Posts

Showing posts from January 20, 2013

Unattended Fuel Pump System

Using techniques suggesting in the text,  create a document that identifies user requirements for ONE of the following functions. 
An unattended petrol (gas) pump system that includes a credit card reader.  the customer swipes the card through the reader then specifies the amount of feel required. the fuel is delivered and the customer's account is debited. The cash-dispensing function in a bank ATMThe spelling-check and correcting function in a word processor.

Please download my article from Google Drive: https://docs.google.com/file/d/0BwDOMMh5fpHJcWFOcHJCOVJjaTQ/edit

These are articles from my masters in software engineering classes. 
Elad Shalom,
CTO at ITweetLive.com

Project Software and Identifying Stakeholders

Problems in Collecting Project Software and Identifying Stakeholders

Key stakeholders in any project are really the key to the successful management and valuing a software collecting project. At time stakeholders are left out of the project both in recognizing and utilizing. A stakeholder’s role is difficult to understand and this may cause the neglect. Stakeholders in a project can be individuals who are directly or indirectly impacted by the project itself. Stake holders should be involved in the collecting process by using regular communications. Examples of individual stakeholders can be the owner of the software being used, the developers around the software and those who have bought into the project (Brugger, 2010).
There are group stakeholders that may be external or internal. A software development team who develops software for different departments is an internal stakeholder.If software being collected is to be commercialized, the pubic becomes an external stakeholder and may b…

Feasibility Study

When determining the feasibility of a software product, we take into account such system elements as hardware, software, and people. Discuss some other elements that need to be taken into account in a computer-based systems.
Computer-Based Systems Essential Elements
There are six basic components of a computer-based system. These are the hardware, software, people used to run the system, the data that is the heart of the system and the procedures that run the system. The final component is communication. Hardware is the physical component of a computer system. This includes the hard drive, motherboard, the additional drives and the components that actually make the system run. Software is the instructions given to a computer- based information system that tells the hardware how to perform.
People are required to operate the system, create and use the software, choose how to apply the software and physically develop the computer based system. Without people there would be no need for …

Protecting Personal Data

Protecting personal data can be overwhelming, but it is not impossible. There are highly secure tools both online and offline to protect personal data. Shielding personal data can be logical, highly secure as well as inexpensive.
Protecting Personal Data Offline Physically lock your financial records and personal documents in a safe place in your home. Purchase an inexpensive fire-proof safe that can be stored in a secure closet, built in your floor or wall. A good fireproof safe costs from $100 to $3000 (Sears, 2013). Protect your wallet and or purse in a desk drawer at work. Limit what you carry when you go out. Never keep your social security card in your wallet; lock it up.
When filling out forms in the workplace, the doctor’s office, or your child’s school ask how your information will be safeguarded. If you do not have to fill out every little detail of your life, leave that portion blank. Ask for the consequences of not providing specific information.
Shred old receipts, insurance…

Privacy Laws The United States and Globally

Research laws regarding privacy and data protection in your country and tell us about them. How do they compare to those in other parts of the world?