You’ve completed the pilot for the Section 508-validated application for U.S. Department of Homeland Security field officers. It’s now time to present your post-pilot report to stakeholders in order to secure funding. This is your sales pitch to convince the stakeholders to fund the project for the next five years.
Instructions
Create a 10-slide PowerPoint presentation that addresses the following. Each slide should have no more than 6 bullets; all other context and explanations should be provided either in the speaker’s notes or in a recording of the presentation.
• Summarize your user applicability and needs proposal. Your summary should clearly demonstrate that your data-collection plan was directed toward the appropriate users and was designed to address user needs and minimize user frustration.
• Summarize your software development plan to show how you’ve followed the proper stages for software development, considered all necessary resources, and allowed for appropriate durations of time.
• Provide a brief overview of your prototype to clearly demonstrates you’ve addressed functionality and user needs. Include these features:
• Interfaces.
• Methods for input/output.
• Supported devices.
• Processing of user mistakes and errors by the application.
• Tools to determine programming bugs.
• Automated tools to validate accessibility.
• Implementation of application security.
• User display drawing.
• System process flow drawing.
• Describe how your testing plan validates function, usability, accessibility, and security.
• Recommend that stakeholders fund the project for the next five years by validating that the specifications for the app were met and reiterating the benefits of the app.
• Include no more than 6 bullet points per slide. You may either write detailed speaker’s notes of what you would say if you were delivering the presentation live, or you may record the presentation.
Slide 1: Summary of User Proposal
• Identified target user group and collected data on their needs/frustrations with existing apps.
• Evaluated industry standards for software development.
• Developed detailed specification document outlining app requirements.
Slide 2: Overview of Software Development Plan
• Followed appropriate stages for software development (e.g., planning, design, implementation)
• Allocated resources and time frames to meet project goals.
• Tested app throughout the process to ensure quality assurance was met
Slide 3: Prototype Features – Interfaces
• Designed user-friendly graphical interfaces using standard UI tools • Utilized responsive web design techniques when applicable
Slide 4: Prototype Features – Input/Output Methods //// • Implemented different methods of input/output depending on platform requirements • Ensured all devices were supported and data could be accessed from any location
Slide 5: Error Processing & Bug Detection Tools • Created automated bug detection tools to identify errors in code • Developed system to detect programming bugs • Included features that allowed application to detect user mistakes or errors
Slide 6: Accessibility & Security Validation • Enabled automated validation processes to ensure Section 508 compliance • Established secure protocols for access control based on user authorization level • Incorporated security measures such as encryption algorithms and firewalls
Slide 7: User Display & System Process Flow Drawing • Utilized drawing programs to create visuals for showing the user display flow And system process flow
Slide 8: Testing Plan Validation \\// \\// To validate Functionality, Usability, Accessibility, Security \\// \\// Conducted tests including nonfunctional testing (performance and scalability), usability tests, accessibility tests, security validations
Slide 9: Recommendation – Fund Project //\\ //\\ After successful completion of pilot program specs were met //\\ Request funding for next five years due the following benefits Increased productivity through enhanced functionality Improved customer service satisfaction through improved usability Enhanced accessibility compliance with Section 508 regulations Improved data security via robust protocols
Slide 10 : Conclusion Thank you!