System Integration|Basic Knowledge (Notes)


Next: Chapter 1, Informatization Knowledge

foreword

The following content is the notes I 《系统集成项目管理工程师教程(第二版)》made while reading this book, and I also wrote related mind maps, which can be accessed through

System Integration-Mind Map (Xmind) Notes This blog is obtained, which may be helpful to some people who need to take relevant certificates.


1. Basic knowledge


1. Standard

Classification according to custom organization and scope of use:

  • International standard:
    • Overview: Refers to the standards specified by the International Organization for Standardization (ISO), the International Electrotechnical Commission (IEc) and the International Telecommunication Union (ITU), as well as the standards specified by other international organizations confirmed and published by the ISO. International standards are used uniformly around the world and provide reference for countries.
    • Example: cac - Codex Alimentarius Standard
  • National standard:
    • Overview: Refers to the standards that are customized or approved by the national standardization authority and used uniformly across the country.
    • Example: GB (GB/t) - National Standard of the People's Republic of China
  • Industry Standard:
    • Overview: It is a standard formulated by an industry organization, group, etc., and applicable to a specific industry business field.
    • Example: yz — postal industry standard
  • Regional/Local Standards:
    • Overview: Refers to the standards adopted by a certain region of the world for standardization.
  • Enterprise standard:
    • Overview: It is an enterprise-wide standard formulated according to the needs of coordination and unified technical requirements, management requirements and salary requirements, and is applicable to the internal standards of the enterprise.
    • For example: q/32010rer007-2012 — 32010 represents the region, rer represents the code name of the enterprise name, 007 represents the serial number of the standard of the enterprise, and 2021 represents the year number

Classified by type:

  • Mandatory standard:
    • Overview: Refers to the standards for the protection of human health, personal and property safety, and the standards enforced by laws and administrative laws.
    • Examples: drug standards, food hygiene standards
  • Recommended standard:
    • Overview: Also known as non-mandatory standards or voluntary standards. Refers to a class of standards that are voluntarily adopted through economic means or market regulation in the process of production, exchange, and use.
    • Example: Guiding Standards

Compare:

mandatory standard recommended standard
With the characteristics of legal attributes, they are technical regulations, which are endowed by people in the form of legislation according to the importance of standards, economic development and other situations and needs. It does not have the characteristics of legal attributes, belongs to technical documents, and does not have the function of compulsory execution
In terms of technical content, the regulations are generally more specific, clear and detailed, but lack market adaptability In terms of technical content, the general regulations are not specific enough, but relatively simple, general and flexible, and have strong market adaptability
Many mandatory inspection items There are few mandatory inspection items, and there are many items for users to choose or for mutual agreement, so the flexibility is slightly greater
Poor versatility and limited coverage Strong versatility and large coverage

In my country, the mandatory national standard is code-named GB, the recommended national standard is code-named GB/t, the national standard guiding document is code-named GB/z, and the national military standard is code-named gjb.

Specifications of technical standards:

  1. Document Management Guide
  2. quality characteristic standard
  3. Specifications for Engineering Design of Computer Room
  4. Software Quality Assurance Specification

2. Terminology

Abstraction : An overview of a problem, which extracts the essential content related to a specific goal and ignores other non-essential content.

Acceptance Criteria : Criteria that must be met by a system or component in order to achieve acceptance by a user, customer or other authorized entity.

Acceptance Testing : Determining whether a system complies with its acceptance criteria, enabling the customer to determine whether to accept formal approval of the system.

Activity : An integral element of a process for which changes to the baseline are formally approved by the relevant organization.

Availability : The degree to which software (system or component) is operational and accessible or the probability that it will perform its specified system function when put into use.

Baseline : After formal review and approval, it can be used as the basis for further development, and the specification or product that can only be modified by the management project through formal modification management. The configuration identification file and this group of such files that are formally formulated or determined within a certain period of time in the configuration project life cycle.

Three baselines for configuration management:

  • Functional Baseline: Initially passed functional configuration
  • Allocation Baseline: Configuration of the allocation initially passed
  • Product Baseline: Initially passed or conditionally passed product configuration

Data dictionary : A collection of the names of all data items used in the software system and the characteristics related to these data (such as data item length, representation, etc.).

Dependency : A relationship between two modeling elements such that a change to one (the independent element) affects the other (the dependent element).

Verification : The process of determining whether the product of a given stage in the software development cycle meets the requirements established at the previous stage.

Testing : The process of consciously discovering design errors and coding errors in the program by executing the program. Testing is one of the means of verification and confirmation.

Software development method : refers to the methods and steps followed in the software development process. The purpose of software development activities is to efficiently obtain some work product, that is, a running system and its supporting documentation, and to meet related quality requirements.

Example: rapid prototyping - a development method alongside structured and object-oriented

Software Documentation Management Guidelines :

Document: A type of data and the data it records, which is permanent and can be read by humans or machines. Usually only used for human-readable content.

Classification:

  • technical documentation
  • design document
  • Acceptance document

The role of software documentation:

  1. Management basis
  2. Credentials for linkage between tasks
  3. quality assurance

Software Documentation Level:

  1. Minimum Documentation (Level 1 Documentation)
  2. Internal Documentation (Level 2 Documentation)
  3. Working Documentation (Level 3 Documentation)
  4. Formal Documentation (Level 4 Documentation)

Software Maintenance Guide :

Bottom-up approach—汇总 : In hierarchical software, a development method that expands from the bottom layer up to the top layer.
Top-Down Approach —分解 : In hierarchical software, a development method that expands from the highest level down to the lowest level.
Peer Review : A quality assurance method in which two or more programmers check against each other, evaluating each other to ensure that what is checked is correct and consistent with the rest of the software.


Software maintenance : Modification activities performed after a software product has been delivered to correct faults, improve performance and other attributes, or adapt the product to changed environments.

Classification:

  • Perfection maintenance : modify and expand to expand functions and improve performance, so as to meet the changing needs of users.
    • It mainly includes: ① Modifications for expanding or enhancing functions; ② Modifications for improving performance; ③ Modifications for convenience and maintenance
  • Adaptive maintenance : Modifications made to adapt to changes in the environment in which the software operates.
    • For example: system regulations, changes in laws and regulations; changes in hardware configuration; changes in data formats, etc.
  • Corrective Maintenance : Correction of errors that occurred during the development process but were not found during testing and acceptance in order to maintain system operation.
    • The errors that must be corrected include: ① Design errors; ② Logic errors; ③ Coding errors; ④ Document errors; ⑤ Data errors
  • Preventive maintenance : In order to improve the reliability and maintainability of the software, and to adapt to future changes in the software and hardware environment, preventive new functions should be added actively so that the software can adapt to various changes and not be eliminated.
    • For example: Change the special report function to the general report generation function to adapt to the changes of the cities in the report in the future.

Templates, forms, and standards : use the templates, forms, and standards of the previous project and modify them in conjunction with this project. This tool and technology can be adopted when preparing some plans and programs. It can be used immediately, and its advantages are saving time and improving quality.

Product Analysis : Transform the description of the product into deliverables (products) by some means. Here are some of the methods that are common in scope definitions.

Inspection : Sometimes we refer to inspection in a narrow sense, like checking which checklist to check, ticking some, and crossing if not; but sometimes we refer to inspection in a broad sense, including mistakes, product reviews, audits, etc.

Published Estimates : Generally refers to published data that can be used.

Bottom-up : Summarize from the bottom up.

Top-down : Decompose from top to bottom.

Analogous estimation : Estimate the situation of this project (stage) by referring to some situations of other projects (stages), which is generally used when there is little information about the project.

Parameter estimation : Estimated by means of mathematical modeling. It is a more abstract concept.

Three-point estimation (PERT) : through optimistic, pessimistic, and most likely time calculations. It can evaluate the relationship between time and probability, and can also be used for risk assessment.

Back-up analysis : Risks are usually considered in project planning, which is a kind of reserve and redundant thinking.

Rolling wave plan : The short-term plan should be arranged as detailed as possible, and the later arrangement can be rougher.

Gantt chart (horizontal chart) : A tool for progress management. The Gantt chart is one of the earliest attempts to link activities with time for the purpose of job sorting. It helps companies describe the use of resources such as work centers and overtime work.

Gantt chart contains three meanings:

  1. Display activity in graphical or tabular form
  2. Generic way to display progress
  3. Construct with calendar days and duration, weekends and holidays are not included in the schedule

Critical chain method : A network analysis technique that adjusts the project schedule according to limited resources. Generally speaking, some "buffers" need to be added, so it will also affect the project schedule.

Critical path method : In a network diagram, the longest path from the start point to the end point is called the critical path.

Schedule Compression : Not the same as shortening the duration. This is a way to shorten the project schedule without changing the scope of the project, etc. Achieving schedule compression can be achieved by crashing and parallel work.

What-if scenario analysis : If a situation arises, how do we need to deal with it. For example, if a force majeure factor occurs, what impact will it have on the project?

Determine the resource rate : It is to clarify the unit price of resources for each commodity. Finally, the total price is obtained by multiplying the quantity and the unit price.

Supplier bidding analysis : According to the quotation provided by the bidder, analyze the possible cost price of the commodity.

Cost summary : It is to add the costs of each activity together, and the sum obtained is the cost summary.

Balance of capital constraints : It is recommended to spend money steadily in the project, and do not want capital expenditure to fluctuate too much.

Contingency reserves : Project managers are free to use, within the cost baseline, for known and unknown events.

Management Reserve : Not freely available to the project manager as it is included within the cost baseline for unknown unknown events.

Forecasting technology : Forecasting based on earned value analysis is divided into typical and atypical, which must be distinguished.

Benefit/cost analysis : It is to consider cost and output, try to spend less and do more. It means value for money.

Benchmarking : Comparing a project's actual or planned practices with those of other projects to generate ideas for improvement and propose standards for measuring performance.

Experimental design : It is a statistical method, that is, it is possible to make multiple plans and select a teaching one through experimental judgment.

Quality cost : high quality and high cost. The total cost of all efforts to achieve the quality requirements of a product or service.

Prevention cost : The cost spent on prevention.

Evaluation cost : the cost of checking, testing, and evaluating data.

Defect cost :

  • Internal defect cost: refers to the expenses incurred in the company to make up for product failures and failures before delivery.
    • For example: product replacement, rework or repair, scrap and scrap, retesting, defect diagnosis, correction of internal faults, etc. are all internal defect costs.
  • External Defect Costs: Refers to costs incurred outside the company, usually at the request of customers.
    • For example: product complaint evaluation, product warranty period complaints, product returns, increased marketing expenses to make up for lost customers, scrap recalls, product liability, customer return visits to solve problems, etc. are all external defect costs.

Flow chart : used to help analyze the cause of the problem. Note that it shows the interaction between various elements of a system, which is different from a causal diagram.

Cause-and-effect diagram : It is mainly used to find out what is the cause of this problem.

Permutation chart : also called Pareto chart, that is, the 80/20 principle, which is mainly used to find the small part of the cause of most problems.

Control Chart : A chart with an upper and lower control limit that is acceptable if it falls within this interval.

Quality function deployment : A method of quality planning, which needs to first identify the customer's quality requirements, mainly functional requirements, and then match the customer's functional requirements with the characteristics of the provided product or service to form a matrix, and then clarify some technical parameters of the product or service.

Process decision-making process diagram method : When planning, analyze the process of achieving this goal, and need to consider various possible changes, formulate plans and contingency measures, and then, in the process of implementation, make adjustments according to changes in the situation, so that we can achieve the goal smoothly.

Quality Audit : A structured and independent evaluation method, through which we can see whether our quality assurance activities are implemented correctly and what the results are, so that corresponding measures can be taken later. It can be planned or random, and it can be done internally or by a third party.

Informal networking : Just everyday, informal communication.

Pre-assignment : Arrange some important people in advance.

Virtual team : For example, some people are organized through the Internet, and everyone can work without face-to-face.

Centralized office : Everyone works together. The advantage lies in the convenience of collective communication and team building.

Basic Rules : A project team, some basic rules and regulations of the organization.

Problem list : Record the problems that arise in the form of documents to facilitate later management activities.

Self-made/outsourced analysis : judge which one is more cost-effective to make or purchase by yourself, and choose the one with higher cost-effectiveness.

Bidder meeting : Invite potential bidders to inspect the site, and answer questions about the bidding documents, so as to avoid misunderstandings by those potential bidders and incorrectly written bidding documents.

Advertisement : Publicly announce the procurement information for potential bidders to see.

Make a list of qualified sellers : record the sellers who meet the standards and requirements, and form documents.

Weighting system : Set weights for quotation, technology, business and other categories to obtain a comprehensive score.

Independent Estimate : Reasonable cost estimate. When the price quoted by the bidding supplier is very different from my own budget price, I have to think whether they have not fully and truly understood my needs, or whether the current market price has fluctuated greatly, etc.

Screening system : Use a specific condition to remove some potential bidding suppliers who do not meet the requirements.

Payment system : The money in the contract is not paid at one time, but needs to be paid in multiple installments. The proportion and amount of each payment requires a small system, small software or small accounts. This is the payment system.

Procurement Audit : Audit the procurement process to find out the successes and failures of this procurement.

Delphi technology : Experts are not together, everyone puts forward their own views on the plan, and then summarizes the views to form an aspect, and then gives opinions to the experts, and after summarizing, after many cycles, a unified opinion is finally formed. This method can also be carried out through the network. 用途– Can be used for software scale estimation, helping software development teams grasp development time, cost distribution, etc.

Brainstorming : A concentrated discussion method, which aims to maximize people's imagination and creativity. During the brainstorming process, everyone can imagine around the topic, and finally extract the available elements to solve the problem.

SWOT : An acronym for Strengths, Weaknesses, Opportunities, Challenges.

Probability and Impact Matrix : Use a table to describe the probability of a risk occurring and the resulting impact. Risks can be divided into several categories according to the probability of risk occurrence and the impact after occurrence, and can be sorted.

Risk urgency assessment : Assess the priority and urgency of risks. Since it is "urgency assessment", it should be associated with a specific risk analysis.

Monte Carlo : stochastic simulation method, modeling simulation technology, does not require expert participation.

Calculation and analysis factor : the number representing the overall risk of various specific practices, we see that the word "calculation" is included, so this is for quantitative analysis.

Risk reassessment : In the process of risk monitoring, the risk is reassessed, which reflects the dynamic and whole process of risk management.

Risk audit : audit the effectiveness of risk management to see if the expected results have been achieved.

Information quality attributes : attributes, which generally refer to the indispensable properties of all things. The information quality attribute refers to the essential and indispensable elements of information quality.

Coupling : Refers to the process of transferring energy from one medium to another.

Medium : When a substance exists inside another substance, the latter is the medium of the former. For example: when light passes through a lens, the lens is the medium; when light enters water, the water is the medium.

Redundancy : redundant repetition or wordy content can be called redundant. Redundancy has two meanings: one is redundant, and the other is artificially added.

Lifecycle : The stages of an object from its origin to its end.

Thirteenth Five-Year Plan : The thirteenth five-year plan, from which we can see that the development trend of China's information technology is not in its infancy.

Content distribution network : There are nodes all over the country, and it can be used in every city and place.

"Top leader" principle : the top person in charge of the enterprise is responsible. Participate in business management.

Party A, Party B :

Party A: usually refers to the party who proposes the goal. When drafting the contract, it mainly proposes what goal to achieve.
Party B: The party representing the completion of the goal. In the contract, it mainly proposes how to ensure the realization and obtain benefits according to the completion status.


During the contract process, Party A mainly supervises whether Party B provides the satisfaction of its own needs in full accordance with the requirements. After the execution of the contract, Party A generally needs to pay money or other things to obtain what it needs. This is also its legal distinction.

TD-LTE : LTE refers to the 4G technical standard. It can be divided into TD-LTE and FDD-LTE.

Made in China 2025 : is the first ten-year action plan for the Chinese government to implement the strategy of manufacturing a powerful country.

ERP : 80% of the world's top 500 companies are using ERP to make decisions. ERP is a huge system engineering. It is not enough to have money to buy software, but more to its advanced management thinking. ERP is oriented to supply and demand chain management. Internationally renowned ERP developers: Microsoft, Oracle, Folaixin. Well-known ERP developers in China: Digital China, Kingdee, Suda, etc.

OLAP : Online Online Analytical Processing OLAP is a software technology that enables analysts to quickly, consistently, and interactively observe information from various aspects to achieve a deep understanding of data.

Implementation method—depending on how the data is stored

  • ROLAP
  • MOLAP — OLAP implementation based on multidimensional data organization is the main technology for generating multidimensional data reports
  • HELLO

OLTP : Online Transaction Processing

SSL : It is used to protect data from being intercepted and eavesdropped during transmission on the Internet. The protocol runs between the transport layer of the network and applications, and is used to protect sensitive data in e-commerce transactions.


Next: Chapter 1, Informatization Knowledge

Guess you like

Origin blog.csdn.net/xhmico/article/details/131707786