Report
Contents
Introduction 1
Analysis 1
Description 1
Conclusion 3
Reference 4
Introduction
The work is in NoSQL where there is a database developed in CA2, with the focus on MongoDb, with a platform that also includes the cyber security. The standards are based on the hacking, exploiting, and technologies, processes and the practices are designed to protect the networks with the data that comes from the attack. The application security, information, network security and disaster recovery, to handle the business continuity planning.
Analysis
The analysis is based on working over the traditional risks where the evolvement is based on the security risks, with focus on the resources to protect against the threats. The computer systems come from the theft or the damage to handle the hardware, software or the information which leads to the disruption or the misdirection. (Leffingwell et al., 2016). The access is based on the protection against the harm that comes with the network access, data and the code injection. The field of IT security is susceptible to being tricked into the deviation from the secured procedures. The vulnerabilities and attacks are based on understanding the attacks with classification on the denial of service attacks. The distribution is based on the denial of service attacks where the defending options are to handle the direct access attacks that tend to make the operating system modifications, with converting the listening of devices.
Description
The data warehousing includes the report with the data analysis where the consideration is about handling the business intelligence. (Filgueira et al., 2015). The data warehouse works on the forms where there is a storing of the current and the historical data is in a single place. The data is stored with the operational systems which tends to handle the data cleaning for the operational forms to ensure the data quality. The extraction, transformation and the loading is based on using the staging, integration of the data and accessing the data with certain key functions. The main focus is on the system handling with the operations of the data that tends to handle the hierarchical groups with the certain facts and the aggregate facts. The source of the data is cleansed with the transformation and the catalogues are set for the managers with the online analytical processing. The management of the data recovery is important with the loading into the repository with the tools to manage the data and retrieve the metadata.
Software Testing includes the unit testing, system testing, and integration testing, component testing. The unit tests are set for the development process which includes the smaller forms of the applications with units. This is for continual testing and revision with the development that requires the developer to write first and encourage the source code.
The integration testing is based on the software tests with the combined forms to tests and to expose the faults in the interaction which is set in between the integrated system. (Kirkland, 2015).
The component testing is based on the module and the program testing where the development life cycle model is set for the different types of the functioning of the software. The component testing is based on the finding of the bugs as well integration of the tests which is for ensuring the applications to work in effective manner.
Agile network is based on the software development which includes the loop and adaptation cycle either daily standards to focus on the software development methods to quality and testing methods. The documentation is based on the iterative approach which includes the product with the greater flexibility for the development process.
Conclusion
The agile software works on the software development with the collaborative effort to self-organization for the cross-functional systems. The software development is based on the individuals and interactions set for the working software with the presentation of the documents to the clients. The customer collaboration is based on the beginning of the software which responds to the focus on the responses to change and focus on the development in continuous form.
Reference
Leffingwell, D., Yakyma, A., Knaster, R., Jemilo, D. and Oren, I., 2016. SAFe® 4.0 Reference Guide: Scaled Agile Framework® for Lean Software and Systems Engineering.
Kirkland, C.E., 2015. Effective Complex Project Management: An Adaptive Agile Framework for Delivering Business Value. Project Management Journal, 46(5), pp.e3-e3.
Filgueira, R., Krause, A., Atkinson, M., Klampanos, I., Spinuso, A. and Sanchez-Exposito, S., 2015, August. dispel4py: An agile framework for data-intensive escience. In e-Science (e-Science), 2015 IEEE 11th International Conference on (pp. 454-464). IEEE.