The Intranet Development Process
There is no denying the fact that in order to obtain the benefits of using intranet, we need to emphasize the development process of intranet relevant with correct installation of hardware, software, modem, hub, LAN, WAN, Satellite environment and other ancillaries to promulgate fireball technology virtually. When we start working on the intranet design and creation process, one of the first things we should do is to set up goals. Our target should take into consideration the complexities and nuances of the intranet we plan to build up for our organization. Goals should be clear and relevant to the problem at hand. Set major goals relevant to the purpose, scope, and audience of the intranet. Also, set minor goals or milestones for the stages of the intranet development and its applications. Goals and milestones help define the intranet development process as a series of steps or achievements. One major goal could be to complete the planning of the intranet; another major goal could be to complete the design of the intranet. The series of steps necessary to complete the major goals are the minor goals or milestones. Our first milestone will be to start work on the intranet. Another milestone might be to select and purchase the necessary intranet software, such as Web server software, browser software, and a Java Development environment. Our goals are to complete the major steps of the development process, such as planning and design. In designing a constructive intranet system, the intranet designer may create or provide rules that pertain specifically to the intranet's law or scope of control, such as the Information Systems department that will have overall responsibility for the intranet after completion. As we start to create the intranet, these rules might seem perfectly acceptable. However, as we conduct planning for the intranet and its applications, we might find that the overall responsibility of the intranet should be divided amongst the departments that will set up intranet servers. If these early rules cannot be modified to fit the current situation, we will have problems. We might encounter delays due to loss of efficiency or the final product might not be what was expected.
No rule should ever be considered absolutely and even the best of rules should be interpreted as guidelines that can vary depending on the situation. Rules for a complex project like our intranet should be flexible and make sense. A rule that conflicts with something we are trying to do should be reexamined. The rule might be inappropriate for the situation we are trying to apply it and as such our intranet will never be put into action if we avoid working on it. Putting off work until something is due is a poor practice. Relinquish when things do not go our way or when we seem to have a block is another poor practice. Even if we flourish on cut-off date, sketch to work toward intranet's goals and milestones regularly-every day if necessary and possible. We should also plan to work on the intranet and its applications during those times when our thoughts are not flowing. Everyone has bad days and good days. Some days we take more breaks. Some days we work straight through the day and into the night. We might tend toward other destructive behavior besides avoiding or putting off work. Sometimes programmers go to the opposite extreme. They tear things apart impulsively before letting the work cool off so they can look at it objectively. Never hack our code just because a few users didn't like our application's interface.
In view of the above discussion, it is evident that Managing the aspects of the intranet's design and creation is only the beginning to set up real fireball technology in order to obtain maximum benefits from such ambiance. The next step is to determine the best organization for our intranet. Over the years, three models have developed for information systems like our intranet: centralized, decentralized, and a combination of centralized and decentralized. The three computing models are really driven by the types of computers in use at an organization.
Related Tags: creation, process, satellite, intranet, complexities, relevant, fireball
Kh. Atiar Rahman is a prominent author as well as a poet. He was born in the former district of Kushtia.
Your Article Search Directory : Find in ArticlesRecent articles in this category:
- 10 Multiple Choice Certification Mcsa Microsoft Exam: 70-291
Implementing, Managing and Maintaining a Server 2003 Network Infrastructure After you study your te - Online Degrees in Animation
The computer animation field has quite a prominent part to play in the entertainment industry. Gami - Ccna, Ccent, Ccnp Tutorial on Routers and Routing
Routers are the critical part of all the networks and can be both security aid and security vulnera - Comptia Security+ Article on Firewall Security Advantages and Firewall Functions
The firewall protects an internal network from malicious hackers or software on an external network - Free Cisco Ccna Tutorial
The basic boot sequence for a Cisco router is: Step 1: The router performs a power-on self-test (P - Why Switch to Windows Vista
In addition to hype there are some tangible reasons to upgrade and or switch over to Windows Vista. - Why Don't I Make Money on Adsense?
It started for me about four years ago, "Adsense that is" I was like a man possessed, I thought thi - The Growing Fashion of Online Casino
The evolution of online has made your life much easier everywhere. When it comes to the entertainme - Free Cisco Ccna, Ccent, Ccnp Certification Tutorial
Routing Routing is a relay system by which packets are forwarded from one device to another. Each - What is Sociology Dissertation?
Sociology dissertation can be based on a range of topics related with the field of social science a
Most viewed articles in this category:
- Taking Ctrl - 20 Keyboard Shortcuts
There may be times when it is simply inconvenient to use the click of your mouse for a specific comm - Windows Keyboard Shortcuts
When I observe most colleagues and friends working on their PC's they mostly use the mouse as they a - How Hackers Take Control of Your Computer
Your PC has many "ports" which are vulnerable to attack from a hacker. These ports are use - How To Succeed At A Computer Training School
One of the best decisions you can ever make is to attend a computer training school. As I've written - Mcse or Mcsa?
Four MCSE, MCSA Tracks are available. The MCSA fcould be considered as a "Mini" version of - 10 Great Tips to a Successful Website
How to make a successful website 1. Make and develop your own website. Do NOT copy or get webs - Protect Your Privacy by Erasing Tracks Left on Your Computer
When you browse the web information is continuously collected by the websites you visit and by your - Seven Steps to Prosperity: Starting Your Own Computer Services Business
Self employment has increased over 12.2 million people according to a study on the Small Business Ad - Computer Training School Tutorial: Know Your Instructor
Making the decision to attend a computer tech school can be one of the best decisions of your life.& - Computer Memory - Flash Memory
That means it does not need power to retain the information that is on the chip itself. Also, flash