Browse Definitions :
Definition

exploratory model

The exploratory model is a systems development method ( SDM ) occasionally used to design and develop a computer system or product and basically consists of planning and trying different designs until one of them seems to be the right one to develop. This model works best in situations where few, or none, of the system or product requirements are known in detail ahead of time. This model is largely based on educated guesswork.

There are several steps in the exploratory model:

  1. A starting point is determined for the work. All the information available is gathered together in an attempt to get an idea of what the new system will be expected to do, and how it can be done.
  2. A rudimentary first-generation system is put together, based on the information gathered and the ideas formulated in the first step.
  3. The first-generation system is tested to see how it performs, what it can and cannot do, and what might be done to improve it.
  4. A second-generation system is developed from the first one, based on the improvements proposed in the previous step.
  5. The second-generation system is tested, as was the first. Its performance is evaluated, and possible improvements determined.
  6. The process is repeated as many times as necessary to obtain user satisfaction, or until it is decided that the project is unworkable.
  7. Routine maintenance is carried out on a continuing basis to prevent large-scale failures and to minimize downtime.

This model resembles the prototyping model, but it begins at a more nebulous starting point, and proceeds in a less formal fashion. This scheme is not particularly cost-effective and sometimes results in less-than-optimal systems, so it should be used only when no viable alternative seems to exist.

This was last updated in April 2006
SearchCompliance
  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity
  • session key

    A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session ...

  • computer forensics (cyber forensics)

    Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular ...

  • multifactor authentication (MFA)

    Multifactor authentication (MFA) is a security technology that requires more than one method of authentication from independent ...

SearchHealthIT
SearchDisasterRecovery
  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage
  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close