DR0000_0208

DR0000_0208


Speaker 1: My name is [Sudaka Nalamoto 00:00:05], I’ll be covering section C 6.2 systems application development and I’ll be mostly covering [subtask 00:15] one which is system design and development. Margaret will be covering the info security and Mat will talk through section … Sub task three, testing. We haven’t done anything for subtask four and five because [inaudible: 00:00:30] we’ll be pulling stuff in from other proposals. First, understanding what the situation is the U.S marshal, they have desperate system. They have J.S which is a [Inaudible 00:00:52] and other small applications here and there. They want to enterprise [Inaudible 01:01] that will cover all their desperate systems.
They have security issues like, they’re not able to upgrade [Inaudible 00:01:10] JBAS and they can’t upgrade java [Inaudible 00:01:17] they can meet their security. Their applications are … Some of their applications at least are [Inaudible 00:01:30] they are not [Inaudible 00:01:32] and they don’t have any mobile capability. They also have a requirement to use these applications in [Inaudible 00:01:41] where they don’t have connectivity to the central system or internet, that’s one of their main points. Some of the applications are not scalable. They have a lot of manual process where they are exchanging their forms and emails [Inaudible 00:01:58] notes are not maintained in the system.
They also want to automate all of these in the … some of the … they have some automation in their systems but they are customized and they are coded in the applications and stuff. Having something like a business [Inaudible 00:02:19]. They don’t have a system off record because they have so many different systems they have to go to each system to collect their data. Applications are obsolete and some of them are end of life. We will, in our solution, have to [Inaudible 00:02:44] these paying points. Moving on, some paying points … Most of these are in the challenges document that him...