Saturday, October 17, 2009



Setelah mempelajari materi ini diharapkan mahasiswa mampu untuk:
1.Membedakan berbagai jenis produk perangkat lunak yang dapat dikembangkan
2.Membedakan berbagai macam proses pengembangan perangkat lunak dan memahami kelebihan dan kekurangan masing-masing proses

3.Merencanakan dan mengelola pelaksanaan pengembangan perangkat lunak,
4.Menghitung kompleksitas perangkat lunak
5.Menghitung biaya dan usaha pengembangan perangkat lunak,
6.Mengidentifikasi berbagai resiko/problem yang berkaitan dengan pengembangan perangkat lunak
7.Memberikan solusi terhadap berbagai resiko yang mungkin timbul selama pengembangan perangkat lunak
8.Menyusun strategi pembuatan produk perangkat lunak yang berkualitas
9.Memodelkan proses bisnis dari suatu organisasi

1. Roger S Pressman, "Software Enginering: A Practitioners Approach"
2. Bob Hughes, "Software Project Management"
Kehadiran: 10%
UTS : 30 %
UAS : 40 %
Tugas : 20 %

Read more!

Friday, June 12, 2009

Saturday, Jun 13, 2009

Information Security

The goal of Information Security class is to give our student awareness of the existing serious threats of information security and knowledge of system vulnerabilities. The student will firstly be encouraged to; recognize the various threats; foresee its potential impact; scrutiny the vulnerabilities of the objects, and; learn how to cope with by examining the potential risk incorporated in the threats.

Link to class presentation files for Security Information (Jun 13 & 20 '09):

The Idea

Information security cannot be thought of as a single, discrete, entity; it's a whole range of measures, and should be viewed as a system. Information security is as complex as any other system which combines a number of different aspects and approaches, none of which can be regarded as more or less important. This means that no single aspect or approach can be disregarded; if one area or part of the system is ignored, the system will not function correctly.

Information security differs very little from security in general. After all, no one would install a heavy security door with a pick-proof lock on a garden shed. Similarly, a car can have excellent tires, but if the brakes are faulty, the car will be unsafe. Protection against cyber threats works on the same principle: all possible weak points should be secured, whether on a desktop computer, an organization's server or a corporate network. Data should also be accessed via secure paths.

Read more!

Saturday, June 6, 2009

A Decision Support System (DSS)

DSS is an interactive computer-based system or subsystem intended to help decision makers use communications technologies, data, documents, knowledge and/or models to identify and solve problems, complete decision process tasks, and make decisions. Decision Support System is a general term for any computer application that enhances a person or group’s ability to make decisions. Also, Decision Support Systems refers to an academic field of research that involves designing and studying Decision Support Systems in their context of use. In general, Decision Support Systems are a class of computerized information system that support decision-making activities.

Link to class presentation files for DSS (May 30, Jun 02 '09):

Decision Support System Cases

Below is list of Decision Support System Cases

Standard Bank, one of the largest banks in South Africa, has operations in 17 countries. It was one of the early adopters of credit scoring and customer-level decisioning from Experian-Scorex (08/30/2005). ILOG announced on February 14, 2006 that Taiping Life, a leading Chinese insurer, chose ILOG JRules for its underwriting system so that it could expand its underwriting in Asia. I'm sure that there are many other model-driven scheduling, simulation and optimization DSS examples in global enterprises similar to those found in more local or country-centered enterprises.

So what can one conclude from the above examples? First, global enterprises differ in their decision support needs, but they also have many needs that are similar to those of all large, complex organizations. Second, technology adoption varies widely in global enterprises. Third, the possibilities for DSS seem much greater than what is evidenced by current applications.

As always, your comments and suggestions are welcomed.

Groupware, chat, Videoconferencing, and web-based bulletin boards are increasingly common in global enterprises. In a 2002 case study, eRoom Staff documented how more than 100 Naval Medicine CIOs and their staffs access eRoom through industry-standard Web browsers. The U. S. Navy Bureau of Medicine manages 77 hospitals and regional service providers in locations inside the U.S. as well as overseas-based military installations, combat field hospitals and Navy ships at sea.

Recently, WebEx launched WebEx WebOffice in India to support distributed project management and outsourced development coordination for overseas partners and clients (03/07/2006). In 2001, Procter & Gamble chose Polycom for worldWide video communications support. Hewlett Packard (HP) has 13 Halo Collaboration Studios installed at its facilities worldwide. Halo Collaboration Studio is a high-end video conferencing facility built by HP in partnership with DreamWorks Animation SKG (12/12/2005).

To use Halo, organizations purchase at least two Halo rooms set up for six people each. "There are three plasma displays in each room that enable participants to see those they are collaborating with in life-size images. The rooms come equipped with studio-quality audio and lighting and participants use a simple on-screen user interface to begin collaborating". "Participants can easily share documents and data directly from their notebook PCs with individuals in other rooms using a collaboration screen mounted above the plasma displays."

Moody's Risk Management Services uses a ???-driven system to support the needs of commercial lending institutions. Over one third of the top 100 commercial banks in the US and Canada along with some of the largest industrial and financial companies in the world use FAST (Financial Analysis Support Techniques) software for credit analysis. Also, Hewlett Packard deployed a Web-based system to provide "quick, accurate hardware sizing, network configuration, and usage recommendations for SAP Business Information Warehouse implementations" (cf.,

In a release dated March 10, 2006, "Dr. Scheller Cosmetics speeds time-to-market with Captaris Workflow", Captaris Workflow software was used to automate the approvals process for Dr. Scheller research and marketing materials. Dow Corning automated workflow capabilities and created templates using the Documentum ECM platform to ensure the consistency of all Web content while enabling business units to manage the content. DuPont Engineering has a document-driven system with more than 2,100 users worldwide. The system contains more than one million CAD drawings and other project documentation (cf.,

In a recent case study at, SAS staff explain how Briggs & Stratton uses SAS BI to consolidate information and deliver it globally to manufacturing offices, particularly in North America, China and Europe. The case describes a global data-driven, executive management system with scorecards. More than 50 people in the company are hands-on information producers. For the past few years in the oil business within Shell International, a Category Management Business Solution (CMBS) has been used in seven countries, including Germany, UK and Netherlands. Data is gathered from more than 2,500 sites with 100 head office users.

At Maytag International, in a somewhat dated example, DI-Diver was used to track sales and analyze profitability for refrigeration, laundry, floor care, cooking and dishwasher product categories. DI-Diver reports included sales dollars, unit totals, revenue, cost, warranty, and gross margin information for 1,700 SKU's and 1,000 customers. The data was updated monthly and distributed to users over a LAN. For remote users the updated information was distributed on a CD.

Two July 2005 press releases described decision support applications at Airbus and Hellmann Worldwide Logistics. Airbus expanded its use of an Applix TM1 solution to approximately 100 controllers at 16 Engineering Competency Centers located in France, Germany, the UK, and Spain. Hellmann is an air and sea freight shipping company that serves customers from 341 cities in 134 countries. Hellmann selected BusinessObjects XI to provide real-time access to customer related information such as tracking and tracing statuses, invoicing, inventory, and KPI management.

Buckman Labs standardized on Information Builders' software for global information integration (01/30/2006). It uses WebFOCUS to generate sales analysis reports. The company has annual sales of $429 million, produces 700 different products, and employs over 1,500 people working in more than 90 countries. ABN AMRO selected Teradata Data Warehouse to build a platform for business decision support in Asia (02/15/2006). ABN AMRO is an international bank with more than 3,000 branches in more than 60 countries and territories. The data warehouse will support business development of ABN AMRO consumer businesses in Asia. Regional headquarters in Hong Kong will be able to view the region's total business as well as the performance of each individual country's business, and each country will have a view of its own data. The focus is on DSS for customer relationship management,customer revenue analysis, and monitoring credit risk metrics. On March 21, 2006 Cognos announced Fresh Del Monte purchased the Cognos Performance Management solution. Fresh Del Monte is a leading global producer and distributor of fruit and vegetable products in Europe, Africa and the Middle East.
Read more!

Friday, May 22, 2009

Saturday 16, Sunday 23 May '09 meetings

Business System Planning

Business System Planning is a method for analyzing, defining and designing an information architecture of organizations. It was first issued by IBM in 1981, though the initial work on BSP began in the early 1970s.[1] At first, it was for IBM internal use only. Later it was made available to customers[1] and this method became an important tool for many organizations. It is a very complex method dealing with data, processes, strategies, aims and organizational departments which are interconnected.

Link to Presentation on Saturday 16 May:
PDF color. Read more!

Saturday, May 2, 2009

Saturday 18, Sunday 19 Apr '09 meetings

Online Transaction Processing
Online transaction processing (OLTP) applications are high throughput, insert/update-intensive systems. These systems are characterized by growing volumes of data that several hundred users access concurrently. Typical OLTP applications are airline reservation systems, large order-entry applications, and banking applications. The key goals of OLTP systems are availability (sometimes 7 day/24 hour availability); speed (throughput); concurrency; and recoverability.

The following elements are crucial for tuning OLTP systems:
  • Rollback segments
  • Indexes, clusters, and hashing
  • Discrete transactions
  • Data block size
  • Dynamic allocation of space to tables and rollback segments
  • Transaction processing monitors and the multi-threaded server
  • The shared pool
  • Well-tuned SQL statements
  • Integrity constraints
  • Client/server architecture
  • Dynamically changeable initialization parameters
  • Procedures, packages, and functions
Presentation on Saturday 02 May:
PDF 2 slides Color
Read more!

Saturday, April 18, 2009

Saturday 18, Sunday 19 Apr '09 meetings

Information System Design and Analysis

In any software design project, the analysis stage - documenting and designing technical requirements for the needs of users - is vital to the success of the project.

Presentation on Saturday 18 Apr dan Sunday 19 Apr:
Read more!

Friday, April 17, 2009

Saturday 4, Sunday 5 Apr '09 meetings

Information System Architecture
What is System Architecture and Why do We care ?

If we were setting out to build a home, we would first lay out the floor plans, grouping each room by function and placing structural items within each room according to their best utility. This is not an arbitrary process – it is architecture. Moving from home design to IT system design does not change the process. Grouping data and processes into information systems creates the rooms of the system architecture. Arranging the data and processes for the best utility is the result of deploying an architecture.

Presentation on Saturday 4 Apr & Sunday 5 Apr ...

Many of the attributes of building architecture are applicable to system architecture. Form, function, best use of resources and materials, human interaction, reuse of design, longevity of the design decisions, robustness of the resulting entities are all attributes of well designed buildings and well designed computer systems.
Read more!