaster Preparedness
In computing, data recovery is a process of salvaging (retrieving) inaccessible, lost, corrupted, damaged or formatted data from secondary storage, removable media or files, when the data stored in them cannot be accessed in a normal way. The data is most often salvaged from storage media such as internal or external hard disk drives (HDDs), solid-state drives (SSDs), USB flash drives, magnetic tapes, CDs, DVDs, RAID subsystems, and other electronic devices.
Information Management and Data Warehousing
In computing, a data warehouse (DW or DWH), also known as an enterprise data warehouse (EDW), is a system used for reporting and data analysis, and is considered a core component of business intelligence. DWs are central repositories of integrated data from one or more disparate sources. They store current and historical data in one single place that are used for creating analytical reports for workers throughout the enterprise.[
The discipline whereby all of the information technology resources of a firm are managed in accordance with its needs and priorities. These resources may include tangible investments like computer hardware, software, data, networks and data center facilities, as well as the staff who are hired to maintain them.
Managing this responsibility within a company entails many of the basic management functions, like budgeting, staffing, change management, and organizing and controlling, along with other aspects that are unique to technology, like software design, network planning, tech support etc.[
Information Security Program
Information security (InfoSec) describes activities that relate to the protection of information and information infrastructure assets against the risks of loss, misuse, disclosure or damage.
Information security management (ISM) describes controls that an organization needs to implement to ensure that it is sensibly managing these risks.