SlideShare une entreprise Scribd logo
1  sur  9
Télécharger pour lire hors ligne
1
1
Software Source
and
Selection
Lecture 15
Abdisalam Issa-Salwe
Thames Valley University
Abdisalam Issa-Salwe, Thames Valley University
2
Topic list
 Software sources
 Invitation to tender
 Evaluating supplier proposals
 The advantage and disadvantage of
bespoke and off-the-shelf software
 Software contracts and licences
2
Abdisalam Issa-Salwe, Thames Valley University
3
Invitation to tender (ITT)
 Invitation to tender (ITT): A document
that invites to bid for the supply of
specified software or hardware or
both.
 Covering letter
 Instructions
 Detailed software requirements
 Details of development
model/methodology
 Request for details of the proposed
software contract
Abdisalam Issa-Salwe, Thames Valley University
4
Invitation to tender (ITT) (cont…)
 Example, tenders should include:
 An outline proposal and project management plan
for the study. This must include details of the
following:
 Objectives
 Deliverables, including a brief description (or
reference to an example) of the final report. This
will need to be accessible to wide audience,
including non-technical readers, and readily
publishable in electronic media.
 Milestones
 Principal work packages
3
Abdisalam Issa-Salwe, Thames Valley University
5
Evaluating supplier proposals
 Factors to consider:
 Organisational needs
 Speed
 Documentation
 Capability
 Controls
 Modification
 Demonstration
 Training provided
 Support, maintained and updates
 Conditions included in the software contract
 Supplier size, reputation and customer base
Abdisalam Issa-Salwe, Thames Valley University
6
Evaluating supplier proposals (cont…)
 The proposal should be a
comprehensive document that
provides the vendor with the outline,
purpose, scope, description, minimum
requirements, etc for the system.
4
Abdisalam Issa-Salwe, Thames Valley University
7
Purchasing hardware and software
 Software sources
 Standard off-the-shelf package: simplest
option.
 Amended standard package: some
customised is undertaken so the software
meets the organisations requirements
 Standard package plus additions:
additional software that integrates with
the standard package
 Bespoke package: programmers write an
application suitable for an organisation
Abdisalam Issa-Salwe, Thames Valley University
8
Choosing an application package
 Off-the-shelf package:
 User requirements
 Processing times
 Documentations
 Compatibility
 Controls
 User interfaces
 Modifications
 Support, maintenance and update
 Cost
5
Abdisalam Issa-Salwe, Thames Valley University
9
Developing a bespoke package
 Feasibility and analysis
 Design and program specification
 Coding
 testing
Abdisalam Issa-Salwe, Thames Valley University
10
Software
 Computer programs that
govern/determine/control the
operation of the computer
 Computer instructions or data
6
Abdisalam Issa-Salwe, Thames Valley University
11
Software (cont…)
Software is often divided into two
categories.
 Systems software includes the
operating system and all the utilities
that enable the computer to function.
 Applications software includes
programs that do real work for users.
For example, word processors,
spreadsheets, and database
management systems fall under the
category of applications software.
Abdisalam Issa-Salwe, Thames Valley University
12
Software (cont…)
 Operating systems: provide interface
between machine and user
 Utilities: designed to perform a task related
activity
 Programming tools: designed to help
programmer to create computer instructions
 Off-the-shelf applications: software produced
by software house in a form of ready to use
 Bespoke applications: tailor made to met the
needs of an organisation
7
Abdisalam Issa-Salwe, Thames Valley University
13
Software Development Life Cycle (cont…)
Systems Implementation
Product:
Operational System
Systems Investigation
Product:
Feasibility Study
Systems Analysis
Product:
Functional Requirements
Systems Design
Product:
System Specifications
Systems Maintenance
Product:
Improved System
Understand the
Business
Problem or
Opportunity
Develop an
Information
System
Solution
Implement
the Information
System
Solution
Traditional
Approach
Abdisalam Issa-Salwe, Thames Valley University
14
Advantages of Packaged Software
 The software tends to be relatively
cheap as the cost of development can
be spread over a large number of
users.
 The software can be very sophisticated
(eg Excel of Word) as the revenues
from a very large numbers of users
means that a lot of resources can be
applied to it's development.
8
Abdisalam Issa-Salwe, Thames Valley University
15
Drawbacks of Packaged Software
 The software can be highly complex and will usually
include large sections that you will never use (the
average Word user is reputed to only use about 10% of
the available facilities).
 It tends to be a compromise. By it's nature it is
designed for many different types of users, each of
whom will have different requirements.
 As the software tends to be large and complicated it
may take a long time to learn properly (some of the
most asked for additions to later versions of Word were
ones that already existed in the previous version - it
was just that the users did not know that they existed
because the application was so big).
 You may have to alter the way that you work in order to
fit in with the way that the software has been designed
Abdisalam Issa-Salwe, Thames Valley University
16
Advantages of Bespoke Software
 If you do not have the source code you are dangerously
exposed and are wholly dependent upon the developers
continuing existence and good will. To avoid this problem
make sure you choose a developer who provides you with the
source code.
 If the software is not developed to professional Best Practice
standards it may be unstable, unreliable and full of bugs (but
then again so is some packaged software!). Selecting a
developer who works to Best Practice should counteract this.
 The investment required will usually be much higher than with
packaged software. This is usually the biggest reason for not
going down the custom route - you need to undertake a
business justification excercise and compare the costs against
the expected benefits and commercial advantages.
 An unacceptable proportion of developers are either
incompetent, unprofessional or are 'cowboys' and it can be
difficult to sort out the good guys from the bad (the most
reliable method is to take up references and talk to some of
their recent clients).
9
Abdisalam Issa-Salwe, Thames Valley University
17
Software licences
 It is very important that all software to
be used in accordance with licence
conditions associated with the
software package.
 Software refers to the computer
programs listed in the chapter Object
of the Contract, both in the present
form and in all other machine-readable
forms; this also includes all updates
and security copies made by the
licensee.
Abdisalam Issa-Salwe, Thames Valley University
18
The software is protected by copyright.

Contenu connexe

Tendances

Brandon Felix Resume
Brandon Felix ResumeBrandon Felix Resume
Brandon Felix Resume
Brandon Felix
 
Ritam Bose_Webspheresupport_unix
Ritam Bose_Webspheresupport_unixRitam Bose_Webspheresupport_unix
Ritam Bose_Webspheresupport_unix
RItam Bose
 
Resume_Prachi_Rattan_2016
Resume_Prachi_Rattan_2016Resume_Prachi_Rattan_2016
Resume_Prachi_Rattan_2016
Prachi Rattan
 

Tendances (16)

Elmer_Santos_CV
Elmer_Santos_CVElmer_Santos_CV
Elmer_Santos_CV
 
Ch1
Ch1Ch1
Ch1
 
Mohammad_CV
Mohammad_CVMohammad_CV
Mohammad_CV
 
Career assignment powerpoint final
Career assignment powerpoint finalCareer assignment powerpoint final
Career assignment powerpoint final
 
Part 5.1 Hardware | Software | System Software | Application Software
Part 5.1 Hardware | Software | System Software | Application SoftwarePart 5.1 Hardware | Software | System Software | Application Software
Part 5.1 Hardware | Software | System Software | Application Software
 
Brandon Felix Resume
Brandon Felix ResumeBrandon Felix Resume
Brandon Felix Resume
 
RockeyP_res
RockeyP_resRockeyP_res
RockeyP_res
 
se
sese
se
 
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONSCYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
 
How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..
 
Ahmed_Yahia_CV
Ahmed_Yahia_CVAhmed_Yahia_CV
Ahmed_Yahia_CV
 
Dental Clinic Managmement Software that available in both online and offline
Dental Clinic Managmement Software that available in both online and offlineDental Clinic Managmement Software that available in both online and offline
Dental Clinic Managmement Software that available in both online and offline
 
Ritam Bose_Webspheresupport_unix
Ritam Bose_Webspheresupport_unixRitam Bose_Webspheresupport_unix
Ritam Bose_Webspheresupport_unix
 
Fundamentals of Computing Chapter 7
Fundamentals of Computing Chapter 7Fundamentals of Computing Chapter 7
Fundamentals of Computing Chapter 7
 
1
11
1
 
Resume_Prachi_Rattan_2016
Resume_Prachi_Rattan_2016Resume_Prachi_Rattan_2016
Resume_Prachi_Rattan_2016
 

En vedette

Designing the Systems Sciences - AHO, Oslo, Oct 2012
Designing the Systems Sciences - AHO, Oslo, Oct 2012 Designing the Systems Sciences - AHO, Oslo, Oct 2012
Designing the Systems Sciences - AHO, Oslo, Oct 2012
Peter Jones
 
Designing Futures to Flourish: ISSS 2015 keynote
Designing Futures to Flourish: ISSS 2015 keynoteDesigning Futures to Flourish: ISSS 2015 keynote
Designing Futures to Flourish: ISSS 2015 keynote
Peter Jones
 
ISSS Visual Languages in Systemic Design
ISSS Visual Languages in Systemic DesignISSS Visual Languages in Systemic Design
ISSS Visual Languages in Systemic Design
Peter Jones
 

En vedette (20)

Lecture1 data structure(introduction)
Lecture1 data structure(introduction)Lecture1 data structure(introduction)
Lecture1 data structure(introduction)
 
Lecture1 is313-(is-innovation&tech)
Lecture1 is313-(is-innovation&tech)Lecture1 is313-(is-innovation&tech)
Lecture1 is313-(is-innovation&tech)
 
Systems Thinking Powerpoint for
Systems Thinking Powerpoint for Systems Thinking Powerpoint for
Systems Thinking Powerpoint for
 
Systems for sustainability workshop
Systems for sustainability workshopSystems for sustainability workshop
Systems for sustainability workshop
 
Lecture3 is353-ea(togaf)
Lecture3 is353-ea(togaf)Lecture3 is353-ea(togaf)
Lecture3 is353-ea(togaf)
 
Lecture4 is353-ea(fea)
Lecture4 is353-ea(fea)Lecture4 is353-ea(fea)
Lecture4 is353-ea(fea)
 
Lecture1 is441-(intro toe-commerce)
Lecture1 is441-(intro toe-commerce)Lecture1 is441-(intro toe-commerce)
Lecture1 is441-(intro toe-commerce)
 
SoftSystemsMethodology(Lecture2)
SoftSystemsMethodology(Lecture2)SoftSystemsMethodology(Lecture2)
SoftSystemsMethodology(Lecture2)
 
Lecture6 is353(ea&data viewpoint )
Lecture6 is353(ea&data viewpoint )Lecture6 is353(ea&data viewpoint )
Lecture6 is353(ea&data viewpoint )
 
Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)
 
Designing the Systems Sciences - AHO, Oslo, Oct 2012
Designing the Systems Sciences - AHO, Oslo, Oct 2012 Designing the Systems Sciences - AHO, Oslo, Oct 2012
Designing the Systems Sciences - AHO, Oslo, Oct 2012
 
Lecture1 is353-enterprise architectureconcept)
Lecture1 is353-enterprise architectureconcept)Lecture1 is353-enterprise architectureconcept)
Lecture1 is353-enterprise architectureconcept)
 
Designing Futures to Flourish: ISSS 2015 keynote
Designing Futures to Flourish: ISSS 2015 keynoteDesigning Futures to Flourish: ISSS 2015 keynote
Designing Futures to Flourish: ISSS 2015 keynote
 
ISSS Visual Languages in Systemic Design
ISSS Visual Languages in Systemic DesignISSS Visual Languages in Systemic Design
ISSS Visual Languages in Systemic Design
 
Systems Thinking workshop @ Lean UX NYC 2014
Systems Thinking workshop @ Lean UX NYC 2014Systems Thinking workshop @ Lean UX NYC 2014
Systems Thinking workshop @ Lean UX NYC 2014
 
Soft Systems Methodology: A brief introduction
Soft Systems Methodology: A brief introductionSoft Systems Methodology: A brief introduction
Soft Systems Methodology: A brief introduction
 
Lecture2 is353-ea(the zachma framework)
Lecture2 is353-ea(the zachma framework)Lecture2 is353-ea(the zachma framework)
Lecture2 is353-ea(the zachma framework)
 
Thinking about systems thinking
Thinking about systems thinkingThinking about systems thinking
Thinking about systems thinking
 
Introduction
IntroductionIntroduction
Introduction
 
SoftSystemsMethodology lecture1
SoftSystemsMethodology lecture1SoftSystemsMethodology lecture1
SoftSystemsMethodology lecture1
 

Similaire à Acca 15(software source&selection)

Week 7 - Choices in Systems Acquisition and Risks, Security,.docx
Week 7 - Choices in Systems Acquisition and Risks, Security,.docxWeek 7 - Choices in Systems Acquisition and Risks, Security,.docx
Week 7 - Choices in Systems Acquisition and Risks, Security,.docx
helzerpatrina
 

Similaire à Acca 15(software source&selection) (20)

Week 7 - Choices in Systems Acquisition and Risks, Security,.docx
Week 7 - Choices in Systems Acquisition and Risks, Security,.docxWeek 7 - Choices in Systems Acquisition and Risks, Security,.docx
Week 7 - Choices in Systems Acquisition and Risks, Security,.docx
 
Software Evaluation
Software EvaluationSoftware Evaluation
Software Evaluation
 
The Product and Process(1).pdf
The Product and Process(1).pdfThe Product and Process(1).pdf
The Product and Process(1).pdf
 
software development and programming languages
software development and programming languages software development and programming languages
software development and programming languages
 
SoftwareEngineering.pptx
SoftwareEngineering.pptxSoftwareEngineering.pptx
SoftwareEngineering.pptx
 
SoftwareEngineering.pptx
SoftwareEngineering.pptxSoftwareEngineering.pptx
SoftwareEngineering.pptx
 
Swe notes
Swe notesSwe notes
Swe notes
 
Criteria for selecting ERP Software Vendors
Criteria for selecting ERP Software VendorsCriteria for selecting ERP Software Vendors
Criteria for selecting ERP Software Vendors
 
Ch1 introduction
Ch1 introductionCh1 introduction
Ch1 introduction
 
Ian Sommerville, Software Engineering, 9th Edition Ch1
Ian Sommerville,  Software Engineering, 9th Edition Ch1Ian Sommerville,  Software Engineering, 9th Edition Ch1
Ian Sommerville, Software Engineering, 9th Edition Ch1
 
Session3
Session3Session3
Session3
 
Lecture-1,2-Introduction to SE.pptx
Lecture-1,2-Introduction to SE.pptxLecture-1,2-Introduction to SE.pptx
Lecture-1,2-Introduction to SE.pptx
 
labiqa'd.pptx
labiqa'd.pptxlabiqa'd.pptx
labiqa'd.pptx
 
What is software engineering
What is software engineeringWhat is software engineering
What is software engineering
 
Principles of responsible suppliers
Principles of responsible suppliersPrinciples of responsible suppliers
Principles of responsible suppliers
 
13 Tips to Choose the Perfect Tech Stack
13 Tips to Choose the Perfect Tech Stack13 Tips to Choose the Perfect Tech Stack
13 Tips to Choose the Perfect Tech Stack
 
Anajli_Synopsis
Anajli_SynopsisAnajli_Synopsis
Anajli_Synopsis
 
Software engineering introduction
Software engineering introductionSoftware engineering introduction
Software engineering introduction
 
SaaS Presentation
SaaS PresentationSaaS Presentation
SaaS Presentation
 
Chapter 01 - Introduction.pdf
Chapter 01 - Introduction.pdfChapter 01 - Introduction.pdf
Chapter 01 - Introduction.pdf
 

Plus de Taibah University, College of Computer Science & Engineering

Plus de Taibah University, College of Computer Science & Engineering (20)

Lecture 1- Computer Organization and Architecture.pdf
Lecture 1- Computer Organization and Architecture.pdfLecture 1- Computer Organization and Architecture.pdf
Lecture 1- Computer Organization and Architecture.pdf
 
The paper the welfare state of the somali nation - a possible solution to t...
The paper   the welfare state of the somali nation - a possible solution to t...The paper   the welfare state of the somali nation - a possible solution to t...
The paper the welfare state of the somali nation - a possible solution to t...
 
Colonial intrusion and_the_somali_resistance
Colonial intrusion and_the_somali_resistanceColonial intrusion and_the_somali_resistance
Colonial intrusion and_the_somali_resistance
 
Lecture 3 (Contemporary approaches to Information Systems)
Lecture 3 (Contemporary approaches to Information Systems)Lecture 3 (Contemporary approaches to Information Systems)
Lecture 3 (Contemporary approaches to Information Systems)
 
Lecture 7 (business-level strategy and the value chain model)
Lecture 7  (business-level strategy and the value chain model)Lecture 7  (business-level strategy and the value chain model)
Lecture 7 (business-level strategy and the value chain model)
 
Lecture 4 (using information technology for competitive advantage)
Lecture 4 (using information technology for competitive advantage)Lecture 4 (using information technology for competitive advantage)
Lecture 4 (using information technology for competitive advantage)
 
Lecture 2 (major types of information systems in organizations)
Lecture 2 (major types of information systems in organizations)Lecture 2 (major types of information systems in organizations)
Lecture 2 (major types of information systems in organizations)
 
Practical session 1 (critical path analaysis)
Practical session 1 (critical path analaysis)Practical session 1 (critical path analaysis)
Practical session 1 (critical path analaysis)
 
Chapter 2 modeling the process and life-cycle
Chapter 2  modeling the process and life-cycleChapter 2  modeling the process and life-cycle
Chapter 2 modeling the process and life-cycle
 
Historical Perspective on the Challenge Facing the Somali Sacral Unity
Historical Perspective on the Challenge Facing the Somali Sacral UnityHistorical Perspective on the Challenge Facing the Somali Sacral Unity
Historical Perspective on the Challenge Facing the Somali Sacral Unity
 
Colonial intrusion and the Somali Resistance
Colonial intrusion and the Somali ResistanceColonial intrusion and the Somali Resistance
Colonial intrusion and the Somali Resistance
 
Lecture 8 (information systems and strategy planning)
Lecture 8  (information systems and strategy planning)Lecture 8  (information systems and strategy planning)
Lecture 8 (information systems and strategy planning)
 
Lecture 4 (using information technology for competitive advantage)
Lecture 4 (using information technology for competitive advantage)Lecture 4 (using information technology for competitive advantage)
Lecture 4 (using information technology for competitive advantage)
 
Lecture2 is331 data&infomanag(databaseenv)
Lecture2 is331 data&infomanag(databaseenv)Lecture2 is331 data&infomanag(databaseenv)
Lecture2 is331 data&infomanag(databaseenv)
 
Lab 1 (cs351) (computer tech & c++)
Lab 1 (cs351) (computer tech & c++)Lab 1 (cs351) (computer tech & c++)
Lab 1 (cs351) (computer tech & c++)
 
Is421 lecture01(intro to knowledge management systems)
Is421 lecture01(intro to knowledge management systems)Is421 lecture01(intro to knowledge management systems)
Is421 lecture01(intro to knowledge management systems)
 
Is 414 lecture 1 (inform centremanag)
Is 414 lecture 1 (inform centremanag)Is 414 lecture 1 (inform centremanag)
Is 414 lecture 1 (inform centremanag)
 
Lecture1 (is342) (office automationsystems)
Lecture1  (is342) (office automationsystems)Lecture1  (is342) (office automationsystems)
Lecture1 (is342) (office automationsystems)
 
Chapter5 is344(gis)(selecting landscape features)
Chapter5 is344(gis)(selecting landscape features)Chapter5 is344(gis)(selecting landscape features)
Chapter5 is344(gis)(selecting landscape features)
 
Chapter4 is344(gis)(map design)
Chapter4 is344(gis)(map design)Chapter4 is344(gis)(map design)
Chapter4 is344(gis)(map design)
 

Dernier

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
SoniaTolstoy
 

Dernier (20)

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 

Acca 15(software source&selection)

  • 1. 1 1 Software Source and Selection Lecture 15 Abdisalam Issa-Salwe Thames Valley University Abdisalam Issa-Salwe, Thames Valley University 2 Topic list  Software sources  Invitation to tender  Evaluating supplier proposals  The advantage and disadvantage of bespoke and off-the-shelf software  Software contracts and licences
  • 2. 2 Abdisalam Issa-Salwe, Thames Valley University 3 Invitation to tender (ITT)  Invitation to tender (ITT): A document that invites to bid for the supply of specified software or hardware or both.  Covering letter  Instructions  Detailed software requirements  Details of development model/methodology  Request for details of the proposed software contract Abdisalam Issa-Salwe, Thames Valley University 4 Invitation to tender (ITT) (cont…)  Example, tenders should include:  An outline proposal and project management plan for the study. This must include details of the following:  Objectives  Deliverables, including a brief description (or reference to an example) of the final report. This will need to be accessible to wide audience, including non-technical readers, and readily publishable in electronic media.  Milestones  Principal work packages
  • 3. 3 Abdisalam Issa-Salwe, Thames Valley University 5 Evaluating supplier proposals  Factors to consider:  Organisational needs  Speed  Documentation  Capability  Controls  Modification  Demonstration  Training provided  Support, maintained and updates  Conditions included in the software contract  Supplier size, reputation and customer base Abdisalam Issa-Salwe, Thames Valley University 6 Evaluating supplier proposals (cont…)  The proposal should be a comprehensive document that provides the vendor with the outline, purpose, scope, description, minimum requirements, etc for the system.
  • 4. 4 Abdisalam Issa-Salwe, Thames Valley University 7 Purchasing hardware and software  Software sources  Standard off-the-shelf package: simplest option.  Amended standard package: some customised is undertaken so the software meets the organisations requirements  Standard package plus additions: additional software that integrates with the standard package  Bespoke package: programmers write an application suitable for an organisation Abdisalam Issa-Salwe, Thames Valley University 8 Choosing an application package  Off-the-shelf package:  User requirements  Processing times  Documentations  Compatibility  Controls  User interfaces  Modifications  Support, maintenance and update  Cost
  • 5. 5 Abdisalam Issa-Salwe, Thames Valley University 9 Developing a bespoke package  Feasibility and analysis  Design and program specification  Coding  testing Abdisalam Issa-Salwe, Thames Valley University 10 Software  Computer programs that govern/determine/control the operation of the computer  Computer instructions or data
  • 6. 6 Abdisalam Issa-Salwe, Thames Valley University 11 Software (cont…) Software is often divided into two categories.  Systems software includes the operating system and all the utilities that enable the computer to function.  Applications software includes programs that do real work for users. For example, word processors, spreadsheets, and database management systems fall under the category of applications software. Abdisalam Issa-Salwe, Thames Valley University 12 Software (cont…)  Operating systems: provide interface between machine and user  Utilities: designed to perform a task related activity  Programming tools: designed to help programmer to create computer instructions  Off-the-shelf applications: software produced by software house in a form of ready to use  Bespoke applications: tailor made to met the needs of an organisation
  • 7. 7 Abdisalam Issa-Salwe, Thames Valley University 13 Software Development Life Cycle (cont…) Systems Implementation Product: Operational System Systems Investigation Product: Feasibility Study Systems Analysis Product: Functional Requirements Systems Design Product: System Specifications Systems Maintenance Product: Improved System Understand the Business Problem or Opportunity Develop an Information System Solution Implement the Information System Solution Traditional Approach Abdisalam Issa-Salwe, Thames Valley University 14 Advantages of Packaged Software  The software tends to be relatively cheap as the cost of development can be spread over a large number of users.  The software can be very sophisticated (eg Excel of Word) as the revenues from a very large numbers of users means that a lot of resources can be applied to it's development.
  • 8. 8 Abdisalam Issa-Salwe, Thames Valley University 15 Drawbacks of Packaged Software  The software can be highly complex and will usually include large sections that you will never use (the average Word user is reputed to only use about 10% of the available facilities).  It tends to be a compromise. By it's nature it is designed for many different types of users, each of whom will have different requirements.  As the software tends to be large and complicated it may take a long time to learn properly (some of the most asked for additions to later versions of Word were ones that already existed in the previous version - it was just that the users did not know that they existed because the application was so big).  You may have to alter the way that you work in order to fit in with the way that the software has been designed Abdisalam Issa-Salwe, Thames Valley University 16 Advantages of Bespoke Software  If you do not have the source code you are dangerously exposed and are wholly dependent upon the developers continuing existence and good will. To avoid this problem make sure you choose a developer who provides you with the source code.  If the software is not developed to professional Best Practice standards it may be unstable, unreliable and full of bugs (but then again so is some packaged software!). Selecting a developer who works to Best Practice should counteract this.  The investment required will usually be much higher than with packaged software. This is usually the biggest reason for not going down the custom route - you need to undertake a business justification excercise and compare the costs against the expected benefits and commercial advantages.  An unacceptable proportion of developers are either incompetent, unprofessional or are 'cowboys' and it can be difficult to sort out the good guys from the bad (the most reliable method is to take up references and talk to some of their recent clients).
  • 9. 9 Abdisalam Issa-Salwe, Thames Valley University 17 Software licences  It is very important that all software to be used in accordance with licence conditions associated with the software package.  Software refers to the computer programs listed in the chapter Object of the Contract, both in the present form and in all other machine-readable forms; this also includes all updates and security copies made by the licensee. Abdisalam Issa-Salwe, Thames Valley University 18 The software is protected by copyright.