• About Software Engineering and Bill Gutches
  • Afraid To Ship

IT's Lost Art of Software Engineering

~ Business Solutions should be sustainable assets designed with Engineering Principles!

IT's Lost Art of Software Engineering

Category Archives: Mandatory

Watch this space: I’m writing AGAIN!!!

15 Sunday Sep 2013

Posted by bgbgbgbg in alternate, Attribute, Cloud, compliance, compliant, Data, effective, efficient, engineering, Event, lifestyles, manage, management, Mandatory, Object, opinions, Optional, predictabable, principles, project, re-useable, Relationship, repeatable, risk, risk management, Row, sixty somethin, sixty something, software, Standards, structured, Transaction, Valid, Value

≈ Leave a comment

Tags

agile, analysis, best practice, business sponsors, conflict, data, data design, design, event, flowchart, functional decomposition, investors, iterative, jackson, lifecyle, management, model choices, modeling, nassi-schneidermann, old school, organization, perspective, planning, politics, priority issues, priority sequence, process, project charter, project priority, punch list, rapid, recovery assessment, requirements, resolution, scope, SDLC, state, state transition, state transition diagrams, stockholders, swim lane, technology, use case, visual, warnier-orr

I just want you all to know that I have started writing again. Recently, I have spent a lot of time NOT writing (did have some other things to take care of, and still do), but it appears I have the bug again!

So, I want to let all of you, my readers, know that I am starting again with new materials AND I also want you to know that I have several blogs I am writing on:

Project Management Handbook: http://www.projectmanagementhandbook.wordpress.com

BG Opinions: http://www.opinionsarefree.wordpress.com

Sixty Somethin: http://www.sixtysomethin.wordpress.com

Please check these out and I hope that you continue to enjoy reading, and please send me your comments or suggestions at whendoyoustoplooking@gmail.com or some of my other email addresses for these blogs.

Thanx, bgbg

Advertisements

Hello World! Thank You, World!

20 Thursday Dec 2012

Posted by bgbgbgbg in Attribute, Cloud, compliance, compliant, Data, effective, efficient, engineering, Event, management, Mandatory, Object, Optional, predictabable, principles, re-useable, Relationship, repeatable, Row, software, Standards, structured, Transaction, Valid, Value

≈ Leave a comment

Tags

agile, analysis, best practice, business sponsors, conflict, data, data design, design, event, flowchart, functional decomposition, investors, iterative, jackson, lifecyle, management, model choices, modeling, nassi-schneidermann, old school, organization, perspective, planning, politics, priority issues, priority sequence, process, project charter, project priority, punch list, rapid, recovery assessment, requirements, resolution, scope, SDLC, state, state transition, state transition diagrams, stockholders, swim lane, technology, use case, visual, warnier-orr

I’ve been writing random and sometimes organized thoughts in this blog for quite a while now and I just took a closer look at the statistics of people who have read my stuff.

So, I want to Thank every one of you who have read my materials and I hope that you all continue to take benefit from or enjoy these materials.

Here is a graphic of the geographical reach that I have benefited from and I would like each of you to know that I appreciate every minute you take to follow me, read this stuff, and, hopefully comment on and invite others you know to read this same information:

Image

Thank you, bgbg

The Data Manifesto

28 Wednesday Nov 2012

Posted by bgbgbgbg in Attribute, Cloud, compliance, compliant, Contract Career, Data, effective, efficient, engineering, Event, management, Mandatory, Object, Optional, predictabable, principles, re-useable, Relationship, repeatable, Row, software, Standards, structured, Transaction, Valid, Value

≈ 2 Comments

Tags

agile, analysis, best practice, data, data design, design, event, flowchart, functional decomposition, iterative, jackson, lifecyle, management, model choices, modeling, perspective, planning, priority sequence, process, requirements, scope, SDLC, state, state transition, swim lane, technology, use case, visual, warnier-orr

All Data Are Protected (ala The Matrix)

An Event occurs that is associated with a collection of data attributes that need protection.

Each unique Event has a finite list of Data that are expected to occur when a new instance of an Event happens.  In almost all cases, that list of Data includes, at least, the Date, Time, Location, and Instigator of the Event.  Other Data are also needed depending on the specific Type or Name of each Event.  This list of proscribed Data for a unique Event is called a Row.  When each Row first expresses as an Event it is considered an Unprotected Row.

Event Data requires that it receive protection before becoming in three levels:

  1. Content Protection
  2. Field Relationship Protection
  3. Object Relationship Protection

Once a set of Event Data or each Unprotected Row passes all three of these levels, it can become a legitimate Transaction and take its place in its Legitimate Protected Transaction Row Object to be processed against its Master Data Object(s).

Protection Level One: Content

Each Data has a pre-determined set of Valid Values that are anticipated and allowed in that Data.  If a Data contains Value that is not in the anticipated Valid Value set, then the Unprotected Row that represents this particular Event is sent to “Corrections” for further processing.  This set of Event Data CANNOT be processed as a Level One Unprotected Row.

Further, each Unprotected Row for a unique Event will have Data that are defined as Primary and/or Partial Key Data which is used to uniquely identify each instance of every Event occurrence.

Valid Unprotected Rows that pass this Level One Protection can proceed to Level Two Protection validation.

Protection Level Two: Field Relationship

Some Data have Values that require or limit the selection of Valid Values for other Data in its Unprotected Row.  If a Data Value prescribes that other Data be limited to a subset of their anticipated Valid Values then those Data must be validated based on that limited subset.

If a related Data does not comply with its limited Valid Value set, then the Unprotected Row that represents this particular Event is sent to “Corrections” for further processing.  This set of Event Data CANNOT be processed as a Level Two Unprotected Row.

Valid Unprotected Rows that pass this Level Two Protection can proceed to Level Three Protection Validation.

Protection Level Three: Object Relationship

Successful Level One and Level Two Unprotected Rows must have Relationships with other Objects in the Model by using the Valid Values that are in their Data that are part of their Primary or Partial Key Data.  The Values in these Primary and/or Partial Key Data have specific Relationship Rules to other named Objects that must be Validated.

Optional Relationship Rules need NOT be Validated.

The Relationships that are marked as Mandatory MUST find Protected Rows in named Objects elsewhere in the Model.  If these Mandatory Relationships are not proven to exist then the Unprotected Row is sent to “Corrections” for further processing.  This set of Event Data CANNOT be processed as a Legitimate Protected Transaction.

Valid Unprotected Rows that pass this Level Three Protection will be inserted in the Legitimate Protected Transaction Row Object that this Type of Event is assigned to for further processing.

All Data Are Protected.

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 472 other followers

Send me your Ideas: whendoyoustoplooking@gmail.com

As you review these opinions and you have some of you own (I know that you do!), please send me your comments, diagrams, or relevant attachments to my email address. I look forward to making a connection with others who either agree with me or don't agree with me. Thanx, bgbg

Blogroll

  • Symbiosys Consulting 0
  • Veteran Computer Consultants – PCs for the Returning Vets and other IT Services 5

Computer

  • Symbiosys Consulting 0

Consulting

  • Symbiosys Consulting 0

Training

  • Symbiosys Consulting 0

WPEntry

  • Discuss 0
  • Get Inspired 0
  • Get Polling 0
  • Get Support 0
  • Learn WordPress.com 0
  • WordPress Planet 0
  • WordPress.com News 0
Advertisements

Archives

Categories

  • alternate
  • Attribute
  • blog
  • Cloud
  • compliance
  • compliant
  • content
  • contract
  • Contract Career
  • Data
  • Diversify
  • Diversity
  • effective
  • efficient
  • engineering
  • Event
  • lifestyles
  • manage
  • management
  • Mandatory
  • master service agreement
  • Media
  • Object
  • opinions
  • Optional
  • predictabable
  • Presence
  • principles
  • project
  • purchase order
  • re-useable
  • recover
  • recovery
  • Relationship
  • repeatable
  • risk
  • risk management
  • Row
  • royalty
  • Scope
  • service
  • sixty somethin
  • sixty something
  • Social
  • software
  • Standards
  • Statement of Work
  • structured
  • Test
  • Testing
  • Transaction
  • Uncategorized
  • Valid
  • Value
  • Web

Create a free website or blog at WordPress.com.

Cancel