Frequent Shopper Network Analysis

778 Words4 Pages
Introduction This paper will be a technical architecture document for the Kudler Fine Foods’ Frequent Shopper Program. It will describe the hardware platform, the network connections, the software development tools, the database information, user interfaces, controls, and security of the program. The Frequent Shopper Program for Kudler Fine Foods is being developed by Smith Consulting. The goal of the program is to increase the customer base and keep customers coming back. The development process will be entirely in the hands of Smith Consulting, from the development of the hardware platform to the security measures put in place for the program. Hardware Platform The locations that are included in the development process are La Jolla,…show more content…
The POS system can track the Frequent Shopper Program with cards and barcode system. The current barcode system is sufficient for the Frequent Shopper Program. Network Connections The current network connection type is a virtual private network (VPN). It is fully secured and enables each of the three locations to connect to the headquarters so that information can be shared within the system. Each location can also be linked to one another through the VPN. Logging in to the network is required by staff and employees in order to keep security maximal. Software Development Tests Kudler Fine Foods will be informed of the entire development process by Smith Consulting. Any risks or errors in the development process will be documented. Testing will be done throughout the development process, as well as testing done with consumers once the program is released. An evaluation of the program will be done by Smith Consulting after release of the…show more content…
This ID will track the purchasing habits of customers and take account of what their purchases are as well as their quantity. The customer can access their account online by entering in the ID code and e-mail address. The customer can then track their purchases and points, use their points there, or make online purchases logged into their account. Security The data entered and transmitted will be on a secured server and website. Security measures will be put in place at each location including anti-virus and removal of hazardous programs. Personal information will have maximum security, only being transferred around on the VPN. Firewalls will be put in place to further protect any information that could potentially be compromised. Conclusion There are several steps involved with the development process that Smith Consulting will be responsible for. Each step must be thoroughly tested and conducted with professionalism. The goal is to have an effective and secure program for Kudler Fine Foods, and the topics in this paper will have to be covered to end up with a successful finished
Open Document