This chapter discusses the systems support and the security tasks that occur throughout the life of a system. Furthermore, this chapter analyzes system backup, maintenance, security, and performance measurement. Most companies provide user training in most forms such as user training which refers to the initial training performed during the introduction of a new system. Another form of the user support are the help desks that provide constant support and guidance to users. Help desks are centralized resources that contain IT professionals employees who provide support to users to continue. Grubb & Takang (2003) explain that help desks show users how to use system resources effectively, provide answers to technical questions raised by users, and teach users how to meet their information needs to be more productive.
Maintenance tasks and support are an important component of systems security since they determine the economic life of a system. Operational costs of maintenance tasks include supplies, equipment rental, as well as software leases. Maintenance activities include changing programs to ensure correct system performance, the system to meet the changing requirements, and making the system operate more efficiently. The maintenance activities are done through corrective, adaptive, perfective, and preventive maintenance measures. System maintenance entails effective management, quality assurance, and cost control. To achieve these goals, firms use various strategies such as a maintenance team and program, release procedure, and a configuration management process. A maintenance team consists of a system administrator, analysts, and programmers. A user may submit a maintenance request that a system administrator analyzes and determines whether the action is necessary or not.
System performance management entails determining the efficiency of a system. Fault management is one type of system performance management that entails examining the signs of trouble, diagnosing the problem, and applying corrective actions. Capacity planning is another type of performance management and measurement that entails monitoring current activities, anticipating future activities, and forecasting resources necessary to provide the desired levels of service. System security entails six independent levels of security which are physical, network, application, file, user, and procedural security.
Post 2: Software Maintenance
Ramesh & Bhattiprolu (2006) elaborate that software maintenance refers to the modifications and updates done on a software after the production process. Software maintenance is done due to various reasons one of them being changes in market conditions that may trigger the need for new modifications. Changing clients needs as well as changes in the operating system may trigger the need for software changes for adaptability purposes. Organizational changes, for instance, venturing into new business and acquiring a new company may trigger the need to modify the software used.
Software maintenance activities should be done sequentially and in an iterative manner (Grubb & Takang, 2003). Identification and tracing are the first maintenance activities that generated by the user that entail identification of the requirement of maintenance. The modification is then analyzed to examine the safety and security effects of modifications. The next step is the designing of new modules according to the requirements specifications of previous stages. Thereafter, the modules are coded in the implementation stage and integration testing conducted on the new modules.
The software is then tested for acceptance among users and any complaints noted to be addressed in the next stage. After the acceptance stage, the system is deployed to various customers. The last stage is maintenance management conducted with the aid of version control tools.
Post 3: Commercial Software Maintenance
Commercial software maintenance refers to the process of conducting software maintenance for commercial users such as corporate organizations. Using third party maintenance is one way for commercial software users to reduce maintenance costs. According to Saleh (2009), third party maintenance refers to the support and maintenance activities done by non-original equipment manufacturers. The services provided by these vendors include fixing bugs, performance optimization, and customization support among others. These vendors can lower software delivery costs by half.
Enterprises need to reduce their shelfware to lower their software maintenance fees. Shelfware refers to purchased software that is yet to be deployed but that incur annual maintenance fees (Saleh, 2009). Organizations must only buy the programs that they need to avoid large maintenance costs. Entering into support and maintenance contracts by vendors or third parties is a prudent strategy for commercial software users. Software maintenance agreements allow the contractor to perform all the annual maintenance functions for a year with the user paying the annual maintenance costs. These contracts protect users from the unpredictable systems bugs or failures that may affect performance. However, allowing third party maintenance providers competition to the software manufacturers and can drive maintenance costs down.
Post 4: Software Maintenance Types
Grubb & Takang (2003) explain that corrective maintenance tasks correct and identify errors in an operational system. SDLC is the preferable maintenance approach used where the IT professionals conduct the investigation, analysis, design, and testing of reported problems before providing any solutions. An example of a corrective measure is a patch that provides temporary repairs in case of a system failure. Most firms use software such as benchmark testing to measure the performance of a system. Adaptive maintenance refers to the modifications and updates applied to keep a software up-to-date and in line with the changing needs users. This type of maintenance is done by adding enhancements to a system to make it easier to use. The need for adaptive maintenance may be caused due to the emergence of new products and services, and new technology. Although the procedures for adaptive and corrective maintenance are similar, adaptive maintenance requires more resources.
Perfective maintenance entails overhauling an operational system to make it efficient, reliable, and easy to maintain (Grubb & Takang, 2003). The need for perfective maintenance usually comes from IT professionals unlike the need for corrective and adaptive maintenance that comes from users. Perfective maintenance can improve systems reliability and performance. While conducting perfective maintenance, analysts use software re-engineering to identify areas that need to be improved. The last type of maintenance is the preventive maintenance that entails identifying areas where trouble is likely to occur. This type of maintenance often results in increased users satisfaction and reduced downtime.
Post 5: Prioritizing Software Maintenance Changes
Prioritizing software maintenance changes is never easy due to different stakeholders demanding diverse change requests. The best way to implement software maintenance changes is to use a change control board to decide the changes that will be implemented and those that will not (Saleh, 2009). The change control board is a group of stakeholders who prioritize the changes to be implemented based on the benefits and costs of each change. The group conducting the change should first agree on the scale of change required to make it easier to agree on what the changes need to be implemented. The prioritization process should be clear and transparent for all stakeholders to understand. The process can be done using management tools such as ReQtest. This management tool helps to identify the change requests that can enhance the maximize business value and minimize the costs of implementation.
Post 6: Professional Organizations and Continual Learning
Professional organizations use different software depending on their functions. IT has been an integral part of the business functions of different professional organizations. As a result, the organizational IT costs have risen to unprecedented levels. With the increased spending in the applications, cost cutting strategies are necessary to prevent wastage of resources. Most professional organizations have an IT department charged with the responsibility of addressing all the organizational IT issues. Continual learning is critical in improving existing organizational systems and processes. Organizations must continuously engage their employers in training regimes to improve their skills and productivity. The world is very dynamic and rapidly changing hence, the need for continual learning to develop new ideas and products. Whether it is in the IT sector or in the sectors, research and innovation have become critical.
Post 7: Disaster Recovery Plan
The pervasive use of the electronic data sources has necessitated the need for IT disaster recovery plans. Priorities and recovery time objectives should be developed while conducting the business impact analysis (Ramesh & Bhattiprolu, 2006). Businesses, worth small or big create large volumes of electronic data that is important in the operations of business. As a result, organizations must develop technology recovery strategies to restore hardware and data. Data backup and restoration of electronic information is, therefore, important. Compiling a disaster recovery plan should begin by analysis of the hardware such as servers, desktops, software applications and business data (Grubb & Takang, 2003). It is important to copy copies of software used to allow for the installation and replacement of software. The plan should prioritize the restoration of business hardware and applications.
References
Grubb, P., & Takang, A. A. (2003). Software maintenance: Concepts and practice. Singapore: World Scientific Publishing Co Pte Ltd.
Ramesh, G., & Bhattiprolu, R. (2006). Software maintenance: Effective practices for geographically distributed environments. New Delhi: Tata Mcgraw-Hill.
Saleh, K. A. (2009). Software engineering. Ft. Lauderdale, FL: J. Ross Pub.
If you are the original author of this essay and no longer wish to have it published on the SuperbGrade website, please click below to request its removal:
- How to Write Code in Two Programms
- Customer Relations in Social Media
- Motivation Letter for Software Programming Magistracy
- Learning from the Motherboard
- Digital Divides Aspects and Concepts
- Analysis of Security Issues in Cloud Computing and their Solution
- Cultural Difference Between European and Chinese Females on Facebook - Compare and Contrast Essay