Thursday, December 5, 2019

Mobile Computing Systems and Applications †Free Samples to Students

Question: Discuss about the Mobile Computing Systems and Applications. Answer: Introduction: The Headspace is known to be popular organization in Australia that deals with the mental illness of the youth. The project of Headspace has been considering the cloud-based solutions that have been required to get investigated. The report has considered the aspects of cloud-based solutions like the data ownership including the data ownership and other related aspects. The report has effectively demonstrated the non-functional requirements. The report then reviews the various cloud-based solutions. At last, it undergoes through the SDLC approach. The different innovative applications are found to be failing vigorously in the market. The reason behind this is that they have not been satisfying the NFR or the non-functional requirements sufficiently (de la Torre-Dez et al., 2015). Various users active concurrently have been able to access through the partitioning of the user session moving parallel to each other. The time of response has been created by the removal of performance congestion. These have been occurring in the database and the storage usage. The requirements of the service are faced by including the new devices. These devices have been able of the fast and high volume logging of the events (Gray Rumpe, 2016). Despite all this, in that scenario, scopes have been present for the architects to control the NFRs that have been more challenging. The various non-functional necessities are described below. The NFRs are persistent as their qualities are considered. They are visited repeatedly as the element of the DoD or the Definition of Done. This is for all the program increment, release, and iteration. They have been present at all the SAFe backlog platforms. For example, this includes the team, program, bigger solutions and portfolio. The task is to generate the POS terminal system. Moreover, it has been also found to be interfacing with numerous services such as the inventory control and tax controller (Helo et al., 2014). The system of Headspace is needed to be tolerant towards the faults. The Headspace should also the user experience. This must be more than just only delivering the user interface that they have been assuming to appropriate. The implementation of the effective interface and interaction has been becoming difficult for providing SaaS (Abolfazli et al., 2014). The various NFR constraints are required to be included in the system of the information technology. They are namely the business constraints, run-time qualities and non-runtime qualities. These quality attributes are the factors impacting the user experience, system design and the behavior at run-time. Further, they have been denoting the spaces regarding the solutions to acquire large effect across the layers and tiers (Rodrigues et al., 2013). The Comparison on various attributes as per the functional and non-functional requirements: This one is the first attribute denoting the important features of the produces familiar under the business domain for the developed solution. They have been basically technically oriented. Instead of the functional requirements, in the NFR, the application interfaces are developed including the user and the user. This is the cause they have been intuitive in usage and have been able to be localized (Al-Somali Baghabra, 2016). Moreover, accesses for the various disabled users are provided here. It has been also supplying the impactful user experience. It is regarded as the ability of the system to continue the operation in an expected manner within time. It is calculated as the probability of the system. This is intended not to fail and then perform the tasks intended. The responsiveness of the system is included in the performance. This is done to execute the specific tasks in any specific time gap (Sivakumar et al., 2014). Regarding the NFRs it has been calculated as per as the latency and the throughput. This is the systems capability to reduce the malicious and accidental activity scopes that have been staying externally to the developed system. It prevents the disclosure or loss of data. The system security has been safeguarding the resources. It has been resisting the unauthorized access to modify any data. The substantial capital costs have been able to save the in-house storage. This indicates the of the application and server necessities. Then the lack of the on-premise system eradicates the operating costs. This has been in the form of air-conditioning, administrative costs, and the power. This indicates that the cloud-computing is more reliable and consistent. This has been with the managed service platform (Wang et al., 2014). Thus, the Headspace has been able to receive the benefits from the huge resources of IT. The cloud services deliver the simple and maintenance to develop the management and the maintenance abilities of the IT through the core administration. Storing of the crucial files is always prone to risks. For instance, the architecture has been multi-tenant (Khan et al., 2015). This indicates that the various users could be hosted on the same server. The idea to switch to the cloud services has not developed completely though the providers assure that the cloud is flexible enough in integrating and usage. Thus the Headspace might find that difficult to switch their services from the various kinds of vendors. Keeping the overall data secure: It has been found that the consumers have been moving towards the cloud service. Hence the understanding of the standards is vital. It includes the roles of the entities and maintains the trust of the patients. To supply the foundation to identify the problems, the fundamental study of the HIPAA and HITECH is needed to be considered (Ryan, 2013). This has been incorporating the laws, rules, and regulations. The act has been including the data control, integrity, availability, and access. Moreover, there have been implications regarding the multitenant environments. Neglecting the various intricacies of the complex set of rules, laws, and regulations is the motive of HIPAA Act. Here the privacy and the security are used as the buzzwords rather than taking into consideration the nuances included to the HIPAA and HITECH. In this way, there has been obscuring of the compliance value (Church Goscinski, 2014). Here the special standards of the security and privacy ate consisted for the specific information of health. This has been identified as the HIPAA Privacy Rule and Security Rule. The Act has been highly applicable to the rules. There are done to the entities covered. It includes the healthcare, providers and health plans. The HITECH Act has been required to the secretary to expand the Security and Privacy rules of HIPAA. It raises the penalties for violating the act. In this act, the security and privacy are applied in a wide way to the business associates (Babu, Lakshmi Rao, 2015). They have been defined as the entities or individuals doing specific tasks that have been including the use of PHI. The Business Agreements or BA delivers various services like the processing, review of utilization, data analysis and many more. Further, the providers have been storing the PHI representing the entity that has been covered directly. This could also take place indirectly through other business administration. The relevant SDLC Approach: One of the best examples of this SDLC method is the Waterfall Model. It has been including the set of series of phases. They have been flowing in various definable steps. These steps are basically demonstrated as the necessities (Taleb, 2014). These necessities are captured in the business and software. This has been also including the constructing, debussing, software, business, installation and maintenance. There have been various popular examples of the method. They are the XP or the Extreme Programming and the Scrum. Both of them have been referred to as agile. This agile method is defined as those following the Agile Manifesto (Inayat et al., 2017). They have been the collection of core principles. These principles have been giving support to the overall iterative development. This has been making interactions on the processes and tools along with providing valuation to the people. This has been the software working on various comprehensive documentations. Moreover, it has been also incorporating the customer collaboration. This is done on the contract reacting. This also includes the negotiating to the alterations to follow the plans. The recommendation to the SDLC approach for the Headspace project: Regarding this project, the Adaptive SDLC is decided to be the most appropriate. The primary cause is that it has been meeting the customer satisfaction. This has been via quick delivery of the useful software. This working software is provided very frequently. It has been the fundamental measure for the project development. It has been also welcoming the late changes in the necessities. Moreover, they have been shutting down the regular operation between the business individuals and the development. There has been direct communication with the best kind of communication (Inayat et al., 2017). The Headspace project is created around the motivated people that could be believed. A continuous focus has been present on the good design and the technical design. Additionally, it has been easy. Conclusion: Thus the report has effectively analyzed the various contexts of the cloud system that might be deployed to the Headspace project. In this study the FURPS acronym has been used as the reference. This includes the functionalities, usability, reliability, performance, and security. The report has effectively compared the attributes and analyzed their suitability. It has also helped in differentiating between the gathered tools and connecting to the project of Headspace properly. It has reviewed the cloud-based solutions according to the strengths and weaknesses. The strengths include the cost savings, manageability and so on. The weaknesses are the downtime, security and much more. The study has helped in learning to measure and make justifications on the system model necessities in analyzing the provided cases. In order to keep the data secure, the HIPAA and HITECH are briefly introduced. The different approaches like the predictive and the adaptive SDLC are discussed here. At last, t he report has recommended the Adaptive or Agile system to be the most appropriate as the SDLC of the project is considered. References: Abolfazli, S., Sanaei, Z., Ahmed, E., Gani, A., Buyya, R. (2014). Cloud-based augmentation for mobile devices: motivation, taxonomies, and open challenges.IEEE Communications Surveys Tutorials,16(1), 337-368. Al-Somali, S., Baghabra, H. (2016). Investigating the Determinants of IT Professionals' Intention to Use Cloud-Based Applications and Solutions: An Extension of the Technology Acceptance.International Journal of Cloud Applications and Computing (IJCAC),6(3), 45-62. Babu, S. M., Lakshmi, A. J., Rao, B. T. (2015, April). A study on cloud based Internet of Things: CloudIoT. InCommunication Technologies (GCCT), 2015 Global Conference on(pp. 60-65). IEEE. Church, P. C., Goscinski, A. M. (2014). A survey of cloud-based service computing solutions for mammalian genomics.IEEE Transactions on Services Computing,7(4), 726-740. de la Torre-Dez, I., Lopez-Coronado, M., Soto, B. G. Z., Mendez-Zorrilla, A. (2015). Secure Cloud-Based Solutions for Different eHealth Services in Spanish Rural Health Centers.Journal of medical Internet research,17(7). Gray, J., Rumpe, B. (2016). The evolution of model editors: browser-and cloud-based solutions. Helo, P., Suorsa, M., Hao, Y., Anussornnitisarn, P. (2014). Toward a cloud-based manufacturing execution system for distributed manufacturing.Computers in Industry,65(4), 646-656. Inayat, Z., Gani, A., Anuar, N. B., Anwar, S., Khan, M. K. (2017). Cloud-Based Intrusion Detection and Response System: Open Research Issues, and Solutions.Arabian Journal for Science and Engineering,42(2), 399-423. Khan, Z., Anjum, A., Soomro, K., Tahir, M. A. (2015). Towards cloud based big data analytics for smart future cities.Journal of Cloud Computing,4(1), 2. Rodrigues, J. J., De La Torre, I., Fernndez, G., Lpez-Coronado, M. (2013). Analysis of the security and privacy requirements of cloud-based electronic health records systems.Journal of medical Internet research,15(8). Ryan, M. D. (2013). Cloud computing security: The scientific challenge, and a survey of solutions.Journal of Systems and Software,86(9), 2263-2268. Sivakumar, A., Gopalakrishnan, V., Lee, S., Rao, S., Sen, S., Spatscheck, O. (2014, February). Cloud is not a silver bullet: A case study of cloud-based mobile browsing. InProceedings of the 15th Workshop on Mobile Computing Systems and Applications(p. 21). ACM. Taleb, T. (2014). Toward carrier cloud: Potential, challenges, and solutions.IEEE Wireless Communications,21(3), 80-91. Wang, L., Wang, X. V., Gao, L., Vncza, J. (2014). A cloud-based approach for WEEE remanufacturing.CIRP Annals-Manufacturing Technology,63(1), 409-412.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.