SlideShare a Scribd company logo
1 of 16
BSA/425 v1.3
Project Plan Draft
BSA/425 v1.3
Page 11 of 11
Project Plan Draft
Fill out each of the sections below with information relevant to
your project. Be sure to include the company name associated
with your project.
Lowkey IncNetwork Technology Recommendations
Network Technology Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Wide Area Network
This ty0pe of network connects computers within a long
distance
10
Accessibility
The system should be easily accessible to users
20
security
The technology’s integrity should not be interfered with by
hackers and malicious parties
30
Compatibility
It should be compatible with all the information resources that
the firm uses.
20
Network Technology Recommendation
Recommended Network Technologies
Description
Benefits
Aggregate Selection Criteria Score
Emails
Promotes communication cross different parties
Facilitates communication with customers
40
Firewalls
This resource safeguards the firm’s network from unauthorized
access and disruptions
Prevents fraudulent activities
20
Artificial Intelligence
Enhances the efficiency of the network
Integrates the services and key procedures, thus improving
changes adopted
20
Internetworking tools
Promotes integrated communication to attain networking goals
Increases the efficiency of communication
20
Network Technology Vendor Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Price
The cost of purchasing the network infrastructures
20
Quality
The efficiency and effectiveness of the technologies in attaining
their goals
40
Proximity
Physical distance from the firm
20
After Sales Service
The services provided by the firm following the purchase of the
systems
20
Network Technology Recommended Vendors
Vendor Name
Vendor Strengths
Vendor Weaknesses
Products/Services Provided to Project
Aggregate Selection Criteria Score
Cisco
Cost-efficient and responsive customer care
Highly responsive
Encryption can safeguard the network against interceptions
50
Alloys
Fast network connectivity
Network fluctuates
They can offer heavy network
30
Oracle
Low cost
Highly expensive
Provides a repair and maintenance software
20
Network Technology Deployment Challenges
Deployment Challenge
Deployment Challenge Description
Deployment of physical over logical controls
Physical network appliances are linked using protocols while in
logical networks, there is utilization of different traffics that are
agnostic to physical
Scalable deployments
The networks should be both automatic and scalable
High costs
High deployment costs is a challenge
Inaccessibility
Insufficient accessibility approach is a major problem
Technology Adoption Methods
Method Name
Method Description
Parallel Approach
The adoption occurs when the new system is introduced while
the old one is still in use
Phased
Gradually replacing small parts of the old system with the new
one until it is fully implemented
Piloting
Using a small group of users to test the new system before it is
widely adopted
Direct Adoption
Implementing a new system radically
Cost/Benefit Considerations
Benefits
Costs
Considerations
Increased efficiency
Personnel
Hiring the most qualified pool of IT professionals
Flexibility
Organizational expenses
Training employees to adapt to the new technology
Cost cutting
Cost of tools
Seek the vendors who provide cost-effective and quality
hardware and software technologies
Access and availability
Maintenance costs
Repair and maintenance must be done regularlyDatabase System
Recommendation
Database System Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Operational consideration
Ability to manage failure recovery and maintain availability
30
Security
The database’s integrity should not be tampered with
20
Development consideration
The openness of the support options
20
Commercial consideration
Its potential commercial importance and benefits
20
Database System Recommendation
Recommended Database System
Description
Benefits
Aggregate Selection Criteria Score
Relational database management system
Comprises multiple tables of data with rows and columns that
relate to each other
These databases are more flexible
40
Hierarchical database systems
This model resembles a tree structure, with pre-defined
relationships
Requires users to pass hierarchies to access the required data,
hence secure
10
Network database systems
Supports many to many relationships
Can promote integration of systems
40
Object-oriented database systems
Information is represented as objects
Supports different forms of programming
10
Database System Vendor Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Usability
User friendliness and ease of use
30
Visualization and reporting
Ease of visually analyzing and displaying data and results
20
Security
Ability to be stored securely
10
Functionality
Ability to meet business requirements
40
Database System Recommended Vendors
Vendor Name
Vendor Strengths
Vendor Weaknesses
Products/Services Provided to Project
Aggregate Selection Criteria Score
Oracle
Has syntax enhancements and performance improvements
expensive
Multitenancy, database in-memory, and database Sharding
30
Microsoft
Ease of use and high availability
Challenges in seamlessly integrating high volumes of corporate
data
SQL Server
30
IBM
Can accommodate big data
Expensive
IDM DB2
20
Knack
Provides many tools for online databases
It is highly customized
Knack
20
Database System Deployment Challenges
Deployment Challenge
Deployment Challenge Description
Data security
The organization may lack resources for securing its database
Performance
The database may have harsh performance criteria
Resource utilization
The database may not have the best hardware available to run
on
High availability
In case the single server goes down, the firm’s operations are
paralyzed
Technology Adoption Methods
Method Name
Method Description
Method Name
Method Description
Parallel Approach
The adoption occurs when the new system is introduced while
the old one is still in use
Phased
Gradually replacing small parts of the old system with the new
one until it is fully implemented
Piloting
Using a small group of users to test the new system before it is
widely adopted
Direct Adoption
Implementing a new system radically
Cost/Benefit Considerations
Benefits
Costs
Considerations
Increased efficiency
Personnel
Hiring the most qualified pool of IT professionals
Flexibility
Organizational expenses
Training employees to adapt to the new technology
Cost cutting
Cost of tools
Seek the vendors who provide cost-effective and quality
hardware and software technologies
Access and availability
Maintenance costs
Repair and maintenance must be done regularlySoftware
Application Recommendations
Software Application Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Suitability
Ability to provide appropriate set of functions
40
Accuracy
Ability to provide the right or agreed results
20
Interoperability
Ability to interact with one or more specified systems
20
Security
Ability to provide mechanisms to prevent the accidental or
deliberate interference with integrity
20
Software Application Recommendation
Recommended Software Application
Description
Benefits
Aggregate Selection Criteria Score
ERP
Integrated software for managing and coordinating all the
business activities
It provides real-time standardization and streamlining of
business processes.
30
Office production software
Producing and compiling information, such as documents and
reports
Reduces and heaps of paperwork
30
CRM
Facilitates interactions with customers
Can be used to analyze customer trends and preferences
20
MIS
Facilitates gathering, analyzing, and disseminated data for
organizational operations
Informs company decision-making
20
Software Application Vendor Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Rates
The vendors should not be too expensive
20
Main areas of expertise
Relevance of the software to the business functions
20
Certification
Must have local and international certification
20
Security
Should have an information security plan
20
Software Application Recommended Vendors
Vendor Name
Vendor Strengths
Vendor Weaknesses
Products/Services Provided to Project
Aggregate Selection Criteria Score
Microsoft
Can customize to the business’s needs
costly
Microsoft Office
20
IBM
They install and configure them for firms
Scalability and integration challenges
Sterling Order Management
20
Oracle
Portability
Expensive
Oracle CRM
30
SAP
Multiple database support
Very complex to use
SAP ERP
20
Software Application Deployment Challenges
Deployment Challenge
Deployment Challenge Description
Misaligned expectations
Project teams and stakeholders may differ on the needs and
requirements of the software
Data integrity
Lack of an effective strategy for securing data
Insufficient training tools
Employees maybe insufficiently prepared tom operate the
software
Testing problems
Lack of a testing and maintenance tool
Technology Adoption Methods
Method Name
Method Description
Parallel Approach
The adoption occurs when the new system is introduced while
the old one is still in use
Phased
Gradually replacing small parts of the old system with the new
one until it is fully implemented
Piloting
Using a small group of users to test the new system before it is
widely adopted
Direct Adoption
Implementing a new system radically
Cost/Benefit Considerations
Benefits
Costs
Considerations
Increased efficiency
Personnel
Hiring the most qualified pool of IT professionals
Flexibility
Organizational expenses
Training employees to adapt to the new technology
Cost cutting
Cost of tools
Seek the vendors who provide cost-effective and quality
hardware and software technologies
Access and availability
Maintenance costs
Repair and maintenance must be done regularlyCloud Services
Recommendations
Cloud Services Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Compliance with standards
Compliance with government and professional regulations
30
Service roadmap
Current goals and objectives of the vendors
40
Terms of service
If they do not have tough terms and conditions
10
Data security
Ability to secure the data
20
Cloud Services Recommendation
Recommended Cloud Services
Description
Benefits
Aggregate Selection Criteria Score
Amazon
Provides additional services, such as storage and security
Support users to integrate with business
20
Google Cloud
Can provide free packages
Supports all organizational functions
20
IBM
Fast response to customer enquiries
Can provide platform as a service
40
Adobe
Ideal for supporting publishing and editing
it is a creative cloud system
20
Cloud Services Recommended Vendors
Vendor Name
Vendor Strengths
Vendor Weaknesses
Products/Services Provided to Project
Aggregate Selection Criteria Score
Amazon
Provides additional services, such as storage and security
Cannot be customized
Amazon Cloud
30
Google Cloud
Can provide free packages
Slow responsiveness to customer inquiries
Google Cloud
20
IBM
Fast response to customer enquiries
Expensive
IBM Cloud
30
Adobe
Ideal for supporting publishing and editing
Only ideal for media and publishing
Adobe
20
Cloud Services Deployment Challenges
Deployment Challenge
Deployment Challenge Description
Data security
Increased incidences of hacking of cloud resources
Performance issues
Disruptions from vendors due to maintenance
Availability problems
Lack of availability of services when technical issues emerge
Data safety
Data may be affected when the computer systems are infected
by viruses
Technology Adoption Methods
Method Name
Method Description
Parallel Approach
The adoption occurs when the new system is introduced while
the old one is still in use
Phased
Gradually replacing small parts of the old system with the new
one until it is fully implemented
Piloting
Using a small group of users to test the new system before it is
widely adopted
Direct Adoption
Implementing a new system radically
Cost/Benefit Considerations
Benefits
Costs
Considerations
Increase in efficiency
$4000
Installing efficient and state-of-the art hardware and software
resources to speed up business transactions
Reduction in costs
$3000
Eliminating heaps of paperwork
Hiring more staff
$10000
Individuals who will operate or control the cloud resources
Purchasing more computer resources
$5000
Devices should be purchased to support the running of the cloud
computing system
Copyright 2020 by University of Phoenix. All rights reserved.
Copyright 2020 by University of Phoenix. All rights reserved.
BSA425 v1.3Project Plan DraftBSA425 v1.3Page 11 of 11P

More Related Content

Similar to BSA425 v1.3Project Plan DraftBSA425 v1.3Page 11 of 11P

Engineering_Campus_Presentation_2022 (1)-compressed.pptx
Engineering_Campus_Presentation_2022 (1)-compressed.pptxEngineering_Campus_Presentation_2022 (1)-compressed.pptx
Engineering_Campus_Presentation_2022 (1)-compressed.pptx
Manikaahuja4
 
Best Practices In Load And Stress Testing Cmg Seminar[1]
Best Practices In Load And Stress Testing Cmg Seminar[1]Best Practices In Load And Stress Testing Cmg Seminar[1]
Best Practices In Load And Stress Testing Cmg Seminar[1]
Munirathnam Naidu
 

Similar to BSA425 v1.3Project Plan DraftBSA425 v1.3Page 11 of 11P (20)

Performance Testing
Performance TestingPerformance Testing
Performance Testing
 
Forrester Survey sponsored by Juniper: Building for the Next Billion - What t...
Forrester Survey sponsored by Juniper: Building for the Next Billion - What t...Forrester Survey sponsored by Juniper: Building for the Next Billion - What t...
Forrester Survey sponsored by Juniper: Building for the Next Billion - What t...
 
Ibm test data_management_v0.4
Ibm test data_management_v0.4Ibm test data_management_v0.4
Ibm test data_management_v0.4
 
How to add security in dataops and devops
How to add security in dataops and devopsHow to add security in dataops and devops
How to add security in dataops and devops
 
Ppt 21 ge
Ppt 21 gePpt 21 ge
Ppt 21 ge
 
Best Practices for Building Scalable Visibility Architectures
Best Practices for Building Scalable Visibility ArchitecturesBest Practices for Building Scalable Visibility Architectures
Best Practices for Building Scalable Visibility Architectures
 
Engineering_Campus_Presentation_2022 (1)-compressed.pptx
Engineering_Campus_Presentation_2022 (1)-compressed.pptxEngineering_Campus_Presentation_2022 (1)-compressed.pptx
Engineering_Campus_Presentation_2022 (1)-compressed.pptx
 
Paetec Data Center Colocation Presentation
Paetec Data Center Colocation PresentationPaetec Data Center Colocation Presentation
Paetec Data Center Colocation Presentation
 
Cisco Analytics: Accelerate Network Optimization with Virtualization
Cisco Analytics: Accelerate Network Optimization with VirtualizationCisco Analytics: Accelerate Network Optimization with Virtualization
Cisco Analytics: Accelerate Network Optimization with Virtualization
 
Best Practices In Load And Stress Testing Cmg Seminar[1]
Best Practices In Load And Stress Testing Cmg Seminar[1]Best Practices In Load And Stress Testing Cmg Seminar[1]
Best Practices In Load And Stress Testing Cmg Seminar[1]
 
A perspective on cloud computing and enterprise saa s applications
A perspective on cloud computing and enterprise saa s applicationsA perspective on cloud computing and enterprise saa s applications
A perspective on cloud computing and enterprise saa s applications
 
Andy chatha - arc advisory group - rethinking it and automation solutions
Andy chatha - arc advisory group - rethinking it and automation solutionsAndy chatha - arc advisory group - rethinking it and automation solutions
Andy chatha - arc advisory group - rethinking it and automation solutions
 
Knowledge is Power - Richard May, Raritan
Knowledge is Power - Richard May, RaritanKnowledge is Power - Richard May, Raritan
Knowledge is Power - Richard May, Raritan
 
T3 Consortium's Performance Center of Excellence
T3 Consortium's Performance Center of ExcellenceT3 Consortium's Performance Center of Excellence
T3 Consortium's Performance Center of Excellence
 
Cloud Data Integration Best Practices
Cloud Data Integration Best PracticesCloud Data Integration Best Practices
Cloud Data Integration Best Practices
 
IBM Relay 2015: Cloud is All About the Customer
IBM Relay 2015: Cloud is All About the Customer IBM Relay 2015: Cloud is All About the Customer
IBM Relay 2015: Cloud is All About the Customer
 
Forecast 2014: Welcome to the ODCA University - School is Way Cool!
Forecast 2014: Welcome to the ODCA University - School is Way Cool!Forecast 2014: Welcome to the ODCA University - School is Way Cool!
Forecast 2014: Welcome to the ODCA University - School is Way Cool!
 
Hybrid Cloud Orchestration: How SuperChoice Does It
Hybrid Cloud Orchestration: How SuperChoice Does ItHybrid Cloud Orchestration: How SuperChoice Does It
Hybrid Cloud Orchestration: How SuperChoice Does It
 
Leveraging Hybid IT for More Robust Business Services
Leveraging Hybid IT for More Robust Business ServicesLeveraging Hybid IT for More Robust Business Services
Leveraging Hybid IT for More Robust Business Services
 
Case Study: Driving Quality Control Processes for a Manufacturing Client usin...
Case Study: Driving Quality Control Processes for a Manufacturing Client usin...Case Study: Driving Quality Control Processes for a Manufacturing Client usin...
Case Study: Driving Quality Control Processes for a Manufacturing Client usin...
 

More from VannaSchrader3

topic Errors (medication or patient injury)in particular stra.docx
topic Errors (medication or patient injury)in particular stra.docxtopic Errors (medication or patient injury)in particular stra.docx
topic Errors (medication or patient injury)in particular stra.docx
VannaSchrader3
 

More from VannaSchrader3 (20)

Topic that identifies characteristics of Native American Culture and.docx
Topic that identifies characteristics of Native American Culture and.docxTopic that identifies characteristics of Native American Culture and.docx
Topic that identifies characteristics of Native American Culture and.docx
 
Topic Stem Cell ResearchAPA Format I need these topics. don.docx
Topic Stem Cell ResearchAPA Format I need these topics. don.docxTopic Stem Cell ResearchAPA Format I need these topics. don.docx
Topic Stem Cell ResearchAPA Format I need these topics. don.docx
 
Topic Styles of PolicingYou are a patrol officer in a middle- to .docx
Topic Styles of PolicingYou are a patrol officer in a middle- to .docxTopic Styles of PolicingYou are a patrol officer in a middle- to .docx
Topic Styles of PolicingYou are a patrol officer in a middle- to .docx
 
Topic the legalization of same sex adoptionThese same sex adopti.docx
Topic the legalization of same sex adoptionThese same sex adopti.docxTopic the legalization of same sex adoptionThese same sex adopti.docx
Topic the legalization of same sex adoptionThese same sex adopti.docx
 
TOPIC The Truth About Caffeine3 pages,give some statistics of neg.docx
TOPIC The Truth About Caffeine3 pages,give some statistics of neg.docxTOPIC The Truth About Caffeine3 pages,give some statistics of neg.docx
TOPIC The Truth About Caffeine3 pages,give some statistics of neg.docx
 
Topic Media Example (article)1) as usual, do an analysis of the.docx
Topic Media Example (article)1) as usual, do an analysis of the.docxTopic Media Example (article)1) as usual, do an analysis of the.docx
Topic Media Example (article)1) as usual, do an analysis of the.docx
 
Topic Servant LeadershipThread In our reading we explored th.docx
Topic Servant LeadershipThread In our reading we explored th.docxTopic Servant LeadershipThread In our reading we explored th.docx
Topic Servant LeadershipThread In our reading we explored th.docx
 
Topic Organization of Law Enforcement AgenciesDo you agree or d.docx
Topic Organization of Law Enforcement AgenciesDo you agree or d.docxTopic Organization of Law Enforcement AgenciesDo you agree or d.docx
Topic Organization of Law Enforcement AgenciesDo you agree or d.docx
 
Topic Parents Should have a license to have childrenaprox. 500 wo.docx
Topic Parents Should have a license to have childrenaprox. 500 wo.docxTopic Parents Should have a license to have childrenaprox. 500 wo.docx
Topic Parents Should have a license to have childrenaprox. 500 wo.docx
 
Topic PATIENT DATA PRIVACYPerformance Improvement plan Proper an.docx
Topic PATIENT DATA PRIVACYPerformance Improvement plan Proper an.docxTopic PATIENT DATA PRIVACYPerformance Improvement plan Proper an.docx
Topic PATIENT DATA PRIVACYPerformance Improvement plan Proper an.docx
 
Topic Kelly’s Personal ConstructsQuestionPrompt  Analyze th.docx
Topic Kelly’s Personal ConstructsQuestionPrompt  Analyze th.docxTopic Kelly’s Personal ConstructsQuestionPrompt  Analyze th.docx
Topic Kelly’s Personal ConstructsQuestionPrompt  Analyze th.docx
 
Topic Fingerprints.Study fingerprinting in the textbook and res.docx
Topic Fingerprints.Study fingerprinting in the textbook and res.docxTopic Fingerprints.Study fingerprinting in the textbook and res.docx
Topic Fingerprints.Study fingerprinting in the textbook and res.docx
 
Topic is Domestic Violence, Both men and women being the abus.docx
Topic is Domestic Violence, Both men and women being the abus.docxTopic is Domestic Violence, Both men and women being the abus.docx
Topic is Domestic Violence, Both men and women being the abus.docx
 
Topic is regional integration .First You need to find article and re.docx
Topic is regional integration .First You need to find article and re.docxTopic is regional integration .First You need to find article and re.docx
Topic is regional integration .First You need to find article and re.docx
 
Topic Human Trafficking in relation to US Border and Coastal securi.docx
Topic Human Trafficking in relation to US Border and Coastal securi.docxTopic Human Trafficking in relation to US Border and Coastal securi.docx
Topic Human Trafficking in relation to US Border and Coastal securi.docx
 
Topic is AutonomyShort papers should use double spacing, 12-point .docx
Topic is AutonomyShort papers should use double spacing, 12-point .docxTopic is AutonomyShort papers should use double spacing, 12-point .docx
Topic is AutonomyShort papers should use double spacing, 12-point .docx
 
Topic Genetic connection of hypertension to cardiovascular disease .docx
Topic Genetic connection of hypertension to cardiovascular disease .docxTopic Genetic connection of hypertension to cardiovascular disease .docx
Topic Genetic connection of hypertension to cardiovascular disease .docx
 
topic Errors (medication or patient injury)in particular stra.docx
topic Errors (medication or patient injury)in particular stra.docxtopic Errors (medication or patient injury)in particular stra.docx
topic Errors (medication or patient injury)in particular stra.docx
 
Topic differences between folk guitar and classic guitar.Minimu.docx
Topic differences between folk guitar and classic guitar.Minimu.docxTopic differences between folk guitar and classic guitar.Minimu.docx
Topic differences between folk guitar and classic guitar.Minimu.docx
 
Topic Death Investigations. Review homicide investigation as de.docx
Topic Death Investigations. Review homicide investigation as de.docxTopic Death Investigations. Review homicide investigation as de.docx
Topic Death Investigations. Review homicide investigation as de.docx
 

Recently uploaded

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Recently uploaded (20)

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 

BSA425 v1.3Project Plan DraftBSA425 v1.3Page 11 of 11P

  • 1. BSA/425 v1.3 Project Plan Draft BSA/425 v1.3 Page 11 of 11 Project Plan Draft Fill out each of the sections below with information relevant to your project. Be sure to include the company name associated with your project. Lowkey IncNetwork Technology Recommendations Network Technology Selection Criteria Selection Criteria Name Selection Criteria Description Selection Criteria Value (Weighting in Points) Wide Area Network This ty0pe of network connects computers within a long distance 10 Accessibility The system should be easily accessible to users 20 security The technology’s integrity should not be interfered with by hackers and malicious parties 30 Compatibility It should be compatible with all the information resources that the firm uses. 20 Network Technology Recommendation Recommended Network Technologies Description Benefits
  • 2. Aggregate Selection Criteria Score Emails Promotes communication cross different parties Facilitates communication with customers 40 Firewalls This resource safeguards the firm’s network from unauthorized access and disruptions Prevents fraudulent activities 20 Artificial Intelligence Enhances the efficiency of the network Integrates the services and key procedures, thus improving changes adopted 20 Internetworking tools Promotes integrated communication to attain networking goals Increases the efficiency of communication 20 Network Technology Vendor Selection Criteria Selection Criteria Name Selection Criteria Description Selection Criteria Value (Weighting in Points) Price The cost of purchasing the network infrastructures 20 Quality The efficiency and effectiveness of the technologies in attaining their goals 40 Proximity Physical distance from the firm 20 After Sales Service The services provided by the firm following the purchase of the
  • 3. systems 20 Network Technology Recommended Vendors Vendor Name Vendor Strengths Vendor Weaknesses Products/Services Provided to Project Aggregate Selection Criteria Score Cisco Cost-efficient and responsive customer care Highly responsive Encryption can safeguard the network against interceptions 50 Alloys Fast network connectivity Network fluctuates They can offer heavy network 30 Oracle Low cost Highly expensive Provides a repair and maintenance software 20 Network Technology Deployment Challenges Deployment Challenge Deployment Challenge Description Deployment of physical over logical controls Physical network appliances are linked using protocols while in logical networks, there is utilization of different traffics that are agnostic to physical Scalable deployments The networks should be both automatic and scalable High costs High deployment costs is a challenge
  • 4. Inaccessibility Insufficient accessibility approach is a major problem Technology Adoption Methods Method Name Method Description Parallel Approach The adoption occurs when the new system is introduced while the old one is still in use Phased Gradually replacing small parts of the old system with the new one until it is fully implemented Piloting Using a small group of users to test the new system before it is widely adopted Direct Adoption Implementing a new system radically Cost/Benefit Considerations Benefits Costs Considerations Increased efficiency Personnel Hiring the most qualified pool of IT professionals Flexibility Organizational expenses Training employees to adapt to the new technology Cost cutting Cost of tools Seek the vendors who provide cost-effective and quality hardware and software technologies Access and availability Maintenance costs Repair and maintenance must be done regularlyDatabase System Recommendation
  • 5. Database System Selection Criteria Selection Criteria Name Selection Criteria Description Selection Criteria Value (Weighting in Points) Operational consideration Ability to manage failure recovery and maintain availability 30 Security The database’s integrity should not be tampered with 20 Development consideration The openness of the support options 20 Commercial consideration Its potential commercial importance and benefits 20 Database System Recommendation Recommended Database System Description Benefits Aggregate Selection Criteria Score Relational database management system Comprises multiple tables of data with rows and columns that relate to each other These databases are more flexible 40 Hierarchical database systems This model resembles a tree structure, with pre-defined relationships Requires users to pass hierarchies to access the required data, hence secure 10 Network database systems Supports many to many relationships Can promote integration of systems
  • 6. 40 Object-oriented database systems Information is represented as objects Supports different forms of programming 10 Database System Vendor Selection Criteria Selection Criteria Name Selection Criteria Description Selection Criteria Value (Weighting in Points) Usability User friendliness and ease of use 30 Visualization and reporting Ease of visually analyzing and displaying data and results 20 Security Ability to be stored securely 10 Functionality Ability to meet business requirements 40 Database System Recommended Vendors Vendor Name Vendor Strengths Vendor Weaknesses Products/Services Provided to Project Aggregate Selection Criteria Score Oracle Has syntax enhancements and performance improvements expensive Multitenancy, database in-memory, and database Sharding 30 Microsoft Ease of use and high availability
  • 7. Challenges in seamlessly integrating high volumes of corporate data SQL Server 30 IBM Can accommodate big data Expensive IDM DB2 20 Knack Provides many tools for online databases It is highly customized Knack 20 Database System Deployment Challenges Deployment Challenge Deployment Challenge Description Data security The organization may lack resources for securing its database Performance The database may have harsh performance criteria Resource utilization The database may not have the best hardware available to run on High availability In case the single server goes down, the firm’s operations are paralyzed Technology Adoption Methods Method Name Method Description Method Name Method Description Parallel Approach The adoption occurs when the new system is introduced while
  • 8. the old one is still in use Phased Gradually replacing small parts of the old system with the new one until it is fully implemented Piloting Using a small group of users to test the new system before it is widely adopted Direct Adoption Implementing a new system radically Cost/Benefit Considerations Benefits Costs Considerations Increased efficiency Personnel Hiring the most qualified pool of IT professionals Flexibility Organizational expenses Training employees to adapt to the new technology Cost cutting Cost of tools Seek the vendors who provide cost-effective and quality hardware and software technologies Access and availability Maintenance costs Repair and maintenance must be done regularlySoftware Application Recommendations Software Application Selection Criteria Selection Criteria Name Selection Criteria Description Selection Criteria Value (Weighting in Points) Suitability Ability to provide appropriate set of functions 40
  • 9. Accuracy Ability to provide the right or agreed results 20 Interoperability Ability to interact with one or more specified systems 20 Security Ability to provide mechanisms to prevent the accidental or deliberate interference with integrity 20 Software Application Recommendation Recommended Software Application Description Benefits Aggregate Selection Criteria Score ERP Integrated software for managing and coordinating all the business activities It provides real-time standardization and streamlining of business processes. 30 Office production software Producing and compiling information, such as documents and reports Reduces and heaps of paperwork 30 CRM Facilitates interactions with customers Can be used to analyze customer trends and preferences 20 MIS Facilitates gathering, analyzing, and disseminated data for organizational operations Informs company decision-making 20
  • 10. Software Application Vendor Selection Criteria Selection Criteria Name Selection Criteria Description Selection Criteria Value (Weighting in Points) Rates The vendors should not be too expensive 20 Main areas of expertise Relevance of the software to the business functions 20 Certification Must have local and international certification 20 Security Should have an information security plan 20 Software Application Recommended Vendors Vendor Name Vendor Strengths Vendor Weaknesses Products/Services Provided to Project Aggregate Selection Criteria Score Microsoft Can customize to the business’s needs costly Microsoft Office 20 IBM They install and configure them for firms Scalability and integration challenges Sterling Order Management 20 Oracle Portability
  • 11. Expensive Oracle CRM 30 SAP Multiple database support Very complex to use SAP ERP 20 Software Application Deployment Challenges Deployment Challenge Deployment Challenge Description Misaligned expectations Project teams and stakeholders may differ on the needs and requirements of the software Data integrity Lack of an effective strategy for securing data Insufficient training tools Employees maybe insufficiently prepared tom operate the software Testing problems Lack of a testing and maintenance tool Technology Adoption Methods Method Name Method Description Parallel Approach The adoption occurs when the new system is introduced while the old one is still in use Phased Gradually replacing small parts of the old system with the new one until it is fully implemented Piloting Using a small group of users to test the new system before it is widely adopted Direct Adoption
  • 12. Implementing a new system radically Cost/Benefit Considerations Benefits Costs Considerations Increased efficiency Personnel Hiring the most qualified pool of IT professionals Flexibility Organizational expenses Training employees to adapt to the new technology Cost cutting Cost of tools Seek the vendors who provide cost-effective and quality hardware and software technologies Access and availability Maintenance costs Repair and maintenance must be done regularlyCloud Services Recommendations Cloud Services Selection Criteria Selection Criteria Name Selection Criteria Description Selection Criteria Value (Weighting in Points) Compliance with standards Compliance with government and professional regulations 30 Service roadmap Current goals and objectives of the vendors 40 Terms of service If they do not have tough terms and conditions 10 Data security Ability to secure the data 20
  • 13. Cloud Services Recommendation Recommended Cloud Services Description Benefits Aggregate Selection Criteria Score Amazon Provides additional services, such as storage and security Support users to integrate with business 20 Google Cloud Can provide free packages Supports all organizational functions 20 IBM Fast response to customer enquiries Can provide platform as a service 40 Adobe Ideal for supporting publishing and editing it is a creative cloud system 20 Cloud Services Recommended Vendors Vendor Name Vendor Strengths Vendor Weaknesses Products/Services Provided to Project Aggregate Selection Criteria Score Amazon
  • 14. Provides additional services, such as storage and security Cannot be customized Amazon Cloud 30 Google Cloud Can provide free packages Slow responsiveness to customer inquiries Google Cloud 20 IBM Fast response to customer enquiries Expensive IBM Cloud 30 Adobe Ideal for supporting publishing and editing Only ideal for media and publishing Adobe 20 Cloud Services Deployment Challenges Deployment Challenge Deployment Challenge Description Data security Increased incidences of hacking of cloud resources Performance issues Disruptions from vendors due to maintenance Availability problems Lack of availability of services when technical issues emerge Data safety Data may be affected when the computer systems are infected by viruses Technology Adoption Methods Method Name Method Description
  • 15. Parallel Approach The adoption occurs when the new system is introduced while the old one is still in use Phased Gradually replacing small parts of the old system with the new one until it is fully implemented Piloting Using a small group of users to test the new system before it is widely adopted Direct Adoption Implementing a new system radically Cost/Benefit Considerations Benefits Costs Considerations Increase in efficiency $4000 Installing efficient and state-of-the art hardware and software resources to speed up business transactions Reduction in costs $3000 Eliminating heaps of paperwork Hiring more staff $10000 Individuals who will operate or control the cloud resources Purchasing more computer resources $5000 Devices should be purchased to support the running of the cloud computing system Copyright 2020 by University of Phoenix. All rights reserved. Copyright 2020 by University of Phoenix. All rights reserved.