Computing Technology and Software Development 1

Total Page:16

File Type:pdf, Size:1020Kb

Computing Technology and Software Development 1 Computing Technology and Software Development 1 • an Associate in Arts (A.A) degree** from a regionally accredited COMPUTING TECHNOLOGY institution with a minimum of 60 semester hours of course work and a 2.0 overall Grade Point Average (GPA), or AND SOFTWARE • an Associate in Science (A.S.) degree** in of the following areas: Computer Programming & Analysis, Computer Information DEVELOPMENT Technology, or Network Engineering Technology from a regionally accredited institution with a minimum of 60 semester hours of Bachelor of Applied Science in course work and a 2.0 overall Grade Point Average (GPA), or • at least 60 semester credit hours of college level course work Computing Technology and Software at a regionally accredited institution, including 15 credits that Development (CIP# 1101101034) are applicable to Valencia College’s General Education Program requirements, with a minimum of a 2.0 overall Grade Point The Bachelor of Applied Science in Computing Technology and Software Average (GPA) . Development provides students the opportunity to earn a degree which prepares students to analyze software problems, plans, and solutions *Course not offered at Valencia but will be accepted for admission if to design a logical plan for program requirements; implement software transferred from another Florida public institution solutions and communicate effectively in writing and orally regarding **Other Associate or higher degrees must be formally evaluated by the the solutions; demonstrate collaborative skills in team settings to plan Computing Technology Department for admission. and accomplish software solutions; and apply ethical concepts to design solutions. The curriculum emphasizes practical, real-world problems. Program Outcomes 1. Analyze software problems, plans, and solutions to design a logical Potential Careers plan for program requirements. • Software Developers 2. Implement software solutions and communicate effectively in writing • System Software Developers and orally regarding the solutions. • Computer and Information Systems Managers 3. Demonstrate collaborative skills in team settings to plan and • Computer Systems Analysts accomplish software solutions. Salary & Earnings Information 4. Apply ethical concepts to design solutions. For salary and wage information, visit: http://www.floridawages.com/. Students with an A.S. degree Students who have completed an Associate in Science (A.S.) degree from Contacts a regionally accredited institution must complete: For more information about the program or admission requirements, please contact Sarah Ashby, Program Computing Technology & Software Advisor, at [email protected] or 407-582-2404. Development Core Courses For the most up-to-date information, visit valenciacollege.edu/ BUL 2241 BUSINESS LAW I * 3 bachelordegrees (http://valenciacollege.edu/bachelordegrees/) or CGS 2091C SOCIAL, LEGAL AND ETHICAL ISSUES IN INFORMATION TECHNOLOGY ECO 2013 PRINCIPLES OF ECONOMICS-MACRO 3 Application Fee ENC 1102 FRESHMAN COMPOSITION II +*~ 3 There is no application fee for this program. GEB 1011 INTRODUCTION TO BUSINESS 1 3 SPC 1608 FUNDAMENTALS OF SPEECH ~ 3 or SPC 1017 INTERPERSONAL COMMUNICATION Admission Requirements +* STA 2023 STATISTICAL METHODS 3 Students must submit official transcripts from all prior colleges and Humanities See Gen. Ed. Institutional Requirements +~ 3 universities and must meet the following criteria: (GR) • Satisfactory completion of all State Common Program Prerequisites Math or Science See Gen. Ed. Requirements 3 with a grade of C or higher: CIS 3304C MANAGEMENT INFORMATION SYSTEMS 3 • COP 1000C or COP 2334*, and +* • CGS 2545C or COP 1540C*, and CEN 3024C SOFTWARE DEVELOPMENT I +* 3 • CTS 1134C or CET 2179C or CTS 1650*, and CEN 4025C SOFTWARE DEVELOPMENT II +* 3 • MAC 1105, MGF 1106, STA 2023 or higher level math. CEN 4333C ADVANCED DATABASE DEVELOPMENT +* 3 • Completion of one of the following: CEN 4802C SOFTWARE INTEGRATION, 3 CONFIGURATION, AND TESTING +* CEN 4910C SOFTWARE DEVELOPMENT PROJECT +* 3 2 Computing Technology and Software Development CEN 4930C SEMINAR IN ADVANCED SOFTWARE 3 +* Graduation Requirements: DEVELOPMENT In addition to completing the course requirements detailed in the ETI 4448C APPLIED PROJECT MANAGEMENT +* 3 curriculum in order to graduate, students must: CEN 3100C TECHNICAL WRITING AND 3 COMMUNICATION FOR SOFTWARE • Earn a minimum 2.0 Valencia College and Overall GPA. +* DEVELOPERS • Complete all Core course work with a minimum grade of C (2.0) in all Select One of the Following: 3 core courses. COP 3330C OBJECT ORIENTED PROGRAMMING +* • Satisfy Valencia’s 36 credit hour General Education requirements and COP 2805C ADVANCED JAVA PROGRAMMING +* Gordon Rule requirements unless you hold an Associate in Arts or Required upper division Software Development elective courses 6 Bachelor’s degree or have completed the entire general education (Choose from the list below or any upper division CEN or COP program at a regionally accredited institution. course. At least 3 credits must be with a CEN prefix) • Satisfy the civic literacy requirement. As per Florida Rule Total Credits 60 6A-10.04213*, prior to the award of an associate in arts or baccalaureate degree, students initially entering a Florida College Upper Division Electives System institution in the 2021-22 school year, and thereafter must demonstrate competency in civic literacy prior to graduation by: CEN 3942 INTERNSHIP IN COMPUTING 3-9 a. receiving a passing score on the Florida Civic Literacy Exam TECHNOLOGY & SOFTWARE (FCLE), and DEVELOPMENT +* b. successful completion of one of the following: CEN 4350C OPEN SOURCE WEB TECHNOLOGIES +* 3 • successfully passing POS 2041 U.S. GOVERNMENT or AMH 2020 CEN 4360C MOBILE DEVICE SOFTWARE 3 U.S. HISTORY 1877 TO PRESENT or DEVELOPMENT +* CEN 4370C .NET SOFTWARE DEVELOPMENT USING 3 • successfully passing a prescribed assessment: AP Government C# +* & Politics: United States Test** (passing score =3), or AP United CET 3464C SOFTWARE APPLICATIONS IN 3 States History Test** (passing score = 4)*, or CLEP American ENGINEERING TECHNOLOGY +* Government** (passing score = 50) * rule amendment expected approval Fall 2021 COP 3275C C/C++ PROGRAMMING FOR ENGINEERING 3 **receiving a passing score will satisfy both the FCLE and course TECHNOLOGY +* requirements. ETI 3116 QUALITY ASSURANCE WITH TESTING 3 +* METHODS • Complete at least 25% of the 120 credit hour degree program (30 ETS 3663 ENGINEERING MANAGEMENT AND 3 credits) at Valencia College, based upon the Florida College System's +* COMMUNICATION requirement of a 2+2 admission into the baccalaureate program. ACG 3024 ACCOUNTING THEORY AND PRACTICE +* 3 Fifteen of those hours must be 3000 or 4000 level courses from the FIN 3402 FINANCIAL ANALYSIS AND PLANNING +* 3 program course list. MAN 3240 PRINCIPLES OF ORGANIZATIONAL 3 • Submit an application for graduation through Atlas by the deadline BEHAVIOR +* date listed in the Academic Calendar in the online official catalog. The student must have at least the minimum number of college-level MAN 3353 MANAGEMENT THEORY AND PRACTICES 3 +* credits for the degree, including all courses currently registered, in order to submit a graduation application. MAN 4162 CUSTOMER RELATIONS FOR MANAGERS 3 +* • Fulfill all financial obligations to Valencia College. • Foreign Language: Successfully complete the Florida foreign MAR 3023 MARKETING MANAGEMENT +* 3 language requirement: two years high school or one year of college CEN 3727C USER INTERFACE AND USER EXPERIENCE 3 +* (at least eight credits) in a single foreign language. American Sign Language is acceptable. Foreign language taken at the college level +* CIS 3083C CLOUD MANAGEMENT AND DESIGN 3 does not satisfy the General Education credits. • Satisfy the civic literacy requirement. As per Florida Rule + This course must be completed with a grade of C or better 6A-10.04213, Prior to the award of an associate in arts or * This course has a prerequisite: check description in Valencia baccalaureate degree, first-time-in-college students entering a Florida catalog. College System institution in the 2018-19 school year, and thereafter ~ This is a general education course. must demonstrate competency in civic literacy through one of the (GR) Denotes Gordon Rule course. following options prior to graduation: 1 (To fulfill this requirement, students with GEB 1011 are advised to • successfully passing POS 2041 U.S. take any GEB, MAN, MNA, MKA, ACG, CGS, CIS, COP, CTS, or COT GOVERNMENT. or AMH 2020 U.S. HISTORY 1877 TO PRESENT or course, or a CET course with program chair approval, or any upper • successfully passing a prescribed assessment: AP Government & division BASCTSD elective.) Politics Test (passing score =3, or AP U.S. History Test (passing score = 4), or CLEP American Government (passing score = 50). Total Semester Credits required – 120 credit hours in addition to completing the Foreign Language Requirement above. The credit Computing Technology and Software Development 3 courses required may vary depending on the credits the student brings Required upper division Software Development elective courses 6 to the BAS program. Additional courses to complete the required 120 (Choose from the list below or any upper division CEN or COP credit hours for graduation must apply to the degree and be approved by course. At least 3 credits must be with a CEN prefix) an advisor. Total Credits 60 Students who have completed core courses prior to entering the BAS Upper Division Electives program may substitute
Recommended publications
  • Software Development Career Pathway
    Career Exploration Guide Software Development Career Pathway Information Technology Career Cluster For more information about NYC Career and Technical Education, visit: www.cte.nyc Summer 2018 Getting Started What is software? What Types of Software Can You Develop? Computers and other smart devices are made up of Software includes operating systems—like Windows, Web applications are websites that allow users to contact management system, and PeopleSoft, a hardware and software. Hardware includes all of the Apple, and Google Android—and the applications check email, share documents, and shop online, human resources information system. physical parts of a device, like the power supply, that run on them— like word processors and games. among other things. Users access them with a Mobile applications are programs that can be data storage, and microprocessors. Software contains Software applications can be run directly from a connection to the Internet through a web browser accessed directly through mobile devices like smart instructions that are stored and run by the hardware. device or through a connection to the Internet. like Firefox, Chrome, or Safari. Web browsers are phones and tablets. Many mobile applications have Other names for software are programs or applications. the platforms people use to find, retrieve, and web-based counterparts. display information online. Web browsers are applications too. Desktop applications are programs that are stored on and accessed from a computer or laptop, like Enterprise software are off-the-shelf applications What is Software Development? word processors and spreadsheets. that are customized to the needs of businesses. Popular examples include Salesforce, a customer Software development is the design and creation of Quality Testers test the application to make sure software and is usually done by a team of people.
    [Show full text]
  • Object Oriented Programming
    No. 52 March-A pril'1990 $3.95 T H E M TEe H CAL J 0 URN A L COPIA Object Oriented Programming First it was BASIC, then it was structures, now it's objects. C++ afi<;ionados feel, of course, that objects are so powerful, so encompassing that anything could be so defined. I hope they're not placing bets, because if they are, money's no object. C++ 2.0 page 8 An objective view of the newest C++. Training A Neural Network Now that you have a neural network what do you do with it? Part two of a fascinating series. Debugging C page 21 Pointers Using MEM Keep C fro111 (C)rashing your system. An AT Keyboard Interface Use an AT keyboard with your latest project. And More ... Understanding Logic Families EPROM Programming Speeding Up Your AT Keyboard ((CHAOS MADE TO ORDER~ Explore the Magnificent and Infinite World of Fractals with FRAC LS™ AN ELECTRONIC KALEIDOSCOPE OF NATURES GEOMETRYTM With FracTools, you can modify and play with any of the included images, or easily create new ones by marking a region in an existing image or entering the coordinates directly. Filter out areas of the display, change colors in any area, and animate the fractal to create gorgeous and mesmerizing images. Special effects include Strobe, Kaleidoscope, Stained Glass, Horizontal, Vertical and Diagonal Panning, and Mouse Movies. The most spectacular application is the creation of self-running Slide Shows. Include any PCX file from any of the popular "paint" programs. FracTools also includes a Slide Show Programming Language, to bring a higher degree of control to your shows.
    [Show full text]
  • FUNDAMENTALS of COMPUTING (2019-20) COURSE CODE: 5023 502800CH (Grade 7 for ½ High School Credit) 502900CH (Grade 8 for ½ High School Credit)
    EXPLORING COMPUTER SCIENCE NEW NAME: FUNDAMENTALS OF COMPUTING (2019-20) COURSE CODE: 5023 502800CH (grade 7 for ½ high school credit) 502900CH (grade 8 for ½ high school credit) COURSE DESCRIPTION: Fundamentals of Computing is designed to introduce students to the field of computer science through an exploration of engaging and accessible topics. Through creativity and innovation, students will use critical thinking and problem solving skills to implement projects that are relevant to students’ lives. They will create a variety of computing artifacts while collaborating in teams. Students will gain a fundamental understanding of the history and operation of computers, programming, and web design. Students will also be introduced to computing careers and will examine societal and ethical issues of computing. OBJECTIVE: Given the necessary equipment, software, supplies, and facilities, the student will be able to successfully complete the following core standards for courses that grant one unit of credit. RECOMMENDED GRADE LEVELS: 9-12 (Preference 9-10) COURSE CREDIT: 1 unit (120 hours) COMPUTER REQUIREMENTS: One computer per student with Internet access RESOURCES: See attached Resource List A. SAFETY Effective professionals know the academic subject matter, including safety as required for proficiency within their area. They will use this knowledge as needed in their role. The following accountability criteria are considered essential for students in any program of study. 1. Review school safety policies and procedures. 2. Review classroom safety rules and procedures. 3. Review safety procedures for using equipment in the classroom. 4. Identify major causes of work-related accidents in office environments. 5. Demonstrate safety skills in an office/work environment.
    [Show full text]
  • 2015 State of the Software Supply Chain Report: HIDDEN SPEED BUMPS on the ROAD to “CONTINUOUS”
    2015 State of the Software Supply Chain Report: HIDDEN SPEED BUMPS ON THE ROAD TO “CONTINUOUS” Foreword by Gene Kim, Gareth Rushgrove, John Willis, Jez Humble, and Nigel Simpson RESEARCH REPORT TABLE OF CONTENTS Foreword . 3 Introduction . 5 Why All Modern Software Development Relies on a Software Supply Chain . 6 SUPPLIERS: Open Source Projects . 7 Public Repositories (The Warehouses) . 8 Choosing the Best Suppliers (Sourcing) . .. 9 PARTS: Open Source Components . 12 Repository Management (Local Warehouses) . 15 MANUFACTURERS: Assembled Software Development . 19 Technical Debt: Assembly Line Inefficiencies . .. 21 FINISHED GOODS: Software Applications . 22 The Volume of Elective Re-work and Risk . 22 Software Bill of Materials . 23 Quality Controls: OWASP, PCI, FS-ISAC, U .S . Congress . 23 Lessons Learned from Traditional Manufacturing Supply Chains . 25 Automation: How To Improve Software Supply Chains . 26 Appendix . 28 Figure 1: The Volume and Size of the Global Software Supply Chain Figure 2: Target Benchmarks for Software Supply Chain Practices - Quality Control Figure 3: Target Benchmarks for Software Supply Chain Practices - Efficient Distribution Figure 4: Analysis of Components Used within Applications Figure 5: Multiple Versions of Parts Often Downloaded by the Largest Development Teams Figure 6: Volume of Defective Parts Used Figure 7: Comparison of Impact of Supply Chain Complexity on Prius versus Volt Figure 8: Efficient Sourcing Practices By Manufacturers 2015 State of the Software Supply Chain Report: Hidden Speed Bumps on the Road to “Continuous” Page 2 FOREWORD Gene Kim, Co-author of “The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win” and upcoming “DevOps Cookbook” “Anyone who believes, as I do, that we can learn valuable lessons from manufacturing and supply chains on how to better manage technology work will love this report .
    [Show full text]
  • Top 10 Reasons to Major in Computing
    Top 10 Reasons to Major in Computing 1. Computing is part of everything we do! Computing and computer technology are part of just about everything that touches our lives from the cars we drive, to the movies we watch, to the ways businesses and governments deal with us. Understanding different dimensions of computing is part of the necessary skill set for an educated person in the 21st century. Whether you want to be a scientist, develop the latest killer application, or just know what it really means when someone says “the computer made a mistake”, studying computing will provide you with valuable knowledge. 2. Expertise in computing enables you to solve complex, challenging problems. Computing is a discipline that offers rewarding and challenging possibilities for a wide range of people regardless of their range of interests. Computing requires and develops capabilities in solving deep, multidimensional problems requiring imagination and sensitivity to a variety of concerns. 3. Computing enables you to make a positive difference in the world. Computing drives innovation in the sciences (human genome project, AIDS vaccine research, environmental monitoring and protection just to mention a few), and also in engineering, business, entertainment and education. If you want to make a positive difference in the world, study computing. 4. Computing offers many types of lucrative careers. Computing jobs are among the highest paid and have the highest job satisfaction. Computing is very often associated with innovation, and developments in computing tend to drive it. This, in turn, is the key to national competitiveness. The possibilities for future developments are expected to be even greater than they have been in the past.
    [Show full text]
  • College of Fine and Applied Arts Annual Meeting 5:00P.M.; Tuesday, April 5, 2011 Temple Buell Architecture Gallery, Architecture Building
    COLLEGE OF FINE AND APPLIED ARTS ANNUAL MEETING 5:00P.M.; TUESDAY, APRIL 5, 2011 TEMPLE BUELL ARCHITECTURE GALLERY, ARCHITECTURE BUILDING AGENDA 1. Welcome: Robert Graves, Dean 2. Approval of April 5, 2010 draft Annual Meeting Minutes (ATTACHMENT A) 3. Administrative Reports and Dean’s Report 4. Action Items – need motion to approve (ATTACHMENT B) Nominations for Standing Committees a. Courses and Curricula b. Elections and Credentials c. Library 5. Unit Reports 6. Academic Professional Award for Excellence and Faculty Awards for Excellence (ATTACHMENT C) 7. College Summary Data (Available on FAA Web site after meeting) a. Sabbatical Requests (ATTACHMENT D) b. Dean’s Special Grant Awards (ATTACHMENT E) c. Creative Research Awards (ATTACHMENT F) d. Student Scholarships/Enrollment (ATTACHMENT G) e. Kate Neal Kinley Memorial Fellowship (ATTACHMENT H) f. Retirements (ATTACHMENT I) g. Notable Achievements (ATTACHMENT J) h. College Committee Reports (ATTACHMENT K) 8. Other Business and Open Discussion 9. Adjournment Please join your colleagues for refreshments and conversation after the meeting in the Temple Buell Architecture Gallery, Architecture Building ATTACHMENT A ANNUAL MEETING MINUTES COLLEGE OF FINE AND APPLIED ARTS 5:00P.M.; MONDAY, APRIL 5, 2010 FESTIVAL FOYER, KRANNERT CENTER FOR THE PERFORMING ARTS 1. Welcome: Robert Graves, Dean Dean Robert Graves described the difficulties that the College faced in AY 2009-2010. Even during the past five years, when the economy was in better shape than it is now, it had become increasingly clear that the College did not have funds or personnel sufficient to accomplish comfortably all the activities it currently undertakes. In view of these challenges, the College leadership began a process of re- examination in an effort to find economies of scale, explore new collaborations, and spur creative thinking and cooperation.
    [Show full text]
  • Open Dissertation Draft Revised Final.Pdf
    The Pennsylvania State University The Graduate School ICT AND STEM EDUCATION AT THE COLONIAL BORDER: A POSTCOLONIAL COMPUTING PERSPECTIVE OF INDIGENOUS CULTURAL INTEGRATION INTO ICT AND STEM OUTREACH IN BRITISH COLUMBIA A Dissertation in Information Sciences and Technology by Richard Canevez © 2020 Richard Canevez Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy December 2020 ii The dissertation of Richard Canevez was reviewed and approved by the following: Carleen Maitland Associate Professor of Information Sciences and Technology Dissertation Advisor Chair of Committee Daniel Susser Assistant Professor of Information Sciences and Technology and Philosophy Lynette (Kvasny) Yarger Associate Professor of Information Sciences and Technology Craig Campbell Assistant Teaching Professor of Education (Lifelong Learning and Adult Education) Mary Beth Rosson Professor of Information Sciences and Technology Director of Graduate Programs iii ABSTRACT Information and communication technologies (ICTs) have achieved a global reach, particularly in social groups within the ‘Global North,’ such as those within the province of British Columbia (BC), Canada. It has produced the need for a computing workforce, and increasingly, diversity is becoming an integral aspect of that workforce. Today, educational outreach programs with ICT components that are extending education to Indigenous communities in BC are charting a new direction in crossing the cultural barrier in education by tailoring their curricula to distinct Indigenous cultures, commonly within broader science, technology, engineering, and mathematics (STEM) initiatives. These efforts require examination, as they integrate Indigenous cultural material and guidance into what has been a largely Euro-Western-centric domain of education. Postcolonial computing theory provides a lens through which this integration can be investigated, connecting technological development and education disciplines within the parallel goals of cross-cultural, cross-colonial humanitarian development.
    [Show full text]
  • From Ethnomathematics to Ethnocomputing
    1 Bill Babbitt, Dan Lyles, and Ron Eglash. “From Ethnomathematics to Ethnocomputing: indigenous algorithms in traditional context and contemporary simulation.” 205-220 in Alternative forms of knowing in mathematics: Celebrations of Diversity of Mathematical Practices, ed Swapna Mukhopadhyay and Wolff- Michael Roth, Rotterdam: Sense Publishers 2012. From Ethnomathematics to Ethnocomputing: indigenous algorithms in traditional context and contemporary simulation 1. Introduction Ethnomathematics faces two challenges: first, it must investigate the mathematical ideas in cultural practices that are often assumed to be unrelated to math. Second, even if we are successful in finding this previously unrecognized mathematics, applying this to children’s education may be difficult. In this essay, we will describe the use of computational media to help address both of these challenges. We refer to this approach as “ethnocomputing.” As noted by Rosa and Orey (2010), modeling is an essential tool for ethnomathematics. But when we create a model for a cultural artifact or practice, it is hard to know if we are capturing the right aspects; whether the model is accurately reflecting the mathematical ideas or practices of the artisan who made it, or imposing mathematical content external to the indigenous cognitive repertoire. If I find a village in which there is a chain hanging from posts, I can model that chain as a catenary curve. But I cannot attribute the knowledge of the catenary equation to the people who live in the village, just on the basis of that chain. Computational models are useful not only because they can simulate patterns, but also because they can provide insight into this crucial question of epistemological status.
    [Show full text]
  • Secure Database Development
    Secure Database Development Jan Jurjens (1) and Eduardo B. Fernandez (2) (1) Computing Department, The Open University, Milton Keynes, MK7 8LA GB http://www.jurjens.de/jan (2) Dept. of Computer Science, Florida Atlantic University, Boca Raton, FL 33431, USA http://www.cse.fau.edu/~ed Synonyms Secure DBMS development, secure database design DEFINITION This entry considers how to build secure database system software. In particular, it describes how to build a general-purpose database management system where security is an important design parameter. For the database community the words secure database design may refer to the schema design to produce a database for a specific application with some level of security properties. There is a large amount of literature on this latter subject and a related section in this encyclopedia (Database security). This section concentrates mostly on how to build the software of a DBMS such that it exhibits security properties, which is called secure database development. Both approaches are contrasted so that the reader can decide which one of these problems applies to her specific case but more space is dedicated to the general secure database development problem. HISTORICAL BACKGROUND While there is a large number of papers on security models including authorization and other security aspects of databases [2, 4, 6], there is little work on how to implement a secure Database Management System (DBMS). It is true that many proposals for secure multilevel databases include details of implementation but most of them are ad hoc architectures that cannot be generalized to databases using different models or even to other multilevel databases with different requirements.
    [Show full text]
  • Chapter 3 Software Design
    CHAPTER 3 SOFTWARE DESIGN Guy Tremblay Département d’informatique Université du Québec à Montréal C.P. 8888, Succ. Centre-Ville Montréal, Québec, Canada, H3C 3P8 [email protected] Table of Contents references” with a reasonably limited number of entries. Satisfying this requirement meant, sadly, that not all 1. Introduction..................................................................1 interesting references could be included in the recom- 2. Definition of Software Design .....................................1 mended references list, thus the list of further readings. 3. Breakdown of Topics for Software Design..................2 2. DEFINITION OF SOFTWARE DESIGN 4. Breakdown Rationale...................................................7 According to the IEEE definition [IEE90], design is both 5. Matrix of Topics vs. Reference Material .....................8 “the process of defining the architecture, components, 6. Recommended References for Software Design........10 interfaces, and other characteristics of a system or component” and “the result of [that] process”. Viewed as a Appendix A – List of Further Readings.............................13 process, software design is the activity, within the software development life cycle, where software requirements are Appendix B – References Used to Write and Justify the analyzed in order to produce a description of the internal Knowledge Area Description ....................................16 structure and organization of the system that will serve as the basis for its construction. More precisely, a software design (the result) must describe the architecture of the 1. INTRODUCTION system, that is, how the system is decomposed and This chapter presents a description of the Software Design organized into components and must describe the interfaces knowledge area for the Guide to the SWEBOK (Stone Man between these components. It must also describe these version).
    [Show full text]
  • Cloud Computing and E-Commerce in Small and Medium Enterprises (SME’S): the Benefits, Challenges
    International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Cloud Computing and E-commerce in Small and Medium Enterprises (SME’s): the Benefits, Challenges Samer Jamal Abdulkader1, Abdallah Mohammad Abualkishik2 1, 2 Universiti Tenaga Nasional, College of Graduate Studies, Jalan IKRAM-UNITEN, 43000 Kajang, Selangor, Malaysia Abstract: Nowadays the term of cloud computing is become widespread. Cloud computing can solve many problems that faced by Small and medium enterprises (SME’s) in term of cost-effectiveness, security-effectiveness, availability and IT-resources (hardware, software and services). E-commerce in Small and medium enterprises (SME’s) is need to serve the customers a good services to satisfy their customers and give them good profits. These enterprises faced many issues and challenges in their business like lake of resources, security and high implementation cost and so on. This paper illustrate the literature review of the benefits can be serve by cloud computing and the issues and challenges that E-commerce Small and medium enterprises (SME’s) faced, and how cloud computing can solve these issues. This paper also presents the methodology that will be used to gather data to see how far the cloud computing has influenced the E-commerce small and medium enterprises in Jordan. Keywords: Cloud computing, E-commerce, SME’s. 1. Introduction applications, and services) that can be rapidly provisioned and released with minimal management effort or service Information technology (IT) is playing an important role in provider interaction.” [7]. From the definition of NIST there the business work way, like how to create the products, are four main services classified as cloud services which are; services to the enterprise customers [1].
    [Show full text]
  • Software Development Life Cycle (SDLC)
    Software Development Life Cycle (SDLC) • Architecture of Software Development Life Cycle Pipelines, on page 1 • Management VPC SDLC Pipeline, on page 3 • Customer VPC SDLC Pipeline, on page 4 • Code Analysis Reporting, on page 5 Architecture of Software Development Life Cycle Pipelines There are two Cisco SD-WAN for government Software Development Life Cycle (SDLC) pipelines: • Cisco vOrchestrator and Cisco vMonitor SDLC pipeline: The SDLC pipeline used to develop and deploy control components in the Amazon management VPC. • Cisco SD-WAN controllers and Cisco vManage SDLC pipeline: The SDLC pipeline used to develop and deploy control components in the Amazon customer VPC. Software Development Life Cycle (SDLC) 1 Software Development Life Cycle (SDLC) Architecture of Software Development Life Cycle Pipelines Figure 1: Cisco vOrchestrator and Cisco vMonitor SDLC pipeline Figure 2: Cisco SD-WAN Continuous Integration and Continuous Delivery Pipeline Software Development Life Cycle (SDLC) 2 Software Development Life Cycle (SDLC) Management VPC SDLC Pipeline Management VPC SDLC Pipeline Before the images are built and deployed to Cisco SD-WAN for government, the code is first analyzed. After analysis, the code is pushed to a development server in the Cisco DMZ network. The management VPC SDLC pipeline does the following: Checks for Regressions and Analysis of Code To check for regressions and analyze code, Cisco has created the following automated pipeline: 1. Jenkins pulls the code locally from Cisco's Git server. 2. Jenkins (open-source automation tool) securely copies the code to the development server using the scp (secure copy) utility. 3. On the development server, robot regressions are triggered.
    [Show full text]