Tuesday, May 5, 2020

Testing Process Scenario

Questions: Task 1 The initial part of your proposal should describe the scenario and how your solution applies to the problem. It should specify the overall system to meet the stated requirement.Provide a detailed specification of your solution, including costing and sources. Costing should be researched (for a UK sourcing). It should specify the machine components or sub-systems appropriate to the requirement. Task 2 Describe a testing process to ensure that important specifications and characteristics are met. It should also evaluate the performance of the proposed systemDescribe the Software solution as an overall integrated system, from the organisations point of view, and how it would typically work in practice. It should compare currently available operating systems and suggest how these can be customised. Task 3 A test plan document. This explains your strategy for testing of the hardware and software components before installation.User documentation. This is like an office IT instruction sheet for all staff and users to read. It explains to the user how to use the system.A security policy for your solution. This is your suggested strategy for ensuring system-wide security.A Health and Safety document for the use of the organisation. It should also demonstrate that the system meets health and safety requirements. Answers: 1. Introduction The higher management of Creative Developer Limited is aimed at expanding their business in the near future: this report contains the details of the hardware and software solutions that have been proposed to facilitate the solution. In section 2 (task 1) of the report, the proposed solution along, with its system specifications have been provided. In section 3 (task 2), the process for testing the hardware solution has been discussed along a discussion on various Operating Systems and the software solution that has been proposed. The test plans, the user documentation, the health and security plans and the system security policies to be implemented in the organization have been provided in section 4 of the report. 2.Task 1: Background of the project a.The scenario and the systems solution The organization being considered, Creative Developer Limited or the CDL, is an established software application and web development organization. It had been operating at the Stratford region of London. A current market research undertaken by the representatives of the organization indicate that the number of customers to whom they could serve is increasing steadily (Patterson and Hennessy 2013). The higher management of the organization is thus of the opinion that improving the infrastructure of the organization would help them to optimize the processes of catering to the requirements of target customers (Siewiorek and Swarz 2014). At present, the organization employs 2 developers who design software applications, one designer for the development of graphics applications, 4 developers having expertise in web development and three other developers who are employed for performing miscellaneous development activities. In order to meet the requirements of the organization, the following solutions are being recommended to the management of Creative Developer Limited: Development of an official website or web-portal through which the target customers would be able to communicate with the representatives of the organizations (Patterson and Hennessy 2013). The utilization of cloud based platforms for facilitating the access to application suites useful for the development of software and the web based applications (Wolf 2012). The implementation of a network of the computer system that would be used for the operational activities of the organization, ore specifically for the purpose of graphics designing and development of software and web developments (Siewiorek and Swarz 2014). The website that has been recommended to be implemented in the organization would facilitate the process of branding and promoting the services that Creative Developer Limited is capable of providing to the customers (Sekanina 2012). The website would also allow the representatives of the organization to communicate with their customers, besides providing information on those application or software solutions that have been developed for their customers previously (Hoffmann, Hoffmann and Sllner 2013). On the other hand, the cloud based development platform would allow the designers to gain access to cloud based application development tools, besides facilitating the storage of the designed modules. The utilization of cloud based developmental tools would be useful in reducing a number of investments that the management would have to make for the procurement of such applications, as cloud based platforms allow the users to gain access to such resources on a shared basis and pay as per usage. The cloud based storage would also allow the employees to gain access to files from anywhere and anytime: thus escalating the development process (Wolf 2012). Last but not the least, the development of the network of hi-tech computer devices would increase the efficiency of the operational activities of the organization, along with the inter-organizational communication process. b. Systems specification of the solution being provided The following hardware and software solutions are being recommended to the higher management of Creative Developer Limited: b. i. The hardware devices We recommend the Packard Bell OneTwo M D6020uk All-in-one PC, having a sleek and sophistic design, to be installed in Creative Developer Limited. This desktop personal computer is installed with the latest Windows 7 Operating software and would be easier to install in the office cubicles as the model has been specifically designed for fitting into small desk spaces (Mller and Paul 2013). The specifications of this desktop PC have been provided in the following section: The Microprocessor Type of processor Intel Pentium Dual-Core T4300 processor Memory Clock Speed (RAM) 800MHz FSB (Computerhope.com 2016). L2 Cache 2MB (Encarnacao, Lindner and Schlechtendahl 2012). Chipset Intel Graphics Media Accelerator 4500 M Clock Speed (Processor) 2.1GHz The Screen Size 20 inch Screen resolution 1600x900 Technology TOUCH PANEL Contrast ratio: 1000:1 (Computerhope.com 2016). The Sound system Type Integrated on the PCI Slot ( that is the motherboard) Speaker Type Stereo speakers The Memory Type Capacity: 3GB, DDR2 memory (Encarnacao, Lindner and Schlechtendahl 2012). (RAM) 800MHz FSB The Hard Drive 1 TB Hard Drive HDD rotation speed (Manna and Pnueli, 2012). 7200rpm, Type: SATA The Operating System The preloaded Genuine Windows 7 (Hatley and Pirbhai 2013). Operating System type 64-bits The Peripherals a. DVD Rewriter b. Built-in wireless (802.11b/g/n) c. Integrated Graphics d. Digital TV Tuner (Hatley and Pirbhai 2013). Card reader 5 in 1 ( supports :,SD, xD, SD HC, MS Pro,MS, MMC) Optical drive TRAY SUPER MULTI DVDRW (Siewiorek and Swarz 2014). At present, the market price of this hardware would be around 379.00 (Packard Bell 2016). This particular hardware set has been recommended as the hardware specifications of the machine indicate that the software applications required for the operational activities of the organization would be well supported. Besides this, the manufactures have incorporated enough RAM facility to run the basic web application development tools like that of Adobe Photoshop, Microsoft Visio, and Dreamweaver. b. ii. The cloud based development platform Several cloud platforms are available these days which can be used solely for the purpose developing software applications (Valilai and Houshmand 2013). Utilizing such tools do not require any particular hardware specification and the costs of these services vary greatly based on the products being used and the extent of usage. b. iii. The web-portal The system specification of the website that would be designed for Creative Developer Limited has been provided in the following table: At present, developing an efficient website containing the above mentioned features would require an investment of around 35,000 approximately.b. iii. The web based communication toolIn this section of the report, the system specifications, that is, the features and utilities of the web based communication tool, have been discussed in brief. The features have been decided based on the requirements of the client and include the following: Supported by all leading Operating Systems, like that of Windows, iPhone, Android, etc. Designed for supporting instant messaging and video calling features (Biltoftà ¢Ã¢â€š ¬Ã‚ Jensen et al. 2014). Would support group and point to point conference calls. Designed for cumulative call transfer facilities (Dmoz.org 2016). Would provide access to all local contacts instantly and contact lists would be updated with new contacts automatically (Linsley 2014). It is expected that the development of the customized web application tool and its installation in the computing devices utilized by the employees of Creative Developer Limited would cost 10000.00 approximately.3. Task 2:a. Testing process for the hardware systemIn this section of the report, we provide the details of the testing procedures that should be utilized to estimate the efficiency of the designed system before it is commissioned.It is worth mentioning that the testing process should be conducted before finalizing the vendor and the model of the computing devices to be installed in an organization. Besides this, the availability of the specific requirements of the client helps in estimating the efficiency of any ICT system supported by the said hardware system (Maddox 2015).In general, the following testing processes are utilized for hardware testing:Physical inspection: The physical inspection of the hardware systems should include an inspection of the following features (N eumann 2011):The quality of the construction of the machines: The computing devices that are being provided to the employees of Creative Developer Limited should be of strong and solid build, such that they able to withstand the high usage to be made (Brjesson and Feldt 2012 ). Thus, the quality of the construction of the hardware products, including the placement of the various switches and ports should be checked (Polian 2014).The physical design: The design and the layout of the machines need to be through tested in order to make sure that the following systems are well designed and built:the airflow and the cooling systems (Gross, Fraser and Zeller 2012 ).The condition of the switches, pins, jacks and ports included in the hardware setup (Leigh et al. 2014).iii. The built, design and the rigidity of the cases (Kolawa et al. 2013).The fitting of the various subparts (Raman 2012).the ease with which the various parts of the machines can be replaced during the servicing process: as for example, unscrewing and re-screwing a large number of tiny bolts would essentially slow down the servicing process when a large number of machine parts need to be replaced. Thus, models having such specifications should not be considered by the IT team of Creative Developer Limited (Brjesson and Feldt 2012 ).Last but not the least the power supply components of the computer hardware need to be checked for their efficiency and quality(Spichkova, Schmidt and Peake 2014).Testing using software: Apart from the above mentioned physical testing process, invoking software base stress testing is also encouraged so as to detect the faulty hardware systems (Kuo, Chien, and Kim 2013). Several software bundles are available on the market that can be utilized for stress testing various hardware components, like that of Prime95 for stress testing CPUs, MemTest86+ for testing the RAM, FurMark for testing the GPU and so on and so forth ( Feitelson 2015).b. The software solutionIn this section of the report, we provide the details of the software solutions that are being designed for the Creative Developer Limited so as to assist them in their business expansion.i. The software system being developedIn order to assist Creative Developer Limited to expand their business and cater to the requirements of the ever increasing customer base, we have emphasized on the processes which would be utilized for communicating with the said clients (Wang and Tao 2012). Thus, it has been decided that an efficient official website of the organization would be developed, which would help the process of marketing and branding for the organization (Valacich 2012 ). Information regarding the services offered by the Creative Developer Limited and glimpses of the products that have been custom made for other clients. Customers would also be able to communicate with the representatives of the organization and those who express their interests in using the facilities, would be encouraged to creat e customer profiles by submitting their personal details on the portal (Johnson 2015 ). These customer profiles would eventually lead to the generation of unique customer ids which in turn would facilitate the process of post sales customer services.Besides this, a web based communication tool would be custom designed for Creative Developer Limited. It has already been mentioned that the customer base to which the organization could provide services to is steadily increasing and that the organization has plans for future expansions. Thus, the web based communication tool would facilitate collaborative work between teams located in separate locations (Wheeler 2013). Thus, it can be said that the proposed software system would only help the organization to cater to the needs of their newly found customers by would also help the employees through the application development processes.ii. Currently available operating systemsAt present, the following types of operating systems are readi ly available in the market.Real time operating systems: A RTOS or real time operating system that has been custom designed to support applications that generate data in real time (Lister 2013). Needles to say, these multitasking operating systems are suitable for supporting embedded systems like devices used for controlling household appliances, programmable thermostats, robots used in various industries, equipment utilized in scientific research, etc.Examples of a real time operating system are VxWorks, RTLinux, QNX,etc.Single User, Single Tasking Operating Systems: As the name suggest, such operating systems allow a single task from a single user to run at a time. The operating systems installed in the palm held devices are examples of single user single tasking OS ( Tsichritzis and Bernstein 2014).Single User, Multi Tasking Operating Systems:As suggested by the description of the OS, such operating systems allow several applications from a single user to run simultaneously. Most of the computing devices and the laptops that awe use today run on such Operating Systems (Stallings 2013).The Microsoft built Windows OS; Mac built OS X, and Linux are some of the most commonly used Single User Multi Tasking Operating Systems ( Tsichritzis and Bernstein 2014).Multi user operating system:A multi user OS allows various applications from numerous users to operate simultaneously. The OS itself makes sure that resources demanded by these applications are available and schedules them accordingly (Hansen 2013).Unix servers are the most commonly utilized Multi user operating systems.As mentioned in Task 1, the application utilized by the employees of Creative Developer Limited would be well supported by Windows 7: thus, this particular OS would be utilized. However, it is worth mentioning that most of the single multi tasking operating system allow the users to perform a wide range of customization and personalization: a facility that is not available with the other types of OSs (Lister 2013).4. Task 3:a. The test plans document In this section of the report, we provide a brief description of the various tests that have to be performed before the hardware and software systems are incorporated into the operational activities of Creative Developer Limited.Testing the hardware:Tests should be conducted so as to make sure that the operating system boots properly and that the OS provides a smooth run (Chupilko 2012).The applications like Adobe Photoshop and Dreamweaver are considered to be RAM hungry applications: thus simultaneous utilization of these applications would be useful in assessing the quality of the RAM (Ece.uprm.edu 2016).Writing and compiling codes in the above mentioned applications, besides making attempts to upload or down load information from the internet and utilizing the FTP services, would be helpful in testing the efficiency of the processor (Hardware Software Co-Design for JPEG Encoder Test Bench 2012). The computer hardware being tested could be considered to be highly efficient if no lagging or crashing of the system is reported during the above mentioned test procedures (Martin 2011).Testing the software: The following components of the proposed software solution need to be tested before installation:UI testing: The user interfaces of the website and the communication tool (Denton, Moody and Bennett 2016).Data base integrity testing: The database systems running at the back end of the website (Mahmud, Cypher, Haber and Lau 2012)Performance testing:The links that the help the users to move from one part of the website to the other.The response time of the said applications.Load Testing: Testing the efficiency and the performance of the website and the web based communication tool when a large number of users are logged in to the systems (Goebel 2016).Security Testing: Verifying the mechanisms that that user would utilize for logging in to the system or accessing the data stored in the enterprise databases (Sce.uhcl.edu 2016).b. User documentationA user document is generated by the ICT consultancy so as to provide useful information to the end users of an ICT system. In this section of the report, an insight to the user documentation custom designed for Creative Developer Limited has been provided.Getting started: The website that has been developed would contain the following pages:The home page (Hindmarsh and Serban 2012).Our servicesOur clientsProducts designed by usGet to know usContact usThe site mapCommunication with the client would be feasible by the utilization of the web based communication application that is embedded in the website.Getting accessIn order to utilize the web based communication tool, you have to log in to the web portal using the password and id provided by the system administrator (Tolman et al. 2014). Domain name (Proposed) www. creativedevelopers.com (Wahab et al. 2014). Search engine optimization Accessible to all leading search engines (Goh et al. 2013) List of web pages 1. The home page 2. Our services 3. Our clients 4. Products designed by us 5. Get to know us (Uruea, Muoz and Larrabeiti 2014). 6. Contact us 7. The site map Layout and style The layout Uniform layout containing the official logo of the organization Navigation Common navigation bar for all web pages (Linsley 2014). Other requirements Accessibility Complies with accessibility criteria mentioned in the World Wide Web Consortium Web Accessibility Initiative or the W3C WAI level A Guidelines (Valilai and Houshmand 2013). Code Validation All codes would be validated according to the World Wide Web Consortium or the W3C specifications (de Castro Salgado, Leito and de Souza 2013). In case you forget your password or id, please contact your system administrator. iii. Utilizing the communication tool: Add contacts: New contacts would be automatically added to your contact list, as and when you refresh the tool. Searching contacts: Contacts present in your list can be searched using their first names or by using the employee ids (Earle, Rosso and Alexander 2015 ). Making calls: When you select a specific contact, you would be provided with various call options to choose from. Making conference calls: In order to conduct conference calls, you have to select a contact while being on a call with someone else, using the instructions provided above. The call options would be displayed, chose the one you are currently using. In case your contact responses to the call, a conference call would be set up. c. Security policy In this section of the report, we provide a brief description of the security policies that need to be implemented by the higher management of Creative Developer Limited. Password policy: All system level passwords are to be managed by the IT administrator. The employees would not be allowed to create passwords of their own (Ifinedo 2012). All the passwords being used for increasing the level of security of the said computer system should be maintained in the global password database of the organization. All user level passwords including those utilized to access emails and data base information must be changed periodically. Information security policy: The system should reduce the storage of sensitive client information to the minimum levels. The access to such sensitive information must be controlled by the IT administrator (Safa, Von Solms and Furnell 2016). The employees of the organization would not be allowed to make copies of the enterprise information in their personal detachable devices, nor would they be able to send any attachments through emails, while using the network provided by the organization. Antivirus policy: Corporate standard anti-virus programs should be used for ensuring the security of the hardware components of the computing devices and that of the enterprise information stored in these machines (Vance and Siponen 2012). The anti-virus programs should be downloaded from the official sites and be updated on a regular basis. The employees of the organization should be repeatedly made aware of the fact that an email sent from an unknown source might actually be sent with malicious intents: thus, they should not download or open any attachment sent by unknown ids (Safa, Von Solms and Furnell 2016). Policies For Acceptable Usage: It is expected that the management of Creative Developer Limited would provide up to a certain level of privacy to the employees of the organization in terms of information generation and usage: however, it must be made clear to the employees that the data or the information that are generated using the corporate computer network provided by the organization are to be considered as the intellectual properties of the organization itself (Siponen and Vance 2014). The higher management of the organization would have the right to conduct audits of the computer systems and networks used by employees so as to ensure that the above mentioned policies are being abided by (Ifinedo 2012). d. A Health and Safety document In this section of the report, we provide a brief detail of the Health and Safety policies that must be implemented by the higher management of Creative Developer Limited. The employees of the organization must be made aware of the fact that they should not bring in any edible material, like foods or drinks, in the work stations. This particular policy would be useful in avoiding spilling of food material on the computer devices which might even lead to short circuits (Lundgren and McMakin 2013). All the live or open wires within the work floor areas must be concealed within insulator material, and the employees should immediately inform the concerned authorities in case live and/ or open wires are noticed (ONeill et al. 2013). The computer devices being used by the employees should not be subjected to direct heat, smoke or moisture (Ab.ust.hk 2016). In case of any servicing work, the following rules are to be followed: Before servicing any machine, all the wires or connectors supplying power to the system must be unplugged (Sitesafe.org.nz 2016). Additional care must be taken when the employees attempt to work with electric switches. All cables should be unplugged if the employees need the access in to the CPU cabinet (Safeworkaustralia.gov.au 2016). 5. Recommendations In the light of the discussion made in the report, the following recommendations are being provided to the higher management of the Creative Developer Limited: In spite of the fact that the development and the implementation of the proposed solutions would require the management to invest a hefty amount, yet the management should opt for the installation as the proposed systems would increase the efficiency of the operational activities of the organization. The higher management of the organization should implement a detailed security policy in the organization in order to secure the enterprise data. Strict health and safety policies must also be implemented so as to avoid fatal mishaps or accidents. The testing plans provided in the report should be followed before the incorporation of the proposed solutions within the operational activities of the organization. References Ab.ust.hk,. 2016. Setting a health and safety policy. Ab.ust.hk. Retrieved 27 January 2016, from https://www.ab.ust.hk/hseo/Dhsmr/sample.htm Biltoftà ¢Ã¢â€š ¬Ã‚ Jensen, A., Trolle, E., Christensen, T., Islam, N., Andersen, L. F., Egenfeldtà ¢Ã¢â€š ¬Ã‚ Nielsen, S., and Tetens, I. 2014. WebDASC: a webà ¢Ã¢â€š ¬Ã‚ based dietary assessment software for 811à ¢Ã¢â€š ¬Ã‚ yearà ¢Ã¢â€š ¬Ã‚ old Danish children.Journal of Human Nutrition and Dietetics,27(s1), 43-53. Brjesson, E., and Feldt, R. 2012, April. Automated system testing using visual GUI testing tools: A comparative study in industry. InSoftware Testing, Verification and Validation (ICST) 2012 IEEE Fifth International Conference on(pp. 350-359). IEEE. Chupilko, M. 2012. Developing test systems for multi-modules hardware designs. Programming And Computer Software, 38(1), 34-42. https://dx.doi.org/10.1134/s036176881201001x Computerhope.com,. 2016. How can I test for hardware failures in my computer?. Computerhope.com. Retrieved 27 January 2016, from https://www.computerhope.com/issues/ch001088.htm De Castro Salgado, L. C., Leito, C. F., and de Souza, C. S. 2013. A Case Study: Re-designing the AVIS Website. InA Journey Through Cultures(pp. 69-114). Springer London. Denton, A., Moody, D., and Bennett, J. 2016. Usability Testing as a Method to Refine a Health Sciences Library Website. Medical Reference Services Quarterly, 35(1), 1-15. https://dx.doi.org/10.1080/02763869.2016.1117280 Dmoz.org,. 2016. DMOZ - Computers: Security: Policy: Sample Policies. Dmoz.org. Retrieved 27 January 2016, from https://www.dmoz.org/Computers/Security/Policy/Sample_Policies/ Earle, R. H., Rosso, M. A., and Alexander, K. E. 2015, July. User preferences of software documentation genres. InProceedings of the 33rd Annual International Conference on the Design of Communication(p. 46). ACM. Ece.uprm.edu,. 2016. Test plan. Retrieved 27 January 2016, from https://ece.uprm.edu/~icom5047/documents/OtherDocuments/TestPlan.pdf Encarnacao, J. L., Lindner, R., and Schlechtendahl, E. G. 2012.Computer aided design: fundamentals and system architectures. Springer Science and Business Media. Feitelson, D. G. 2015.Workload modeling for computer systems performance evaluation. Cambridge University Press. Goebel, J. 2016. Hardware Testing and System Qualification: Procedures to Evaluate Commodity Hardware and Production Cluster. Retrieved 27 January 2016, from https://www.slac.stanford.edu/cgi-wrap/getdoc/slac-pub-9761.pdf Goh, K. N., Chen, Y. Y., Daud, S. C., Sivaji, A., and Soo, S. T. 2013. Designing a Checklist for an E-Commerce Website Using Kansei Engineering. InAdvances in Visual Informatics(pp. 483-496). Springer International Publishing. Gross, F., Fraser, G., and Zeller, A. 2012, June. EXSYST: search-based GUI testing. InProceedings of the 34th International Conference on Software Engineering(pp. 1423-1426). IEEE Press. Hansen, P. B. (Ed.). 2013.Classic operating systems: from batch processing to distributed systems. Springer Science and Business Media. Hardware Software Co-Design for JPEG Encoder Test Bench. 2012. INTERNATIONAL JOURNAL ON Advances In Information Sciences And Service Sciences, 4(2), 258-266. https://dx.doi.org/10.4156/aiss.vol4.issue2.32 Hatley, D., and Pirbhai, I. 2013.Strategies for real-time system specification. Addison-Wesley. Hindmarsh, A. C., and Serban, R. 2012. User Documentation for cvodes v2. 7.0. Hoffmann, A., Hoffmann, H., and Sllner, M. 2013, June. Fostering initial trust in applicationsdeveloping and evaluating requirement patterns for application websites. In21st European Conference on Information Systems (ECIS), Utrecht, The Netherlands. Ifinedo, P. 2012. Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory.Computers and Security,31(1), 83-95. Johnson, J. A. 2015, April. Designing Websites for Adults 55+: Toward Universal Design. InProceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems(pp. 2449-2450). ACM. Kolawa, A. K., Jakubiak, N. M., Lambert, M. L., Haaker, W., and Gandhi, N. 2013.U.S. Patent No. 8,448,148. Washington, DC: U.S. Patent and Trademark Office. Kuo, W., Chien, W. T. K., and Kim, T. 2013.Reliability, Yield, and Stress Burn-in: A Unified Approach for Microelectronics Systems Manufacturing and Software Development. Springer Science and Business Media. Leigh, Darren, Clifton Forlines, Daniel Wigdor, and Steven Leonard Sanders. "Latency measuring and testing system and method." U.S. Patent Application 14/316,177, filed June 26 2014. Linsley, P. 2014.U.S. Patent No. 8,713,172. Washington, DC: U.S. Patent and Trademark Office. Lister, A. 2013.Fundamentals of operating systems. Springer Science and Business Media. Lundgren, R. E., and McMakin, A. H. 2013.Risk communication: A handbook for communicating environmental, safety, and health risks. John Wiley and Sons. Maddox, P. 2015. Testing a distributed system.Queue,13(7), 10. Mahmud, J., Cypher, A., Haber, E., and Lau, T. 2012. Design and industrial evaluation of a tool supporting semi-automated website testing. Software Testing, Verification And Reliability, 24(1), 61-82. https://dx.doi.org/10.1002/stvr.1484 Manna, Z., and Pnueli, A. 2012.The temporal logic of reactive and concurrent systems: Specification. Springer Science and Business Media. Martin, G. 2011. Will hardware and software be codesigned? [review of "A Practical Introduction to Hardware/Software Codesign" (Schaumont, P.R.; 2010)]. IEEE Design and Test Of Computers, 28(2), 70-73. https://dx.doi.org/10.1109/mdt.2011.41 Mller, S. M., and Paul, W. J. 2013.Computer architecture: complexity and correctness. Springer Science and Business Media. Neumann, T. 2011. Efficiently compiling efficient query plans for modern hardware. Proc. VLDB Endow., 4(9), 539-550. ONeill, S., Martinov-Bennie, N., Cheung, A., and Wolfe, K. 2013. Issues in the measurement and reporting of work health and safety performance: a review.Safe Work Australia, Safety Institute of Australia and CPA Australia. Packard bell,. 2016. Retrieved 27 January 2016, from Packard bell: https://www.pcworld.co.uk/gbuk/packard-bell-computing/desktop-pcs/desktop-pcs/1093_8225_71255_1698_xx/xx-criteria.html https://www.algoworks.com/ Patterson, D. A., and Hennessy, J. L. 2013.Computer organization and design: the hardware/software interface. Newnes. Polian, I. 2014. Hardware security and test: Friends or enemies?. It - Information Technology, 56(4). Raman, A. 2012. Universal Analog Hardware Test Bench. IETE Journal Of Education, 53(2), 89-96. Safa, N. S., Von Solms, R., and Furnell, S. 2016. Information security policy compliance model in organizations.computers and security,56, 70-82. Safeworkaustralia.gov.au,. 2016. Home - Safe Work Australia. Safeworkaustralia.gov.au. Retrieved 27 January 2016, from https://www.safeworkaustralia.gov.au/sites/.../organisation-needs-organsations Sce.uhcl.edu,. 2016. Example: Test Plan. Sce.uhcl.edu. Retrieved 27 January 2016, from https://sce.uhcl.edu/helm/RUP_course_example/courseregistrationproject/artifacts/test/plans/test_plan_arch.htm Sekanina, L. 2012.Evolvable components: from theory to hardware implementations. Springer Science and Business Media. Siewiorek, D., and Swarz, R. 2014.Reliable Computer Systems: Design and Evaluatuion. Digital Press. Siponen, M., and Vance, A. 2014. Guidelines for improving the contextual relevance of field surveys: the case of information security policy violations.European Journal of Information Systems,23(3), 289-305. Sitesafe.org.nz,. 2016. Health and safety policy Retrieved 27 January 2016, from https://www.sitesafe.org.nz/Category?Action=ViewandCategory_id.. Spichkova, M., Schmidt, H., and Peake, I. 2014. From abstract modelling to remote cyber-physical integration/interoperability testing.arXiv preprint arXiv:1403.1005. Stallings, W. 2013.Operating Systems: Internals and Design Principles: International Edition. Pearson Higher Ed. Tolman, H., Accensi, M., Alves, H., Ardhuin, F., Bidlot, J., Booij, N., ... and Foreman, M. 2014. User manual and system documentation of Wavewatch III version 4.18. Tsichritzis, D. C., and Bernstein, P. A. 2014.Operating systems. Academic Press. Uruea, M., Muoz, A., and Larrabeiti, D. 2014. Analysis of privacy vulnerabilities in single sign-on mechanisms for multimedia websites.Multimedia Tools and Applications,68(1), 159-176. Valacich, J. S. (2012, June). Designing effective web sites: How academic research influences practice. InInformation Technology Interfaces (ITI), Proceedings of the ITI 2012 34th International Conference on(pp. 15-20). IEEE. Valilai, O. F., and Houshmand, M. 2013. A collaborative and integrated platform to support distributed manufacturing system using a service-oriented approach based on cloud computing paradigm.Robotics and computer-integrated manufacturing,29(1), 110-127. Vance, A., and Siponen, M. T. 2012. IS security policy violations: a rational choice perspective.Journal of Organizational and End User Computing (JOEUC),24(1), 21-41. Wahab, A. A., Ahmad, F., Baharom, F., and Yahaya, J. 2014. A case study of quality evaluation from consumers perspectives on Malaysian B2C e-commerce websites.Management and Technology in Knowledge, Service, Tourism and Hospitality, 19. Wang, N., and Tao, T. 2012. Designing and Implementation of Audio Product Sales Website. InInformation and Business Intelligence(pp. 349-356). Springer Berlin Heidelberg. Wheeler, A. 2013. Designing brand identity. Wolf, M. 2012.Computers as components: principles of embedded computing system design. Elsevier.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.