1 / 16

Team A Huffman Trucking Service Request

Team A Huffman Trucking Service Request. Justin Perro Ivey Stallings Mike Hemara Thach. NTC 360 Network and Telecommunications Concepts Joseph Hobbs. Business Description. An established, up scaled convenience store located in moderate to high income neighborhoods.

suchi
Download Presentation

Team A Huffman Trucking Service Request

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Team AHuffman Trucking Service Request Justin Perro Ivey Stallings Mike Hemara Thach NTC 360 Network and Telecommunications Concepts Joseph Hobbs

  2. Business Description • An established, up scaled convenience store located in moderate to high income neighborhoods. • Stores include items such as beverages (adult included), snacks, food items, precooked/fresh meals. • Although smaller in scale, stores are “up scaled”. Snacks and food items are of higher quality than the standard grocery or convenience store. • Multi- locations

  3. Problem Statement JM Convenience Enterprise had identified the lack of food and beverage stores that are conveniently located to moderate to high income neighborhoods. It is our goal to address that challenge and provide store locations in those neighborhoods as described in the companies business description. In order to do so, the company must address certain business requirement immediately.

  4. Business Requirements Rules Business Rules are used every day to define entities, attributes, relationships and constraints. Usually though they are used for the organization that stores or uses data to be an explanation of a policy, procedure, or principle. The data can be considered significant only after business rules are defined, without them it’s just records, but to a business they are the characteristics that are defined and seen by the company.

  5. Business Requirements Rules - Continue What is it for?  Business Rules help employees focus on and implement the actions within the organizations environment. Some things to think about when creating business rules are to keep them simple, easy to understand, keep them broad so that everyone can have a similar interpretation. To be considered true, business rules must be in writing and kept up to date.

  6. Business Requirements – Policy Policies are broad statements, adopted by a business, that set out what the business stands for and what its goals are. Procedures are usually implemented to support each policy explaining how to apply the policy to the business's customers, employees and products, and the instructions necessary to follow the policy. Examples of areas where businesses typically institute policies are ethics, human resources, accounting and customer service.

  7. Business Requirements – Policy - Continue Ethics Ethics policies address issues such as honesty, fairness, integrity and respect. Human Resources Policies imposed in the area of human resources address issues such as hiring and termination, benefits, promotion and salary increase and discipline. Customer Service Customer service policies address issues such as employee attitude toward customers.

  8. Security Model - Availability • Windows Authentication • Database Authentication • Mixed Mode • What are the Pros and Cons?

  9. Security Model – Chosen • Application Centric • Abstraction Layer • What are the Pros and Cons?

  10. Security Model – Application Centric • Application Role • Strong password requirement • Isolated from Windows Security • Very adaptable to modification/enhancement • Longer application life span • Scalable • Minimum Maintenance

  11. Security Model – Abstraction Layer • What is it? • Eliminates unauthorized Access. • De-normalized Database Access • Adaptable to database changes • Ease of Decision support.

  12. Application Role

  13. Logical Design

  14. Physical Design ERD

  15. Educational Resources Microsoft Educational Site

  16. Questions?

More Related