Unit 4 Handout
Unit 4 Handout
System deployment is when the final product of a software project is delivered to users so they
can start using it. It includes setting up the system, configuring it, and releasing it in a live
environment. A good deployment process ensures the software works well, is easy to access, and
can be maintained.
1. Pre-Deployment Preparation:
o Set Up Environment: Make sure servers, databases, and other tools are ready.
o Backups: Save a copy of the current system in case something goes wrong.
o Configurations: Adjust settings for databases, networks, and security.
o Testing: Test the system thoroughly in a test environment.
o Documentation: Write down how to install and configure the system.
2. Planning the Deployment:
o Schedule Deployment: Choose a time with the least impact on users, like late at
night.
o Organize Resources: Assign roles to team members, like developers and support
staff.
o Checklist: Make a step-by-step list of actions to avoid missing anything.
3. Executing the Deployment:
o Install the Software: Put the new system on the live servers.
o Database Migration: Update the database to match the new version.
o Apply Configurations: Adjust settings so the system runs smoothly in the live
environment.
o Go Live: Allow users to access the system.
o Smoke Test: Quickly check the system to ensure there are no major issues.
4. Post-Deployment Activities:
o Monitor the System: Keep an eye on performance, security, and user feedback.
o Fix Bugs: Address any issues users or the team identify.
o User Support: Provide help or training to users as they adapt.
o Performance Tuning: Make tweaks to improve speed and efficiency.
o Test Again: Run final tests to confirm everything is working well.
o
5. Review and Improve:
o Assess Success: Check if the deployment went as planned.
o Gather Feedback: Ask users for opinions on the new system.
o Learn and Improve: Note what worked and what didn’t for future deployments.
Deployment Models:
1. Blue-Green Deployment: Use two environments (Blue = current, Green = new), test in
Green, then switch users if successful. Easy rollback if needed.
2. Canary Deployment: Release to a small group, expand if no issues arise. Reduces risk.
3. Rolling Deployment: Update in phases, maintaining system availability and minimizing
downtime.
4. Shadow Deployment: Run the new version alongside the current, using real traffic for
testing without affecting users.
Best Practices:
Conclusion
System deployment is a critical step in delivering software. With good preparation, careful
execution, and ongoing monitoring, deployments can be smooth and successful, ensuring users
have a reliable and effective system.
These processes are essential to help users adopt new systems smoothly. They ensure users
understand how to work with the system and that organizational workflows adjust effectively to
the changes.
1. User Training
Training equips users with the skills to use a new system confidently and effectively, reducing
errors and improving productivity.
Better Productivity: Helps users quickly adapt to the system and work more efficiently.
Higher Adoption Rates: Reduces resistance by helping users understand the system’s
benefits.
Fewer Support Requests: Well-trained users need less help, reducing pressure on
support teams.
Improved System Usage: Encourages users to explore and use all system features fully.
2. Change Management
This process helps organizations adapt smoothly to new systems or workflows by addressing
concerns and ensuring changes are well-integrated.
Why is Change Management Important?
In conclusion, User training and change management are vital for ensuring the success of new
systems. By helping users adapt and addressing their needs, organizations can achieve smoother
transitions, higher productivity, and long-term satisfaction.
System Documentation: For developers and IT teams. Explains how the software works,
including its design, code, and setup.
User Manuals: For everyday users. Simple instructions on how to use the software
effectively.
1. System Documentation: It helps developers maintain, update, and troubleshoot the system.
Key Components:
Best Practices:
1. System Maintenance
Best Practices:
2. System Support
Best Practices:
Conclusion: Good documentation, maintenance, and support ensure smooth software operations,
happy users, and long-term success.
QA ensures that products meet quality standards by identifying and preventing defects
throughout the development process.
Key Principles:
Key QA Practices:
Why QA is Important:
Testing ensures that software functions correctly and meets requirements. Metrics measure
testing effectiveness.
Testing Methodologies:
Testing Metrics:
In Conclusion: Quality Assurance and Testing are critical to creating reliable, user-friendly
software. By applying the right practices and metrics, teams can deliver high-quality products
that meet customer needs efficiently and consistently.
Project Management
Project management is about organizing and guiding resources to achieve specific goals within a
set timeframe, budget, and quality standard. Its main goal is to deliver successful outcomes while
meeting stakeholders' expectations. It involves managing the entire project lifecycle: Initiation,
Planning, Execution, Monitoring, and Closure.
Key Elements of Project Management
Conclusion: Project management ensures that goals are met efficiently within constraints like
time, budget, and scope. By applying proper techniques, tools, and methodologies, project
managers can deliver successful outcomes while addressing challenges effectively.
System security protects information, systems, and networks from unauthorized access,
modification, or destruction. The goal is to ensure confidentiality, integrity, and availability
(CIA) of data.
3. Mitigation Techniques
1. Identify Risks
o External Risks: Cyberattacks, natural disasters.
o Internal Risks: Human errors, equipment failure.
2. Assess Likelihood and Impact
o Use a Risk Matrix:
High Likelihood + High Impact = Critical Priority.
3. Control Risks
o Avoid: Change plans to eliminate the risk.
o Reduce: Take steps to lessen risk (e.g., security systems).
o Share: Transfer risk (e.g., insurance).
o Accept: Prepare for manageable risks.
4. Document Risks
o Maintain a Risk Register to track risks and mitigation steps.
Types of Risks
Security measures protect an organization’s information, systems, and assets from threats like
unauthorized access, data breaches, and cyber attacks. These measures ensure confidentiality,
integrity, and availability of data and systems, using a combination of administrative,
technical, and physical controls.
Security Policies: Rules for acceptable behavior and practices (e.g., remote work policy).
Risk Management: Assessing and minimizing potential risks (e.g., disaster recovery
plans).
User Training: Educating staff about threats like phishing and password security.
Access Control Policies: Defining who can access certain resources (e.g., role-based
access).
Access Control: Using locks, badges, or biometric scanners to restrict access to facilities.
Cameras: Monitor sensitive areas to deter unauthorized activity.
Environmental Controls: Protect against threats like fire or floods (e.g., fire suppression
systems).
Secure Equipment Disposal: Destroy outdated devices to prevent data leaks.
Network Security
Endpoint Security
Application Security
Disaster Recovery (DR) and Business Continuity Planning (BCP) help organizations recover
from disruptions like cyberattacks or natural disasters.
Conclusion: Effective security controls, DR, and BCP ensure organizations remain protected
against threats and can recover quickly from disruptions. By combining proactive measures,
testing, and ongoing improvements, businesses can build resilience and trust with their
stakeholders.
References:
Systems Analysis and Design" by Alan Dennis, Barbara Haley Wixom, and Roberta M.
Roth (2020, Wiley)
Modern Systems Analysis and Design" by Jeffrey A. Hoffer, Joey George, and Joe
Valacich (2019, Pearson)
Systems Analysis and Design Methods" by Jeffrey L. Whitten, Lonnie D. Bentley, and
Kevin C. Dittman (2018, McGraw-Hill Education)