Full terminal message push solution--research and feasibility analysis report

Topic requirements

  • Please identify all stakeholders of this team project and post the findings to the team blog
  • Ask all team members to determine the outline of the demand survey for the target users, and conduct demand research. You can take various methods that you think are feasible, and publish the research process and results on the team blog.
  • Please identify and prioritize the features of the project
  • Please complete the project feasibility analysis according to the provided "Feasibility Analysis Report Template", please publish the report in the "Graphite Document", the specific operation method is Baidu, and the document link is published in the blog. For the specific method, please refer to this document.

project stakeholders

The stakeholders of the project include developers. If you consider cooperating with the host company to speed up the promotion during operation, the stakeholders include the host company, and the project users are located in small and medium-sized enterprises and groups, which are also stakeholders. which is

  • Project development team
  • server host
  • Clients and Users: Small and Medium Businesses and Organizations

Project development team

Undoubtedly, the project development team is the direct stakeholder of this project. The development team has spent a certain amount of manpower and material costs for the development of this project, and has to pay a certain cost in terms of promotion and maintenance.

server host

According to the promotion method of the project, a reasonable direction is to cooperate with the server host company to sell the project as a value-added product with automatic deployment services, so that the operation and maintenance personnel of the target users can easily build and manage the services provided by the project. In the process of cooperation, the server host company increases the sales of the host on the one hand, and on the other hand, obtains part of the income from the value-added services paid by the user.

customers and users

Our project locates users in small and medium-sized enterprises and groups, provides product authorization to enterprise users, or manages and operates on their behalf. Users who purchase authorization can obtain continuous upgrade services of the project by paying or pay for management and operation.

requesting research

According to the nature and orientation of the project, we communicated with the staff of several companies in the form of interviews, and collected and organized some information

1. Conversation with the staff of Hon Hai Precision Industry Co., Ltd. (Foxconn)

Q: How do you communicate within your company?

Communication is by email, and the email service is built within the company.

Q: So how do the staff share data and transfer files?

Small files are sent by e-mail, and large files are sent by SFTP.

Q: How does the company ensure information security?

The transmission of documents and information within the company is on the intranet, and you must go through the security inspection machine before going to work.

2. Conversations with staff who have worked at ZTE and learned about the working models of OPPO, VIVO and Huawei

Q: What way do you know how the company communicates internally?

The models of OPPO and VIVO are similar. The mobile phone can be connected to the external network through wifi, and communicate with QQ and WeChat. This kind of software is not allowed to be installed on the computer. Most manufacturers have OA systems and emails. Generally, they use Ali or Netease. There are some enterprise mailboxes, and some are built-in mail services within the company. Both companies have access to the Internet.

Huawei has a whole set of systems similar to CSDN for staff to retrieve data and cannot access the external network.

Q: How do the above companies share files internally?

OPPO and VIVO share files internally through network hard drives, using Microsoft Office and Kingsoft Office, both of which are internal self-built servers. Huawei has a whole set of systems similar to CSDN for staff to retrieve data and cannot access the external network.

Q: How do you share files between the staff of the company you are currently working for?

The company's intranet has a set of Gitlab system, which can upload files and documents, usually upload markdown files for technical sharing.

Project features

front end

The three platforms included in the front-end part all try to achieve the same function, namely

  • User registration

According to platform management personnel and company requirements, users with specified conditions can be set to register, such as a designated job number, or unified registration by management personnel.

  • Authentication

When the user logs in, the user data is verified, and the encrypted data will not be leaked during the entire interaction process.

  • division of authority

Divide the permissions of users and assign them to different groups according to their positions.

  • Message sending and modification

Divide users into different groups, such as UI design group, test group, users can send messages to their own group or a higher group, or send messages one-to-one, and edit the messages that have been sent or delete.

  • File upload and modification

Similar to message sending, users can upload files to the group they belong to or include themselves, or send them one-to-one. The files uploaded to the server can be deleted or replaced.

  • Document online viewing

For files that have been uploaded to the server, such as pdf, markdown provides online rendering and viewing.

back end part

The back-end part handles all requests from the front-end, and the functions are

  • request response

Receive a prompt response to the front-end request, process the uploaded file or sent message, and encrypt and verify the transmitted information.

  • database interaction

Add, modify and query database data according to front-end requests.

  • Data Backup and Recovery

Regularly incrementally back up data to designated storage and provide recovery in the event of a system failure.

  • Data Security

Encrypt the data stored in the database to ensure that user data will not be stolen even if it is hacked.

  • system update

When there is an update, there are certain countermeasures, such as load balancing or announcement, and update at a reasonable time, including storage update, that is, converting the storage format data before the update into the updated format.

Feature Prioritization

Front-end interactive part priority
User registration high
user login high
message sending high
File Upload middle
division of authority middle
Transmission encryption high
Backend logic part priority
message response high
database interaction high
Data Security high
Data Backup and Recovery middle
system update Low

Guess you like

Origin http://43.154.161.224:23101/article/api/json?id=325071410&siteId=291194637