SlideShare uma empresa Scribd logo
1 de 3
Baixar para ler offline
Safety sensors 
Safesors 
Always protected 
TechSharp
Safesors is an innovative sensor manufacturing firm. Its innovation mood sensors via facial recognition has been used in the automotive industry. They have now come up with another device which can sense fear in individuals by monitoring individual’s heart rate, respiration rate and blood pressure. 
Safesors have collaborated with world’s largest security firm. Many schools,universities are challenged with threats to students and kids. 
While Safesors believe in safety, it also believes in privacy. Hence the sensor with face (expression recognition), video etc. cannot be used with children. The fear sensor designed can be attached to a wearable device such as watch or cloth. The sensors constantly monitor the individual and upload the data back to Safesors. Safesors has planned to build an application which constantly receives the monitored data and sends it to the Analytic engine. Analytic engine incorporates machine learning and complex event processing, to predict individual behavior. 
The proximity device should be attached to the kid’s bag. There are sensors which work on a range and helps identify distance between the bag and kid. Proximity device can tell the location of the kid via GPS tracking. It also identifies the proximity of the fear device, which it is coupled with. Together with fear data and proximity data, the exact location of the kid can be identified. This is when the kid is away from the bag and is wandering somewhere in the school. 
The historical record of each and every individual’s monitored data is maintained. To avoid panic, the precision of fear is set to a certain degree and sustenance of that, for a particular time and all data is maintained. For instance: Let’s say a kid fears for a sec on seeing a dog and then the dog goes way, in such cases, the alert isn’t sent, however the data is recorded. This data will also indicate if the kid is being bullied etc. In cases, where the kid continues to experience fear for more than a specified period, say while it is being attacked by a dog and he or she starts running looking for safety, immediate notifications are sent, so that help can be arranged. 
Apart from notifications sent to Safesors, additional infrastructure can be setup in institutions, malls, police stations etc.so that safesors can forward the notification as appropriate. 
The teams need to provide solution for all the above mentioned requirements. Teams don’t need to provide a design for the fear device. Extra points if you can provide the specs/details for the same. 
Safesors intend to provide this service across the world, which means millions of students, and millions of transactions per second.
Additionally team need to emphasize on the following: 
1. Create an architecture to handle the continuous event stream. 
2. Create a data architecture and provide details on how the data is stored and processed. 
3. Provide details on analytics engine and insights on how the data can be analyzed. 
4. The Team needs to provide data transfer details of the devices and also technology to be used for the same, the data transfer between the devices and the Safesors servers, the notifications, the alert to the security systems, the sound alarms etc. 
Additions: 
Use of disruptive technology: How do we size it? 
Methodology to use and reasons for the same 
What are the steps to be taken for Project architectural governance, monitoring? 
Define Application performance benchmarks

Mais conteúdo relacionado

Semelhante a Safesors

IRJET- Smart and Secure IoT based Child Monitoring System
IRJET-  	  Smart and Secure IoT based Child Monitoring SystemIRJET-  	  Smart and Secure IoT based Child Monitoring System
IRJET- Smart and Secure IoT based Child Monitoring SystemIRJET Journal
 
Create an aware staff with security awareness training
Create an aware staff with security awareness trainingCreate an aware staff with security awareness training
Create an aware staff with security awareness trainingsocassurance
 
Activity Tracker Wrist Band for Children Monitoring using IOT
Activity Tracker Wrist Band for Children Monitoring using IOTActivity Tracker Wrist Band for Children Monitoring using IOT
Activity Tracker Wrist Band for Children Monitoring using IOTrahulmonikasharma
 
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoTIRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoTIRJET Journal
 
Iaetsd an effective alarming model for danger and activity
Iaetsd an effective alarming model for danger and activityIaetsd an effective alarming model for danger and activity
Iaetsd an effective alarming model for danger and activityIaetsd Iaetsd
 
Child Safety monitoring system using php and mysql
Child Safety monitoring  system  using php and mysqlChild Safety monitoring  system  using php and mysql
Child Safety monitoring system using php and mysqlMonikaramesh4
 
Commercial Security Systems To Safeguard Your Company
Commercial Security Systems To Safeguard Your CompanyCommercial Security Systems To Safeguard Your Company
Commercial Security Systems To Safeguard Your CompanyNexlar Security
 
Strategies for Data Leakage Prevention
Strategies for Data Leakage PreventionStrategies for Data Leakage Prevention
Strategies for Data Leakage PreventionIRJET Journal
 
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...Tammy Clark
 
Psychological Security: Introducing the PsySec Field
Psychological Security: Introducing the PsySec FieldPsychological Security: Introducing the PsySec Field
Psychological Security: Introducing the PsySec FieldZach(ary) Eikenberry
 
GPS BASED VULNERABLE CHILD TRACKING SYSTEM
GPS BASED VULNERABLE CHILD TRACKING SYSTEMGPS BASED VULNERABLE CHILD TRACKING SYSTEM
GPS BASED VULNERABLE CHILD TRACKING SYSTEMIRJET Journal
 
IRJET - Women’s Safety using IoT
IRJET - Women’s Safety using IoTIRJET - Women’s Safety using IoT
IRJET - Women’s Safety using IoTIRJET Journal
 
Information Retrieval from Emotions and Eye Blinks with help of Sensor Nodes
Information Retrieval from Emotions and Eye Blinks with help of Sensor Nodes Information Retrieval from Emotions and Eye Blinks with help of Sensor Nodes
Information Retrieval from Emotions and Eye Blinks with help of Sensor Nodes IJECEIAES
 
The Fundamentals and Significance of Security Orchestration Tools
The Fundamentals and Significance of Security Orchestration ToolsThe Fundamentals and Significance of Security Orchestration Tools
The Fundamentals and Significance of Security Orchestration Toolssecuraa
 

Semelhante a Safesors (20)

IRJET- Smart and Secure IoT based Child Monitoring System
IRJET-  	  Smart and Secure IoT based Child Monitoring SystemIRJET-  	  Smart and Secure IoT based Child Monitoring System
IRJET- Smart and Secure IoT based Child Monitoring System
 
Create an aware staff with security awareness training
Create an aware staff with security awareness trainingCreate an aware staff with security awareness training
Create an aware staff with security awareness training
 
Activity Tracker Wrist Band for Children Monitoring using IOT
Activity Tracker Wrist Band for Children Monitoring using IOTActivity Tracker Wrist Band for Children Monitoring using IOT
Activity Tracker Wrist Band for Children Monitoring using IOT
 
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoTIRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
 
Help alert
Help alertHelp alert
Help alert
 
Iaetsd an effective alarming model for danger and activity
Iaetsd an effective alarming model for danger and activityIaetsd an effective alarming model for danger and activity
Iaetsd an effective alarming model for danger and activity
 
Securing Wearable Device Data
Securing Wearable Device DataSecuring Wearable Device Data
Securing Wearable Device Data
 
Child Safety monitoring system using php and mysql
Child Safety monitoring  system  using php and mysqlChild Safety monitoring  system  using php and mysql
Child Safety monitoring system using php and mysql
 
Safety for School Children Transport Enhancement System
Safety for School Children Transport Enhancement SystemSafety for School Children Transport Enhancement System
Safety for School Children Transport Enhancement System
 
Commercial Security Systems To Safeguard Your Company
Commercial Security Systems To Safeguard Your CompanyCommercial Security Systems To Safeguard Your Company
Commercial Security Systems To Safeguard Your Company
 
eTracemate
eTracemateeTracemate
eTracemate
 
Strategies for Data Leakage Prevention
Strategies for Data Leakage PreventionStrategies for Data Leakage Prevention
Strategies for Data Leakage Prevention
 
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...
 
Psychological Security: Introducing the PsySec Field
Psychological Security: Introducing the PsySec FieldPsychological Security: Introducing the PsySec Field
Psychological Security: Introducing the PsySec Field
 
GPS BASED VULNERABLE CHILD TRACKING SYSTEM
GPS BASED VULNERABLE CHILD TRACKING SYSTEMGPS BASED VULNERABLE CHILD TRACKING SYSTEM
GPS BASED VULNERABLE CHILD TRACKING SYSTEM
 
IRJET - Women’s Safety using IoT
IRJET - Women’s Safety using IoTIRJET - Women’s Safety using IoT
IRJET - Women’s Safety using IoT
 
Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?
 
Primary education system in India
Primary education system in IndiaPrimary education system in India
Primary education system in India
 
Information Retrieval from Emotions and Eye Blinks with help of Sensor Nodes
Information Retrieval from Emotions and Eye Blinks with help of Sensor Nodes Information Retrieval from Emotions and Eye Blinks with help of Sensor Nodes
Information Retrieval from Emotions and Eye Blinks with help of Sensor Nodes
 
The Fundamentals and Significance of Security Orchestration Tools
The Fundamentals and Significance of Security Orchestration ToolsThe Fundamentals and Significance of Security Orchestration Tools
The Fundamentals and Significance of Security Orchestration Tools
 

Mais de Prashanth Panduranga (20)

WebApplicationArchitectureAzure.pptx
WebApplicationArchitectureAzure.pptxWebApplicationArchitectureAzure.pptx
WebApplicationArchitectureAzure.pptx
 
WebApplicationArchitectureAzure.pdf
WebApplicationArchitectureAzure.pdfWebApplicationArchitectureAzure.pdf
WebApplicationArchitectureAzure.pdf
 
Digital transformation
Digital transformationDigital transformation
Digital transformation
 
Dev opsnirvana
Dev opsnirvanaDev opsnirvana
Dev opsnirvana
 
Architecting extremelylargescalewebapplications
Architecting extremelylargescalewebapplicationsArchitecting extremelylargescalewebapplications
Architecting extremelylargescalewebapplications
 
Architecting extremelylarge scale web applications
Architecting extremelylarge scale web applicationsArchitecting extremelylarge scale web applications
Architecting extremelylarge scale web applications
 
Inevitability of Multi-Tenancy & SAAS in Product Engineering
Inevitability of Multi-Tenancy & SAAS in Product EngineeringInevitability of Multi-Tenancy & SAAS in Product Engineering
Inevitability of Multi-Tenancy & SAAS in Product Engineering
 
Augmenting IT strategy with Enterprise architecture assessment
Augmenting IT strategy with Enterprise architecture assessmentAugmenting IT strategy with Enterprise architecture assessment
Augmenting IT strategy with Enterprise architecture assessment
 
Arch on global_hackathon
Arch on global_hackathonArch on global_hackathon
Arch on global_hackathon
 
View d print
View d printView d print
View d print
 
Social review
Social reviewSocial review
Social review
 
Seeory
SeeorySeeory
Seeory
 
My stylemyway
My stylemywayMy stylemyway
My stylemyway
 
Meet mi
Meet miMeet mi
Meet mi
 
Mcr trendz
Mcr trendzMcr trendz
Mcr trendz
 
Light suitcase
Light suitcaseLight suitcase
Light suitcase
 
Flex matics
Flex maticsFlex matics
Flex matics
 
Doc byyou
Doc byyouDoc byyou
Doc byyou
 
C s rwe
C s rweC s rwe
C s rwe
 
Being there
Being thereBeing there
Being there
 

Último

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 

Último (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 

Safesors

  • 1. Safety sensors Safesors Always protected TechSharp
  • 2. Safesors is an innovative sensor manufacturing firm. Its innovation mood sensors via facial recognition has been used in the automotive industry. They have now come up with another device which can sense fear in individuals by monitoring individual’s heart rate, respiration rate and blood pressure. Safesors have collaborated with world’s largest security firm. Many schools,universities are challenged with threats to students and kids. While Safesors believe in safety, it also believes in privacy. Hence the sensor with face (expression recognition), video etc. cannot be used with children. The fear sensor designed can be attached to a wearable device such as watch or cloth. The sensors constantly monitor the individual and upload the data back to Safesors. Safesors has planned to build an application which constantly receives the monitored data and sends it to the Analytic engine. Analytic engine incorporates machine learning and complex event processing, to predict individual behavior. The proximity device should be attached to the kid’s bag. There are sensors which work on a range and helps identify distance between the bag and kid. Proximity device can tell the location of the kid via GPS tracking. It also identifies the proximity of the fear device, which it is coupled with. Together with fear data and proximity data, the exact location of the kid can be identified. This is when the kid is away from the bag and is wandering somewhere in the school. The historical record of each and every individual’s monitored data is maintained. To avoid panic, the precision of fear is set to a certain degree and sustenance of that, for a particular time and all data is maintained. For instance: Let’s say a kid fears for a sec on seeing a dog and then the dog goes way, in such cases, the alert isn’t sent, however the data is recorded. This data will also indicate if the kid is being bullied etc. In cases, where the kid continues to experience fear for more than a specified period, say while it is being attacked by a dog and he or she starts running looking for safety, immediate notifications are sent, so that help can be arranged. Apart from notifications sent to Safesors, additional infrastructure can be setup in institutions, malls, police stations etc.so that safesors can forward the notification as appropriate. The teams need to provide solution for all the above mentioned requirements. Teams don’t need to provide a design for the fear device. Extra points if you can provide the specs/details for the same. Safesors intend to provide this service across the world, which means millions of students, and millions of transactions per second.
  • 3. Additionally team need to emphasize on the following: 1. Create an architecture to handle the continuous event stream. 2. Create a data architecture and provide details on how the data is stored and processed. 3. Provide details on analytics engine and insights on how the data can be analyzed. 4. The Team needs to provide data transfer details of the devices and also technology to be used for the same, the data transfer between the devices and the Safesors servers, the notifications, the alert to the security systems, the sound alarms etc. Additions: Use of disruptive technology: How do we size it? Methodology to use and reasons for the same What are the steps to be taken for Project architectural governance, monitoring? Define Application performance benchmarks