This website uses cookies to ensure you have the best experience. Learn more

Hardware & Software Requirements Essay

953 words - 4 pages

Hardware & Software RequirementsIntroductionFor new electronic point of sale (ePOS) hardware and software are crucial decisions. This document will discuss a list of high value items that are required in the solution selected. By no means should this list be considered all inclusive albeit just the main points that are worthy of discussion.Hardware The hardware should be of adequate design to withstand the rigors of convenience store environments. Accordingly, "off the shelf" PC hardware or hardware that can be purchased from major PC retailers will not be considered, since this style of generic PC hardware does not have the "retail hardening" required to survive in the convenience store environment. Retail hardening is described as, a system, that by design is fit for purpose, robustly engineered, and resistant to environmental contaminates. It should be able to resist liquid spill, and humid environments. It should prevent against electromagnetic field (EMF) interference, and be resistant to bumps and vibrations. The hardware should be capable of normal operation, without special cooling or heating, in all but the harshest of retail outlet conditions. The recommendations for the hardware are as follows:CPU The CPU chip should be of Wintel design, preferably larger that one gigahertz (GHz); also, it is recommended the CPU chip be supported by the manufacturer for an extended period of time, an example is the Intel embedded series of CPU chips. The CPU should contain at a minimum of 256 megabytes (MB) of RAM; 512 MB to 1 gigabyte (GB) is preferred. The case should be equipped with adequate EMF shielding and vibration buffering devices. The case design should be of such ascetics that it meshes well with the cash drawer in an integrated, or stacked, design; as well as, function in a distributed, or under the counter, configuration. The CPU should have a fully redundant data storage system; an example is the server contains dual hard drives that are mirrored by a RAID device. The hard drives contained in the server should be a minimum of 40 GB, 80 GB is preferred. The server should possess adequate input/output port to support the various peripherals that need to be attached; a minimum of six serial ports (RS-232) and four USB ports are required; four to six powered USB ports(12 and 24 volts), and four to six powered (RS-232) ports (5 and 12 volts) are preferred.Touch Screen The touch screen should be viewed as the primary input device. It should be an LCD monitor, between 12 and 15 inches in screen width; also, capacitive touch technology is preferred over resistive touch technology. The system speakers should be integrated into the monitor design as well as, an integrated credit card magnetic stripe reader (MSR).Customer Display Unit...

Find Another Essay On Hardware & Software Requirements

Business Information Systems, System Considerations Essay

1526 words - 6 pages . Maintaining the physical security of data, preventing against virus attacks.2. Following Data protection and copyright laws thus protecting data against incorrect data entry by verifying the data and ensuring it is correct.3. Protecting both software and hardware so that data cannot be lost or corrupted in the event of power loss or faults of hardware.4. Following procedures and legal requirements when installing new software and upgrading existing

Waterfall Methodology for Hardware Design Projects

584 words - 3 pages -scale software systems that involve by many developer, there is a need for a base programming paradigm or model that represent the whole project. The waterfall methodology was modeled according to hardware design projects that has been used for years which allow engineers to predict how pieces of a system would interact (Royce, 1970). The waterfall methodology flows in a downward fashion, similar to the way water flows downwards, take

Unified Communications Manager

819 words - 3 pages with much smaller short-term cost benefits and valuable improvements. However you will for the most part not get long term guarantees of QoS’. They may also fail to address the limitation of a dated hardware infrastructure that would take advantage of the communication software. At best these solution ignore the network, at worst they leave organizations vulnerable to excessive network maintenance. Limited scalability with large performance

Careers in Computer Science

716 words - 3 pages Background Computer Network & Support Technician is a field that deals with the computers, servers and virtualized OS (operating system). Networking includes different processes such as Installing, Maintaining, troubleshooting and upgrading Web-server hardware and software. The main purpose of Computer Networking is to manage routers, up gradation and troubleshoot problems in such a way that extra efficiency is achieved with low cost of total

Configuration Control Process

1875 words - 8 pages the processing of change requests and, for approved requests, their implementation status; and 4) authentication that the controlled items meet their requirements and are ready for delivery.The components of a software system that are controlled by the SCM process include project documentation, product documentation, code, data, and any other items needed to meet a set of requirements or contractual obligations. All of these items can be

Mac vs. PC

1256 words - 5 pages have been established allowing software developers to certify their products to meet Windows requirements and deliver controlled performance. In addition, the PCs allowed numerous hardware manufacturers to sell individual components to PC assemblers meeting higher or lower manufacturing specifications and allowing various quality lines of PCs to become available to both the corporate customer at an average cost of $1,800 down to the beginner

Wireless Networking

991 words - 4 pages wireless LAN. You would need hardware or software based access point. Hardware access points are available with various types of network interfaces such as Ethernet or Token Ring, but may need extra hardware if the network requirements change. If networking requirements go beyond just interconnecting a wired network to a small wireless network, a software based access point would probably be the best solution. A software access point does not limit

Software Maintenance Plan

1259 words - 5 pages Prefix/Unit Code/Site Control Code:4. System/Subsystem/CSCI:5. SPR Title (80 characters or less):6. Security Review: UNCLASSIFIEDCONFIDENTIAL SECRET TOP SECRET SCIInitials:7 Product Category:a. Software b. COTS c. Documentation d. Other (Databases, hardware/firmware)8. Related SPRs/ECPs/TBs:9. System Configuration:10. Activity (Operation, Exercise Name, Test, etc):11. Release/Version (where problem detected)12. Provide detailed description and


595 words - 3 pages software and hardware enhancements to fulfill the needs of a now larger range of customers. Blackberry’s market share keeps declining every year, despite their efforts. In order to successfully regain market share, they must first understand why the customers are not buying their devices. What are the requirements needed to fulfill their customers. Does the company have the necessary resources to fulfill these needs? Once determined, Blackberry

Software Maintenance & Change Control Plan

868 words - 3 pages with a changing environment (hardware and software).Perfective Maintenance: Activity for adding new capabilities, modifying existing functions and making general enhancements. This accounts for the majority of all effort expended on maintenance.Preventive Maintenance: Activity which changes software to improve future maintainability or reliability or to provide a better basis for future enhancements.1.2. Change ControlChange control activities are

McBride Project Plan

820 words - 4 pages hardware and software requirements. All locations are in need of physical security, information systems security, databases, backup databases, and networking capabilities to include access to the Boise locations information systems. Smith Consulting will be granted remote access to all store locations systems as requested by McBride. McBride will also require stand-alone servers for secured internal communications, black and white printers, color

Similar Essays

Early Identification, Specification And Measurement Of Software Requirements Derived From Human Factors Requirements

699 words - 3 pages factors requirements are typically described initially as non functional requirements at the system level, and system engineers must subsequently apportion these system requirements very carefully as either software or hardware requirements to conform to the Human factors requirements of the system. Within the ECSS standards, a number of views and concepts are provided to describe various types of candidate Human factors requirements at the

Understanding The Software Development Process Essay

1285 words - 5 pages , different software level has different objectives to achieve in software life cycle. - Level A - Level B - Level C - Level D The Determination Method for Software Reliability Quality Indices 1) Determining the software reliability environment requirements. To consider the environmental factors that affect software reliability based on different software life cycle stages. Here environment is a generalized conception, including hardware

Hardware Replacement Project Essay

1291 words - 5 pages control, hardware specifications to enable the adequate installation and production use of the software. It should also include test cases, calculations, data integration, and other data which determines how a system operates and what actions it performs. Non-functional requirements describe the aspects of the technical environment and are comprised of such things as stability/reliability, maintainability, interoperability with legacy systems

Runtime Instrumentation Of System C Essay

1654 words - 7 pages missed in this process can affect the quality of the overall onboard software. Thus, the robustness requirements call for an exhaustive testing of the boot process and possible corruption of application binaries stored in the EEPROM or stuck-at faults in the SDRAM application deployment areas. Bearing this in mind, from a hardware dependent software point of view, such as the boot software, the major problem of carrying out early development and