Hardware & Software Requirements Essay

953 words - 4 pages

Hardware & Software RequirementsIntroductionFor new electronic point of sale (ePOS) hardware and software are crucial decisions. This document will discuss a list of high value items that are required in the solution selected. By no means should this list be considered all inclusive albeit just the main points that are worthy of discussion.Hardware The hardware should be of adequate design to withstand the rigors of convenience store environments. Accordingly, "off the shelf" PC hardware or hardware that can be purchased from major PC retailers will not be considered, since this style of generic PC hardware does not have the "retail hardening" required to survive in the convenience store environment. Retail hardening is described as, a system, that by design is fit for purpose, robustly engineered, and resistant to environmental contaminates. It should be able to resist liquid spill, and humid environments. It should prevent against electromagnetic field (EMF) interference, and be resistant to bumps and vibrations. The hardware should be capable of normal operation, without special cooling or heating, in all but the harshest of retail outlet conditions. The recommendations for the hardware are as follows:CPU The CPU chip should be of Wintel design, preferably larger that one gigahertz (GHz); also, it is recommended the CPU chip be supported by the manufacturer for an extended period of time, an example is the Intel embedded series of CPU chips. The CPU should contain at a minimum of 256 megabytes (MB) of RAM; 512 MB to 1 gigabyte (GB) is preferred. The case should be equipped with adequate EMF shielding and vibration buffering devices. The case design should be of such ascetics that it meshes well with the cash drawer in an integrated, or stacked, design; as well as, function in a distributed, or under the counter, configuration. The CPU should have a fully redundant data storage system; an example is the server contains dual hard drives that are mirrored by a RAID device. The hard drives contained in the server should be a minimum of 40 GB, 80 GB is preferred. The server should possess adequate input/output port to support the various peripherals that need to be attached; a minimum of six serial ports (RS-232) and four USB ports are required; four to six powered USB ports(12 and 24 volts), and four to six powered (RS-232) ports (5 and 12 volts) are preferred.Touch Screen The touch screen should be viewed as the primary input device. It should be an LCD monitor, between 12 and 15 inches in screen width; also, capacitive touch technology is preferred over resistive touch technology. The system speakers should be integrated into the monitor design as well as, an integrated credit card magnetic stripe reader (MSR).Customer Display Unit...

Find Another Essay On Hardware & Software Requirements

Configuration Control Process Essay

1875 words - 8 pages the processing of change requests and, for approved requests, their implementation status; and 4) authentication that the controlled items meet their requirements and are ready for delivery.The components of a software system that are controlled by the SCM process include project documentation, product documentation, code, data, and any other items needed to meet a set of requirements or contractual obligations. All of these items can be

Mac vs. PC Essay

1256 words - 5 pages have been established allowing software developers to certify their products to meet Windows requirements and deliver controlled performance. In addition, the PCs allowed numerous hardware manufacturers to sell individual components to PC assemblers meeting higher or lower manufacturing specifications and allowing various quality lines of PCs to become available to both the corporate customer at an average cost of $1,800 down to the beginner

Wireless Networking

991 words - 4 pages wireless LAN. You would need hardware or software based access point. Hardware access points are available with various types of network interfaces such as Ethernet or Token Ring, but may need extra hardware if the network requirements change. If networking requirements go beyond just interconnecting a wired network to a small wireless network, a software based access point would probably be the best solution. A software access point does not limit

Software Maintenance Plan

1259 words - 5 pages Prefix/Unit Code/Site Control Code:4. System/Subsystem/CSCI:5. SPR Title (80 characters or less):6. Security Review: UNCLASSIFIEDCONFIDENTIAL SECRET TOP SECRET SCIInitials:7 Product Category:a. Software b. COTS c. Documentation d. Other (Databases, hardware/firmware)8. Related SPRs/ECPs/TBs:9. System Configuration:10. Activity (Operation, Exercise Name, Test, etc):11. Release/Version (where problem detected)12. Provide detailed description and

Software Maintenance & Change Control Plan

868 words - 3 pages with a changing environment (hardware and software).Perfective Maintenance: Activity for adding new capabilities, modifying existing functions and making general enhancements. This accounts for the majority of all effort expended on maintenance.Preventive Maintenance: Activity which changes software to improve future maintainability or reliability or to provide a better basis for future enhancements.1.2. Change ControlChange control activities are

Information Technology and SMEs in Pakistan

1605 words - 6 pages hardware. One main reason is lack of proper training as employees don’t know how to use the software. Informal training methods like on-the-job training etc., are very effective to train the employees. Keywords Information technology (IT), Small to Medium-sized enterprises, Hardware, Software, Training I. INTRODUCTION The rapid growth of technological innovations and the fusion of information technology have drastically changed the way

Business Intelligence Software

1304 words - 5 pages updated software release, they are forced to upgrade due to dropped support of the old product. These maintenance costs must be figured into yearly expenses.Most BI software is provided consulting firms and system integrators; however the more high-powered products are developed and distributed by major software developers. The hardware and software requirements vary, depending on the chosen application of BI software. Generally, minimum requirements

Information Security

2915 words - 12 pages organizations. This research paper discusses software and hardware firewalls with reference to accounting systems. Definition of firewall A firewall is a software program or specialized hardware devices, designed to check information entering or leaving the network; and either blocking it or allowing it to pass through a node - based on existing security settings (Zwicky, Cooper, & Chapman, 2009). It can also be defined as a rule based program or

quality factors

1146 words - 5 pages Quality Factors System quality factors are important to both hardware and software applications. Several factors must be considered when addressing hardware and software quality. Factors such as functionality, reliability, usability, efficiency, maintainability, and portability are among the considerations. Functionality and reliability quality factors can potentially affect other components of system quality. Thorough quality assurance programs

Software licenseing and piracy act for a business lay class

3694 words - 15 pages software in a form that is designed to make it appear to be a legitimate program; Hard disk loading, whereby computer dealers load unauthorized copies of software onto the hard disks of personal computers, which acts as an incentive for the end user to buy the hardware from that particular dealer; and downloading of copyrighted software to users connected by modem to electronic bulletin boards and/or the Internet. When software is pirated the

Cloud Computing

1806 words - 7 pages (SaaS), and Hardware as a Service (HaaS), describe what elements an entity can have access to and how it can be utilized. Within Infrastructure as a Service (IaaS), memory, networking, security, and storage needs are addressed. Because of the scalability of IaaS, it is possible for entities to save on costs because they only have to pay for the services when they are used. When an entity needs to maintain control of its software applications

Similar Essays

Understanding The Software Development Process Essay

1285 words - 5 pages , different software level has different objectives to achieve in software life cycle. - Level A - Level B - Level C - Level D The Determination Method for Software Reliability Quality Indices 1) Determining the software reliability environment requirements. To consider the environmental factors that affect software reliability based on different software life cycle stages. Here environment is a generalized conception, including hardware

Hardware Replacement Project Essay

1291 words - 5 pages control, hardware specifications to enable the adequate installation and production use of the software. It should also include test cases, calculations, data integration, and other data which determines how a system operates and what actions it performs. Non-functional requirements describe the aspects of the technical environment and are comprised of such things as stability/reliability, maintainability, interoperability with legacy systems

Business Information Systems, System Considerations. Essay

1526 words - 6 pages . Maintaining the physical security of data, preventing against virus attacks.2. Following Data protection and copyright laws thus protecting data against incorrect data entry by verifying the data and ensuring it is correct.3. Protecting both software and hardware so that data cannot be lost or corrupted in the event of power loss or faults of hardware.4. Following procedures and legal requirements when installing new software and upgrading existing

Unified Communications Manager Essay

819 words - 3 pages with much smaller short-term cost benefits and valuable improvements. However you will for the most part not get long term guarantees of QoS’. They may also fail to address the limitation of a dated hardware infrastructure that would take advantage of the communication software. At best these solution ignore the network, at worst they leave organizations vulnerable to excessive network maintenance. Limited scalability with large performance