Tony’s Chips, Term Paper Example
Discuss
The plan for developing a website capable of meeting the requirements of Tony’s Chips that can also incorporate all the data from an original site to a new location all stems from establishing an efficient system development Life Cycle.
System Development Life Cycle
The System Development Life Cycle (SDLC) entails organization and managing of information system projects (“archives.gov,” 2012). (SDLC) utilizes record management (RM) as a strategy to keep track of website migration milestones achieved and yet to be achieved. The key objective of this system development life cycle is to transition the infrastructure of the Tony’s Chips website to being incorporated within the Tony’s Chips 2 site.
Website Architecture
Setting up a backup website for Tony’s Chips requires ample support and implementation of web protocols conscious of potential risks that can occur with standard business practices online. Garland and Shaw note that, “with the increase in system software size, design problems and their priorities change. For example, algorithms and data structures no longer pose the greatest challenge to the computation no longer constitute the major design problems. When systems are constructed from many components, the organization of the overall system—the software architecture—presents a new set of design problems.”
0\ (Garland & Shaw, 1994).” The authors argue that the difficulty of designing a website with multiple layers is that the site has numerous pages that must be interconnected while simultaneously capable of supporting RSS Feeds, or to incorporate social network tools. Another aspect of website architecture is the style of the site. It’s noted that “an architectural style, then, defines a family of such systems in terms of a pattern of structural organization. More specifically, an architectural style determines the vocabulary of components and connectors that can be used in instances of that style, together with a set of constraints on how they can be combined (Garland & Shaw, 1994).” The way in which each page flows together on the website is what makes up the style.
Disaster recovery Solutions
There main approach to minimizing risk through efficient website architecture during the migration process is to certify that the transition of data is pipelined through a process. Garland and Shaw point out that the way data is pipelined can play a dramatic effect in hote the website functions and how vulnerable the site may be to cyber attacks. They note that “common specializations of this style include pipelines, which restrict the topologies to linear sequences of filters; bounded pipes, which restrict the amount of data that can reside on a pipe; and typed pipes, which require that the data passed between two filters have a well-defined type. (Garland & Shaw, 1994). In addition to designing web infrastructure in a way that enhances privacy and s security methods, there are a number of computer forensic tools, like Scapel, or Foremost, that can alleviate stress encountered by web developers when tracking errors that could potentially crash the systems.
Operating System
Tony’s Chips runs most effectively on knowledge application based file systems. This includes operating systems like DOS, Windows, OS/2, UNIX, and Macintosh. Utilizing knowledge application based file systems allows the website migration to maintain different databases to sync them and collaborate them with one another. Website migration projects also incorporate theories like like Locard’s Exchange Principle, which notes that “when two objects came into contact, they each influence one another on a material level” (Carvey, 2011). \ Through implementing a knowledge based application, little work will be necessary on the part of the user. but it also exposes file systems to more potential for corruption. The new Tony’s Chips website architecture is capable of working on operation systems, utilizing an operation system will prevent the file system and data from being corrupted. Carvey also state that, “any interaction between two entities (one being the computer operating system) results in the transfer or creation of data”(Carvey, 2011). The author’s main point is that through the interaction between the internet and operating systems data is actually created, which makes it a vital necessity to secure this transfer of data through proper system security protocols. . For example, when a visitor comes to Tony’s Chips and purchases chips, a receipt is produced for a visitor, and their purchase is documented and the data is archived in the system. This includes the financial information of the customer that could be potentially damaging to the consumer and the reputation of the company if it were to fall into the wrong hands.
Alternatives to the company self-hosting the site.
What are the home hosting alternatives?
Static IPs
The most common resource for self hosting is a static IP. Through the use of a static IP address, a domain can be purchased and a url selected for the domain which can be attached to the IP. Static IP address are usually fixed addresses. Standard internet Protocol for network addressing is referred to as dynamic addressing (DHCP), which is the method technically advanced users prefer. option.
Dynamic DNS
Dynamic DNS is a solution for domain names that consistently sustains traffic pointing in the direction of IP addresses. This allows users to invest in a static IP. Assoftware IP strategically updates the DNS map through a Dynamic DNS supplier. The issue with using this tool can be seen in the lag time the software has.. The lag time stems from the issue that the IP changes or resets whenever there is a disconnect from the system and the internet has to reconnect. Despite the fact that Dynamic DNS servers update mapping once a minute, time lags can still be a problem, and during these time lags, the site is not accessible.
Reverse Proxy
The way time lags can be averted when using Dynamic DNS is by implementing a reverse Proxy, which is capable of connecting a home based computer to the network while reversing the domain name to make it appears as another IP address. PurpleNova is a Reverse Proxy Variation tool recognized as one of the most effective due to the premium security it provides. Reverse proxies can also play a pivotal role in reducing cyber terrorist attacks. Weimann has a very details definition of cyber terrorist attacks he notes that, “psychological, political, and economic forces have combined to promote the fear of cyberterrorism. From a psychological perspective, two of the greatest fears of modern time are combined in the term “cyberterrorism.” The fear of random, violent victimization blends well with the distrust and outright fear of computer technology (Weimann, 2004).”
Explain and justify the system architecture you have selected.
The main reason this system architecture style was chosen is because it provides the best infrastructure to sell product. For the purpose of Tony’s Chips, the following system architecture patterns were reviewed, Flat, Hub and spoke, All in One , Strict Hierarchy, Index, Multi-Dimensional Hierarchy, and Search. The daisy model was found to be ideal for Tony’s chips.
All in One is often identified as the most popular or architectural style that is the easiest to comprehend and implement. All information is organized and laid out on a single website where visitors can scroll through the site and find the information or tools they need using basic common sense. This architectural style prides itself in not really requiring any guidelines to assist visitors. The reason this is such a popular method is because it is simple to implement. The most difficult aspect of using a method like All in One is that its simplicity leads to minimal pages which in turn results in Google not crawling the site as much.
Index: Index architecture entails flat structure through content lists but this style is not aesthetically pleasing. The site architecture needs to be able to pitch visitors, to convert them into consumers of chips and other products the site might sell. . There are some advantages to flat style in that listing items on the site, even if in a boring fashion makes it easier for visitors to find their exact search criteria. An example of this can be seen with how phone books, or dictionaries are used.
Hub-and-spoke (daisy) pattern: is very similar to an e-mail account. The Hub-and-spoke model provides an architecture where there are multiple layers of content all stemming from one core source. This is defined as a linear work-flow method. The reason this is the best architectural style for Tony’s Chips is because it has a divers set of features it can provide that extend beyond just the standard structure of Tony’s Chips. Hub-and-spoke has the ability to lead visitors to different informative content, while maintaining the brand in the mind of the consumer.
Flat design entails each page being reachable from every other page on the site and its the most common format used and it’s also the format user are familiar with using.
Strict hierarchy only permits visitors to access pages attached to a parent location. This method limits analysis and traffic. The need to migrate system data is due to the fact that Tony’s Chips currently uses this method. The most common use of strict hierarchy can be seen with website forums.
Multi-dimensional hierarchy is in some ways a form of client/server architectural style where there is one parent page with multiple extensions. Each extension leads back to the parent page. An example of this would be a website like Youtube . This site has one main home page and then multiple pages that can be searched form that home page. Every page on the site leads back to that original source of the search. If Tony’s Chips applied this style, then when a visitor wanted to make a purchasethey click on the product they are viewing and purchase it. On the topic of client/server pages it’s noted that “today, some examples of the client/server architectural style include Web browser—based programs running on the Internet or an intranet; Microsoft Windows® operating system—based applications that access networked data services” (msdn.com, 2012). This style can also be seen with the search method.Search is also a form of client server architecture. as it allows users to search through the website across large quantities of information that might other wise be time consuming. Tony’s Chips is not a search engine, so this style can not apply. client/server architecture indicated a graphical desktop UI application that communicated with a database server containing much of the business logic in the form of stored procedures, or with a dedicated file server (msdn.com, 2012.)”
Use Case:
When a visitor enters the site home page, they are taken to a page streaming product feeds. These product feeds play an integral part in the site infrastructure, as all visitors are presented with products the possibility of conversion is enhanced. No matter the page loaded on the site, the visitor will be confronted by sales copy and payment tools to purchase merchandise. There are also email subscription tabs that load while visiting the site and after purchase. When visitors subscribe through these tabs, they are added to the site newsletter and informed whenever new sales are available. Every page emphasizes the Tony’s Chips company culture through promotional imagery with the intention of turning all traffic into sale. The simplicity of the website architecture has the ability to optimize conversion rates. Likewise, complex website structure could lead to lost sales. The use case is carried out as follows, a Visitor arrives to Tony’s Chips website and views the purchase page on the site, he clicks a url or tab that leads him to a desired product of purchase, the potential customer is offered the opportunity to confirm they want to buy an item, the transaction is executed and the checkout is completed. Once the transaction is complete, the customer is provided with registration information to receive the company newsletter and then taken to other items they might enjoy.
Support operations
Internally hosted sites allow users the ability to have control over functionality. This also poses the threat of having many potential security risks. This requires that ample finances be devoted to the employment of tech support staff that can supplement the management of the system and avoidance of risk. Servers must be purchased as well as hardware, software and other necessary system support tools. An IT department supports is employed for network support through the utilization of security protocols like virtual iD and VeriSign secured signature. The return on investment (ROI) of employing IT support building and managing an internal hosting network, provides additional benefits in that when the site starts to bring in profits they can be reinvested into security tools, such as virtual iD verification methods. Tools like virtual iD enable users to manage their own personal information. This is an aspect of privacy control that can be very useful. Virtual iD will be a key feature utilized by this system as it is a resource structured to secure access to personal information, it also serves well at verifying identity. Users of the system will be able to manage their personal information upon registration through the creation of a virtual signature attached to their virtual iD. This reduces the use of forms within the store, less paper work leads to more affordablility, but also less forged signatures or cases of identity theft. This also means there will be less purchase errors, or vulnerabilities to the system, as when information is changed it’s changed within the cloud.
Customer Service Resources (CSR) are also a key factor that must be taken into account. CSR is “the broad array of strategies and operating practices that a company develops in its efforts to deal with and create relationships with its numerous stakeholders and the natural environment” (Buyya,, Broberg, & Goscinski, 2010). CSR enables site users to incorporate transformational leaderships as a defining part of their busines spractices. This means “the transformational leader is one who articulates a vision of the future that can be shared with followers, intellectually stimulates followers, and pays attention to individual differences among employees. In contrast, the transactional leader motivates employees primarily through contingent-reward exchanges” (Buyya,, Broberg, & Goscinski, 2010).
Performance Evaluation methods
There are also a wide range of analytical systems which utilize tracking to monitor conversion rates. This information can be later assessed to optimize sales and get a good understanding of website performance. Ultimately Tony’s Chips will have more success selling product on an a modernized site designed to better promote products while simultaneously providing feedback to its staff. An example of this can be seen with Google Analytics, is currently an industry standard method of tacking website performance. It monitors bounce rates of traffic, which inform the staff how long visitors stay on the site.
Focus on Content
Entertaining websites garner attention, by keeping visitors focused on the content in which they have the most interest and then relating that content to their own, specifically the products they pitch for sale. This increases the desire for visitors to purchase chips. When bloggers visit your website and feel enticed to share it, it plays a substantial role in getting the word out about your brand. Motivating bloggers and visitors alike to share content from the site can be done by producing video or billboard ads in the form of gif files that are funny and entertaining but promote the product at the same time. These ads can be further enhanced through the use of web tools that make it easier for visitor to share content, such as tabs to share content on Twitter, Facebook, Instegram or other social networks. These tools make content on the site more shareable and ultimately motivate users to build back-links leading back to the site. This builds traffic and in turn result in the website having a higher search engine ranking ranking.
Monitoring these efforts
Google analytics and similar tools for tracking website performance will play a critical role in improving the use of the website. Google Analytics also enhances the e-commerce performance by providing charts that measure conversion rates. Unique traffic charts that tell how long visitors stay present on the site. There are also numerous system security providers that give audit reports to companies so system managers can see how many broken links a site might be producing. Ultimately, real assessment of Tony’s Chip’s performance will be its online sale servers those that come from brick and mortar locations.
In sum, a website migration project for Tony’s Chips will play an essential role in increasing sales and getting word out about the brand. This can be effectively executed by remodeling the website architecture, an adapting the site to utilize more modern social media marketing tools that will make the site more shareable across the internet.
Work Cited
archives.gov. (2012, January 03). Retrieved from http://www.archives.gov/records-mgmt/initiatives/sdlc-checklist.pdf
Buyya, R., Broberg, J., & Goscinski, A. M. (Eds.). (2010). Cloud computing: Principles and paradigms (Vol. 87). Wiley. Com.
Carvey, H. (2011).Windows forensic analysis dvd toolkit. Syngress.
Garland, D., & Shaw, M. (1994). An Introduction to Software Architecure. Advances in Software Engineering. Retrieved from http://www.cs.cmu.edu/afs/cs/project/vit/ftp/pdf/intro_softarch.pdf
Laszewski, T., & Nauduri, P. (2011). Migrating to the cloud: Oracle client/server modernization. Access Online via Elsevier.
Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & Ghalsasi, A. (2011). Cloud computing—The business perspective. Decision Support Systems, 51(1), 176-189.
Mohagheghi, P., & Sæther, T. (2011, July). Software engineering challenges for migration to the service cloud paradigm: Ongoing work in the REMICS project. In Services (SERVICES), 2011 IEEE World Congress on (pp. 507-514). IEEE.
msdn.com. (2012). Chapter 3: Architectural patterns and styles. Retrieved from http://msdn.microsoft.com/en-us/library/ee658117.aspx
Weimann, G., (2004). Cyberterrorism: How Real Is the Threat? United States Institute of Peace, December 2004
Time is precious
don’t waste it!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee