Professional Documents
Culture Documents
Data System 9
Data System 9
Data System 9
Data system
Students Name
Institutional Affiliation
Course Title
Professor’s Name
Data system 2
Data system
Task 1:
a) Discuss ways that you can improve an internet-based content system management
Your response should list at least three improvements for each of the performance
aspects listed.
To reduce the possibility of security breaches, it is crucial to put privacy, accessibility, and
resilience first. Topics including web structure mining and observable behavior and the use of
web proxies and caching will be discussed alongside delay, accessibility, availability, latency,
and data availability (Huston, (n.d.)). During the migration, it is important to have a content
strategy, meta data strategy, and content inventory. Numerous factors influence the user
experience of a website, regardless of whether or not the website uses a content management
system (CMS) engine (Gasparyan, 2017). Due to how content management systems like
WordPress and Joomla are built to handle network traffic, inactive modules and plugins may
slow down the speed of the site. Large amounts of photos or other types of information on a
single page can also cause performance concerns and slow down websites that were built to
manage dynamic content using PHP but did not deploy massive CMS systems (Rapoza, 2017).
This may be a problem even if the site was designed to handle large amounts of data.
scenarios will need to test their modules and plugins on sandbox websites and, if possible, across
various providers and platforms (Rapoza, 2017). You may reduce bandwidth without sacrificing
Data system 3
quality by compressing files like videos and photos. In this way, the same information can be
delivered to the user with significantly less data being transferred over the network after
compression.
Various attacks, such as distributed denial of service and cross-site scripting, can be launched
against a website. When a script launches an XSS attack, it might take control of the victim's
browser (Gasparyan, 2017). The site could become unreachable due to a distributed denial of
service assault. To enhance the security of CMS on the web, you can do the following:
If you have a trustworthy online content management system, you can secure your data, your
users, and the integrity and availability of your data from these dangers.
Authentication: When thinking about security, this is a crucial factor. Through authentication, a
user's identity is confirmed and authenticated to ensure they are who they say they are before
they are permitted access (Rapoza, 2017). Some of the methods that can be used for
Confidentiality: This strategy can be used to conceal data and restrict access.
Integrity: When confidentiality and data integrity are both ensured, changes like accidental
o The websites should be ranked according to their authority and quality using web
structure mining (Gasparyan, 2017). The most crucial information will likewise be
o Taking into account user demographics and behavior allows for the implementation of
o Reducing wait times for resources by utilizing a proxy cache server's saved copies of
o Assessing how well the DNS and other parts of the network are functioning (Julien,
2018) (i.e., redirection of network traffic over the Internet is correct between user and
server)
o Making sure there are enough funds to keep websites running (i.e., enough processing
power push websites to clients, especially when there are multiple websites hosted on a
o Depending on which sites are getting the most traffic, the server can reallocate its
o Process of testing and fixing a website so that it works properly on a wide variety of
network speeds.
Content inventory: The quality and consistency of online material have to be thoroughly
Content Strategy: After gathering all of the content that has to be transferred, you should
evaluate its pros and cons before moving on to developing a comprehensive plan (Huston,
(n.d.)).
Meta-data strategy: Whether or not the content management system (CMS) used for managing
web content is moved to the cloud, the ultimate responsibility for deciding the meta data format
Task 2:
Describe any feedback you received or any specific interactions you had.
The vast majority of responses I got were compliments. I was able to deepen my
familiarity with CMSes that operate over the internet and put that knowledge to use in the roles
Discuss how they were helpful. Describe your feelings and attitudes. What surprised me or
caused me to wonder?
It was both intriguing and informative to me, so thank you for sharing. I learned a lot
from the analysis of issues like latency, security, data availability, and migration in cloud-based
content management systems (Gasparyan, 2017). Moreover, I found it enlightening to learn the
nuances of the web's evolution. The information I acquired from this unit has made a profound
impression on me. One of my plans for the near future is to learn as much as possible about how
What happened that felt particularly challenging? Why was it challenging to me?
Data system 6
After facing up against a few obstacles, other forms of attacks such as distributed denial
of service attacks, cross-site scripting attacks, and others have evolved. An XSS assault is
predicated on an attack generated by a script, and this script can hijack the target browser (Julien,
2018). In part because of them, I believe in myself and in my capacity to effect positive change
in the world. Given that I can do nothing to alter my circumstances, it is up to me to figure out
how to deal with problems as they arise. In that case, I'll have no choice but to confront them
squarely (Huston, (n.d.)). But in fact, there's always something that turns out to be wrong. Even
though I know that enduring this challenge will pay dividends in the future, I am not feeling any
By syncing my content with a proxy cache server and its web cache, I was recently able
to reduce my users' wait times. To further accommodate varying Internet connections, I've been
doing tests of website functioning dependent on user bandwidth allocation (Rapoza, 2017).
These are only a few illustrations of the knowledge and experience I've acquired. If I may use an
In what ways am I able to apply the ideas and concepts gained to my own experience?
I have made great strides, because of school. My ability to link programs front and back
ends is noticeably stronger now that I've been working on my program for a week (Sommerville,
Data system 7
2010). Web structure mining should also be used for categorizing websites, and each one should
Task 3:
This week, we talked a lot about requirements engineering and software architecture. I find
myself both intrigued and capable of quickly grasping each of these concepts. When a client has
a well-defined issue, requirements engineering can be used to craft a solution in the form of
software (Huston, (n.d.)). This process consists of three phases: requirements gathering (during
which the client provides the developers with an overview of the business context), requirements
analysis (during which the client and developers work together to gain a shared understanding of
the problem), and requirements specification (wherein the client and the developers formally
depict the functionality, quality, limitations, and difficulty of the solution) (Huston, (n.d.)).
Inadequate attention to detail at any point in the process could lead to software that not only falls
short of the expectations set by the client, but also fails to appropriately address the difficulties
faced by the customer (Sommerville, 2000). I believe that requirements engineering should be
considered an engineering discipline in its own right because of its central role in the software
development life cycle. The next stage of software development is software architecture, and its
Every day this week, we worked on a new software-related assignment. This, in my opinion,
is correct since requirements engineering is the most troublesome and critical phase of
developing a software product (Rapoza, 2017). One key distinction is the role that software
architecture plays in guiding choices made during the development phase. Without a proper
foundation, the software architecture would be "driving on the wrong lane," if you'll excuse the
muddled metaphor (the results achieved in the phase of requirements engineering) (Sommerville,
2010). This isn't to say that developers don't need to be technically savvy or that the development
process isn't vital to making something truly groundbreaking. Software architecture, in its
simplest form, is the framework that underpins and defines the nature of a piece of software.
this by taking a modular approach, in which separate parts are created and tested before being
d) In what ways are you able to apply the ideas and concepts gained,
comments made in the forum discussion and the programming exercise. The programming was
the best part of my job. At first, I didn't know what to do or how to get started with this project
(Rapoza, 2017). However, I was able to figure out the optimal next steps after only a few
minutes of web research. As a direct result, I felt like I had a brand-new perspective on
everything (Sommerville, 2000). Accordingly, I can affirm that I made use of the information I
gleaned from the reading assignment and my own study when completing my programming
assignment.
Data system 9
e) Describe one important thing that you are thinking about in relation to the activity.
The many steps we've covered so far to prepare for a genuine and direct answer to the
customer's problem are above my current abilities, therefore I can't promise a satisfactory
outcome (Sommerville, 2000). Although I know I'll need the cooperation of others to accomplish
Reference
Gasparyan, A. (2017, August 11). What is synthetic transaction monitoring (and who needs it?).
monitoring-and-who-n
https://smartbear.com/learn/performance-monitoring/what-is-real-user-monitoring/
Julien, J. (2018, April 26). Web application performance: 7 common problems and how to solve
Rapoza, J. (2017, August 30). Can businesses manage & avoid Internet performance issues
businesses-manage-and-avoid-internet-performance-issues-to-boost-their-enterprise-
systems/
Documentation Objectives.
https://ifs.host.cs.st-andrews.ac.uk/Books/SE9/WebChapters/PDF/Ch_30%20Documentation.pdf
Data system 11