System Implementation: SDLC Phase 4 Dr. Dania Bilal IS 582 Spring 2007 Steps in System Implementation: SDLC Phase 4 Coding Testing Installation Documentation Training Support Maintenance Evaluation Purpose of Implementation Convert the physical system specifications into working and reliable software and hardware Document the work that has been completed Provide assistance to users of system Operations to Understake From system design to operation Successful operation of the system Coding, testing, and installation Documentation, training, and support On-going operation of the system Maintenance Coding Process whereby the physical design specifications created by system developers are turned into working computer code by the programming team Testing Can begin as coding for each module is completed Modules can be tested individually and as part of the larger program Need to determine what to be tested and collect test data during both planning and implementation Software Testing How to do it? Check each module’s proper operation Check each peripheral (e.g., printers, scanners) to see how well it works with the software Make a list of the problems you encounter during testing and relay them to the vendor if you cannot solve them. Site Preparation Selection and placement of hardware Computer stations Lookup stations and placement Number of stations Administrative stations Number of stations Site Preparation Facility design Evaluation of existing layout (revisit) ADA requirements Cables, wires, etc. for the LAN Evaluation of existing hardware (revisit) Site Preparation Selection and placement of hardware Printers Number of printers needed Furniture Standards (K-12) Ergonomics Users with special needs Approaches to Installation Direct installation (for new system) Parallel installation (old and new system coexist) Single location installation (pilot approach by selecting pilot sites) Phase installation (staged, incremental based on system functional components) Documentation Two types System documentation User documentation System Documentation Detailed information about a system’s design specifications, its internal workings, and its functionality Internal (part of the program source code) External (all diagramming techniques such as data flow diagrams and entity relationship diagrams) User Documentation Manual containing information about how the application system works and how to use it. May include all or most of these: quick reference guide, user’s guide, release description (for a new version), system’s administrator’s guide, index, help, etc. Training Staff training On-site via software vendor (fee-based) All staff? A group of staff Off-site via software vendor (fee-based) Senior staff join other staff undergoing training Training Staff training Self-training Training others Frequency of training Evaluation Training User training When to do it? How to do it? Group presentations Web-based tutorial (self-paced) Class-integrated One-on-one Training User training Frequency of training Initial (new system) Subsequent training System update System migration (new training) Support Answer user questions about system Assist with wide range of computer needs and system access Provided through a help desk and online Local support Vendor technical support Maintenance Environmental care Endpoints of LAN (e.g., cabling) to be placed in a secure wiring closet Safety for staff and users Hardware safety Maintenance Environmental care Humidity: not to exceed 80% Hardware devices to be placed in cool and secure areas Hardware to be isolated from moisture, mold, and water Maintenance System backup Back up the files daily and weekly Make more than one backup copy Keep one backup copy outside of the library/agency for security purposes Make sure you have a UPS device Maintenance System security Install firewalls to protect the system/network from breaching into by computer hackers Install virus protection software Install locking devices to prevent theft of hardware (questionable!) Maintenance System security Have a security system to protect theft of materials Use Library Technology Reports to review and evaluate security systems Vendors of security systems/devices (see Text, p. 119; look up the topic on the Web) Evaluation of System Use Diagnosing problems OPAC use MARC records Circulation records Other areas Evaluation of System Use Keeping statistics Collection use, circulation, cataloging, etc. Transaction logs (OPAC) Some systems provide transaction logs of all types of searches performed in the OPAC. You will be able to extract data about successful and unsuccessful searches to diagnose problems. Evaluation of System Use Benefits of keeping statistics Collection development Staffing (scheduling) Need for hardware (computer stations, printers, etc.) Training (type and extent) Meeting state requirements Usability studies Database Maintenance Database clean-up (after installation and on a regular basis thereafter) Cataloging database (MARC 21 records) Accuracy & completeness during Recon See Bilal, pp. 122-124. Patron database Other databases, as applicable