IA (information architecture), 55
ICQ, 9
IDE (integrated development environment), 23, 398
Identification requirements, 118-119
Identifier element (use case), 111
Identities, types of, 190-191
IDENTITY data type (SQL Server), 313
Identity flow
at the application level, 191
operating system, 191
IIS (Internet Information Server), 20, 85-86, 303
running as a service, 309
settings, 435
version-control options, 436
IL (intermediate language) assemblies, 26
IM (instant messaging) client, 291
Image maps, accessible, 115
Images, accessible, 115
Immunity requirements, 119
Imperative role-based security, 189
Impersonation, 190
Implementation status attribute (requirements), 100
Inactive accounts, deleting, 86
Incremental backup, 193
Incremental builds (assembly), 397
Indent Case Labels (C#), 415
Indentation of code, 412
Indexes
as database optimizations, 313
creating, 370
for a field, 368
guidelines for when to create, 369
impact on performance of, 369
for a relational database, 368
selecting columns for, 369
types of, 369
Indexing specification, creating, 368-370
Indexing strategy, designing, 369
Indirect users, 95
Industry position, analyzing, 96-97
Industry-specific processes (business processes), 94
Information, analyzing, 124
Information icon (Event Viewer), 343
Information inventory, 123
Information models, 148
Information stores
identifying, 124
types of, 124
Information traveling through the system, documenting, 252
Information types, 124
Information-gathering techniques, 102
Infrastructure architecture (EA), 55
In-memory databases, transaction servers for, 271
Input and output devices, DFDs for, 258
Insecure data, 120
Insert Spaces option (code formatting), 413
Installation process, 117
Installer application (distribution method), 173
Integrating of systems, 121-123
Integration (application)
defined, 164
specifications for, 345-348
strategies for, 164-165
Integration architecture (EA), 56
Integration point, 347
Integration requirements, 104, 121-123
Integration testing, 422-423
bottom-up approach, 423
top-down approach, 422-423
umbrella approach, 423
Integrity requirements, 119
IntelliSense, 24, 396, 398, 405, 407
IntelliSense help, displaying, 405
Interchangeable component, 154
Interface document, 393-394
Interface names, using the I prefix for, 409
Interface object (data flow diagram), 105-106
Interface object (use case), 88
Interface object (Visio application), 108
Interfaces, consistent set of, 417
Interfacing tasks, centralizing, 300
Internal dependencies, identifying, 103
Internal release cycles, 430
Internationalization (i18n), 112-114, 301
Internet
COM/DCOM model and, 7-8
web services available on, 14, 308
Internet Explorer, as a functional application, 287
Internet protocols, web services and, 272
Internet standards-based interface, 357
Interoperability
designing for, 164
types of, 165
Interpreted vs. compiled languages, 19
Interviewing, 102
Interviews with key personnel, 86, 136-137
Intrusion detection requirements, 120
Inventory
categories of, 123
steps involved in searching, 254
tracking and reordering, 288
Invoicing, business objects in, 293-294
Invoicing example, 293-294, 315
IPrincipal interface, 303
IPv6 protocol, 29
Irreflexive constraint (ORM diagram), 238
Is (in Boolean variables), 410
ISAM (indexed sequence access method), 169
Isolated model (of web application development), 434-435
Isolating applications, 174
Issues tracking, 432
IT environment
analyzing, 123-125
existing, 85
impact of solution on, 125
IT state, comparing current and future, 125
Iterative development, 47
benefits of, 49
defined, 49
Iterative programming, 49