Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of UK Essays.
Initially select the rational unified process development methodology .The unified process was development in main by joining together Jacobson’s use case modeling Booch’s object oriented methods and Rumbaya,s object Modeling Techniques (OMT) , Many other object- oriented methods also contributed to developing this process.
The goal at the rational Unified Process is to enable the production at highest quality software that meets end- user needs within predictable schedules and budgets. The Rational unified Process captures some of the best current software Development practices in a form that is tail arable for a wide range of projects and organization.
The Key characteristics of RUP
The Rational Unified processes in an iterative process. Built into the iterative approach is the flexibility to accommodate new requirements or tactical changes in business object.
The rational behind the rational unified process is focus on models. Rather than paper documents is to minimize the overhead associated with generating and maintaining documents and to minimize the relevant information content.
The Rational Unified Process place strong emphasis on building systems based on a through understand of how the delivered system will be used.
The Rational Unified Process supports object oriented techniques each model is object Rational Unified Process models are based on the concepts of objects and classes and the use the UML as its notation.
The Rational Unified Process configurable process although no single process suitable for all software development organizations. The Rational Unified Process is failorble and can be scaled to fit the needs of project ranging from small software development to large development organizations.
The Rational Unified Process encourage on going quality control and risk management.
Phases of RUP
The Rational Unified Process is structured along two dimensions
Time division of the life cycle into phases and iterations.
Process components- productions of specific set of artifacts with well defined activities.
Both dimensions must be taken in to account for a project to succeed.
Structuring a project along the time dimension involves the adoption of the following time based four phases.
Inception- specifying the project vision
Elaboration-planning the necessary activities and require resources specifying the features and designing the architecture.
Construction- building the product as a series of incremental iterations.
Transition-Supplying the product to the user community.
Structuring the project along the process component dimension include the following activities.
Business modeling the identification of desired system capabilities and user needs.
Requirements- a narration of the system vision along with a set of functional and non functional requirements.
Analysis and design a description of how the system will be realized in the implementation phase.
Implementation the production of the code that will result in an executable system.
Testing the verification of the entire system deployment the delivery of the system and user training to the customer.
Within each phase are a number of iterations. Iteration represents a complete development cycle form requirements capture in analysis to implementation & testing which result in the realse of an executable product constitutly a subset of the final project under development which then is grown incrementally form iteration to iteration becomes the final system.
Get help with your essay today
from our professional essay writers!
Visit www.ukessays.com to see how we can help you!
During the elaboration the focus turns towards analysis and design. In construction implementation is the control activity and transition centers on developments
Work breakdown structure
With refer to project proposal the entire work break down structure represent
With referenced to the project proposal entire project plan submitted using MS project
With respect to feasibility study in chaper2 the initial cost estimation carried out concerning three areas Total software cost , total hardware cost, total human laybour
Risk Identification in Inception Phase
Identification risk is one management tool in nine project management principles. therefore should be proper method assess unknown risk can be generate and impact of risk and prepare resist to the risk .mainly critical path activities will generate risk if one goes wrong that might effect to total project related wasting time money. Therefore to minimize the risk used contingency plan.
Given below is the few or risk associated with certain activities
Risk on requirement gathering and analysing identifying incorrect requirements out of scope
Risk associated in changing system architecture and technologies several times to fulfil additional requirement made by clients.
Risk of design incorrect architecture
Risk associated with reusing software component
Risk associate din poor project planning in time management and resources management
Risk associate with using open source tools to development process
Risk associate on hardware used for the project compatibility for requirements
After identifying risk it can be categorizes in to three risk namely project risk, product risk, business risk .To overcome risk and identify the proper solution use risk management process
List of potential risks
Prioritizes risk list
Risk avoidance and contingency plans
With related risk analysis concern about security risk as in order to identify possible risk caused as physically, from software to destroy information on database as follows
Place fire extinguishers that suitable for all type of fires in every floor especially near server rooms and check continuous time intervals
Place the server room as well equipment higher levels where the impact minimum
Locate back up server in separate location where earthquakes are minimise
To prevent risk place the servers remote locations
To prevent the risk can used security cameras and security guard with lock doors to server rooms
Used firewall protection, place intrusion detection system
Used strong encryption when transferring data through the system which difficult crack the encription using complex algorithm
Place co operate virus guard which consist of large virus database in order stand quarantine such a risk
Place hybrid intrusion detection system and used strong password policy
Cite This Work
To export a reference to this article please select a referencing stye below:
Related ServicesView all
DMCA / Removal Request
If you are the original writer of this essay and no longer wish to have the essay published on the UK Essays website then please.