BSA/425 v1.3
Project Plan Draft
BSA/425 v1.3
Page 12 of 12
Project Plan Draft
Fill out each of the sections below with information relevant to your project. Be sure to include the company name associated with your project.
Company Name: Techlynk LimitedNetwork Technology Recommendations
Network Technology Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Ease of use
Technology should be easy to use for all users without any training involved.
6
Cost
It should be affordable to procure and maintain the technology.
8
Reliability
The network should always work regardless of any failure. All nodes should support each other.
7
Feasibility
The broadband should be affordable based on capital and operational costs
8
Accessibility
Ensure the network provides different paths so that all nodes get connected
7
Cyber security
This ensures detection and protection from data breaches, virus, or malware attacks
8
Network Technology Recommendation
Recommended Network Technologies
Description
Benefits
Aggregate Selection Criteria Score
Local area network (LAN
Local area networks connect groups of computers and low-voltage devices over short distances (within a building or between a group of two or three buildings very close to each other) to share information and resources. Businesses generally manage and maintain local networks. Through the use of routers, LANs can connect to wide area networks (WANs, explained below) to transfer data quickly and securely.
Most local area networks have a router that connects to the internet. So being on such a local area network, you can communicate with other devices on your network and are protected from internet-based sniffing and monitoring software (i.e. things on the internet can’t see your internal traffic between devices). And yet, you still have the ability to go out to the internet by simply entering an internet IP address in your browser’s URL field.
7
Wireless local area network (WLAN)
WLANs use wireless network technology, such as Wi-Fi. Generally seen in the same types of applications as local area networks, these types of networks do not require devices to rely on physical cables to connect to the network.
You can access network resources from any location within the wireless network's coverage area. Wireless access to the Internet and to company resources help your staff be more productive and collaborative.
You don't have to string cables, as you do with wired networks. Installation can be quick and cost-effective. You can easily expand WLANs where and as needed, because no wires are involved.
8
Network Technology Vendor Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Quality of Product or Service
They must provide high quality services to meet organization goals. Services provided must meet the required market standards.
6
Price
Services must be affordable to the ...
Hierarchy of management that covers different levels of management
BSA425 v1.3Project Plan DraftBSA425 v1.3Page 12 of 12
1. BSA/425 v1.3
Project Plan Draft
BSA/425 v1.3
Page 12 of 12
Project Plan Draft
Fill out each of the sections below with information relevant to
your project. Be sure to include the company name associated
with your project.
Company Name: Techlynk LimitedNetwork Technology
Recommendations
Network Technology Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Ease of use
Technology should be easy to use for all users without any
training involved.
6
Cost
It should be affordable to procure and maintain the technology.
8
Reliability
The network should always work regardless of any failure. All
nodes should support each other.
7
Feasibility
The broadband should be affordable based on capital and
operational costs
8
Accessibility
Ensure the network provides different paths so that all nodes get
connected
2. 7
Cyber security
This ensures detection and protection from data breaches, virus,
or malware attacks
8
Network Technology Recommendation
Recommended Network Technologies
Description
Benefits
Aggregate Selection Criteria Score
Local area network (LAN
Local area networks connect groups of computers and low -
voltage devices over short distances (within a building or
between a group of two or three buildings very close to each
other) to share information and resources. Businesses generally
manage and maintain local networks. Through the use of
routers, LANs can connect to wide area networks (WANs,
explained below) to transfer data quickly and securely.
Most local area networks have a router that connects to the
internet. So being on such a local area network, you can
communicate with other devices on your network and are
protected from internet-based sniffing and monitoring software
(i.e. things on the internet can’t see your internal traffic
between devices). And yet, you still have the ability to go out to
the internet by simply entering an internet IP address in your
browser’s URL field.
7
Wireless local area network (WLAN)
WLANs use wireless network technology, such as Wi-Fi.
Generally seen in the same types of applications as local area
networks, these types of networks do not require devices to rely
on physical cables to connect to the network.
You can access network resources from any location within the
wireless network's coverage area. Wireless access to the
Internet and to company resources help your staff be more
3. productive and collaborative.
You don't have to string cables, as you do with wired networks.
Installation can be quick and cost-effective. You can easily
expand WLANs where and as needed, because no wires are
involved.
8
Network Technology Vendor Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Quality of Product or Service
They must provide high quality services to meet organization
goals. Services provided must meet the required market
standards.
6
Price
Services must be affordable to the organization i.e. must be
within the organization budget.
6
Network Technology Recommended Vendors
Vendor Name
Vendor Strengths
Vendor Weaknesses
Products/Services Provided to Project
Aggregate Selection Criteria Score
Cisco
Cisco maintains a strong lead in nearly every networking
hardware category
Their gadgets are expensive
Video conferencing, network gadgets, switch, routers
6
Arista
Arista also recognizes the importance of diversification. They
now offer network monitoring, automation, and analytics for
4. hybrid cloud environments.
Arista appears weaker in areas of SD-WAN and security, which
could affect their future agility.
They now offer network monitoring, automation, and analytics
for hybrid cloud environments.
4
Network Technology Deployment Challenges
Deployment Challenge
Deployment Challenge Description
Infrastructure
Some of network technology is not compatible with some
gadgets
Cost
It is very expensive to buy some of network technology
Usability
The issue can cause network problems when users do not get
expected outcomes
Poor network performance
It limits productivity and does not offer full robust network
output
Installation and configuration management
Settings can get performed in methods that are not required and
cause improper actions
Connectivity
Issues can develop when there is no connection to the internet
to produce network services
Scalability
The network can have issues when attempting to grow it or
increase productivity
Accessibility
Inability to connect to servers and internet access produces
network issues
Security
Issues like phishing, viruses, malware, or rogue usage causes
problems
5. Resiliency
Problems due to limited ability to recover of network problems
Integration
Problems when attempting to connect networks to new systems
Technology Adoption Methods
Method Name
Method Description
Strategic planning method
Involve developing a technique to implement the technology, it
also comprise measuring its progress and take needed corrective
actions. This happens through the entire process of adoption.
Collaborative approach
This comprise involving intended users to help in identifying
needs, goals, capacity and alignment. An investment of time and
energy in the planning discussion encourages investment in the
overall process which can ultimately promote the success of
adoption.
Cost/Benefit Considerations
Benefits
Costs
Considerations
Indirect
Indirect
Adopt
Intangible
Intangible
AdoptDatabase System Recommendation
Database System Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Performance
For the kinds of operations, the volume of data, numbers of
concurrent user sessions, and transaction rate (if applicable)
6. that my application will need to perform, can this DBMS meet
organization required SLAs?
5
Philosophy
Does the design of the DBMS, its record types, how it handles
scaling (up or out), how it handles multiple user access to the
same data, schema versus schema-less, etc. match how my
applications will need to use it?
5
Database System Recommendation
Recommended Database System
Description
Benefits
Aggregate Selection Criteria Score
Oracle
It’s powerful but complex. New users will want to invest in
solid training to ensure they’re getting the most from the
software.
Very secure
8
MySQL
MySQL powers commercial websites by the hundreds of
thousands, and it also serves as the backend for a huge number
of internal enterprise applications.
Open-source hence can be improved in terms of design and
security by different developers
6
Database System Vendor Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Reliability
Vendor must be reliable in terms of service delivery. They must
be available to fix any form of downtime as well as provide risk
7. mitigation guidelines
8
Certification
A vendor must be must be a member of a certified by a
professional body to offer cloud services
8
Hosted solutions
Picking a suitable vendor who offers cloud-based solutions
saves of productivity
8
Cost
Database costs depending on solutions offered is critical
8
Scalability
The database provider should offer a reliable method of adding
or removing database resources as required
8
Security
The vendor should constantly perform security checks to
determine database reliability
8
Accuracy
All data values must get stored correctly to increase reliable
management
8
Flexibility
There should be constant working of the database without
external productivity issues
8
Database System Recommended Vendors
Vendor Name
Vendor Strengths
Vendor Weaknesses
Products/Services Provided to Project
Aggregate Selection Criteria Score
8. Oracle
One can temporarily block all damages from an ally
Poor navigation makes it harder to move around in the database.
Database
6
MySQL
Easy to use
Open-source hence can be easily manipulated
Database
5
Database System Deployment Challenges
Deployment Challenge
Deployment Challenge Description
Integration
Some database system only work with specific gadgets hence
hard to install
Cost
It is costly in terms of installation as well as maintenance to
deploy database systems
Security/vulnerabilities
Installation of antivirus and penetration testing are crucial to
promote productivity
Resource utilization
Problems occur due to increase in data volumes and unreliable
storage spaces
Data migration
Finding an accurate method of connecting different data sources
can create issues
High availability
The database can have issues and prevent user access
Technology Adoption Methods
Method Name
Method Description
Strategic planning method
9. Involve developing a technique to implement the technology, it
also comprise measuring its progress and take needed corrective
actions. This happens through the entire process of adoption.
Collaborative approach
This comprise involving intended users to help in identifying
needs, goals, capacity and alignment. An investment of time and
energy in the planning discussion encourages investment in the
overall process which can ultimately promote the success of
adoption.
Cost/Benefit Considerations
Benefits
Costs
Considerations
Indirect
Opportunity
Adopt
Intangible
Intangible
AdoptSoftware Application Recommendations
Software Application Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Compatibility
If the software needs to operate with a certain device (card
reader, high capacity storage device, printer video camera) will
you have to buy new devices? Are you dependent on the devices
you have on the system that may be obsolete and unsupported
by the new software when the software supplier upgrades the
program?
8
Cost
Is it a buy-once and forget about it? Or is it a subscription
service? Are there additional costs to make it work on your
system?
10. 8
Usability
The software should not require too many settings to ensure
users understand its operation
8
Integration with other systems
It is imperative to migrate software through different systems
like moving from legacy systems to current technology
8
Security
Use of antivirus software, firewalls, and regular backup are
mandatory
8
Accessibility
Users and other devices need to find it easy to operate the
software
8
Scalability
The software should operate effectively regardless of many
users or activities
8
Software Application Recommendation
Recommended Software Application
Description
Benefits
Aggregate Selection Criteria Score
Microsoft
Develop operating systems and different types of applications
Widely used hence affordable
8
IBM
Develop server systems as well as hardware.
Secure to use
6
11. Software Application Vendor Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Reliability
Vendor must be reliable in terms of service delivery. They must
be available to fix any form of downtime as well as provide risk
mitigation guidelines
8
Certification
A vendor must be must be a member of a certified by a
professional body to offer cloud services
6
Software Application Recommended Vendors
Vendor Name
Vendor Strengths
Vendor Weaknesses
Products/Services Provided to Project
Aggregate Selection Criteria Score
Microsoft
Widely used hence compatible with many applications
Easily attacked by hackers
Operating systems and applications
8
IBM
Secure in terms of security
Expensive
Operating systems and applications
6
Software Application Deployment Challenges
Deployment Challenge
Deployment Challenge Description
Compatibility
Sometime a software can fail to integrate with some systems
12. within the organization forcing the organization to buy new
equipment.
Cost
Some software are very expensive to buy as well as maintain
Data migration
Issues like confusion and data loss can occur in the system
Time
Amount of time taken to ensure software applications operate
gets affected
Technology Adoption Methods
Method Name
Method Description
Strategic planning method
Involve developing a technique to implement the technology, it
also comprise measuring its progress and take needed corrective
actions. This happens through the entire process of adoption.
Collaborative approach
This comprise involving intended users to help in identifying
needs, goals, capacity and alignment. An investment of time and
energy in the planning discussion encourages investment in the
overall process which can ultimately promote the success of
adoption.
Cost/Benefit Considerations
Benefits
Costs
Considerations
Indirect
indirect
Adopt
Intangible
Intangible
AdoptCloud Services Recommendations
Cloud Services Selection Criteria
Selection Criteria Name
13. Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Cost
Services should be affordable in terms installation as well as
cost as well as maintenance.
6
Bandwidth
Should have strong bandwidth to run any service that
organization intend to run.
8
Cloud Services Recommendation
Recommended Cloud Services
Description
Benefits
Aggregate Selection Criteria Score
Amazon Web Services
Help businesses manage challenges and meet their
organizational goals. It offers tools that support all industries.
Easy to use and adopt
6
Microsoft Azure
Widely used and offer wide range of services.
Easy few resources to roll out
4
Cloud Services Vendor Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Reliability
Vendor must be reliable in terms of service delivery. They must
be available to fix any form of downtime as well as provide risk
mitigation guidelines
5
Certification
14. A vendor must be must be a member of a certified by a
professional body to offer cloud services
6
Cloud Services Recommended Vendors
Vendor Name
Vendor Strengths
Vendor Weaknesses
Products/Services Provided to Project
Aggregate Selection Criteria Score
Amazon Web Services
Easy to use and adopt
High technical support fee
IaaS
PaaS
SaaS
6
Microsoft Azure
Easy to use
Expensive
IaaS
PaaS
SaaS
4
Cloud Services Deployment Challenges
Deployment Challenge
Deployment Challenge Description
Multi-cloud
Once application is designed for distributed deployment in
multiple regions, it works in multi-cloud environment unless
cloud specific services are used. However, application delivery
comes as challenge.
Distributed Infrastructure
From monitoring point of view, some running machines may
15. easily be hidden in a different region and keep contributing to
the bill. From application point of view, cloud services needs a
different design. When companies try to port traditional
application to cloud, the efficiency doesn’t increase.
Technology Adoption Methods
Method Name
Method Description
Strategic planning method
Involve developing a technique to implement the technology, it
also comprise measuring its progress and take needed corrective
actions. This happens through the entire process of adoption.
Collaborative approach
This comprise involving intended users to help in identifying
needs, goals, capacity and alignment. An investment of time and
energy in the planning discussion encourages investment in the
overall process which can ultimately promote the success of
adoption.
Cost/Benefit Considerations
Benefits
Costs
Considerations
Intangible
Indirect
Adopt
Direct
Intangible
Adopt
References
Vera
16. Solution
s. (2019). 10 Criteria To Evaluate When Choosing A New
Technology. Retrieved 13 December 2021 from
https://www.verasolutions.org/10-criteria-to-evaluate-when-
choosing-a-new-technology/?locale=en.
Copyright 2020 by University of Phoenix. All rights reserved.
Copyright 2020 by University of Phoenix. All rights reserved.
BSA/425
v
1.3
Copyright
20
20
by University of Phoenix. All rights reserved.
17. Project Plan Draft
Fill out each of the sections below with information relevant to
your project. Be sure to include the
company name associated with your project.
Company Name
:
Techlynk Limited
Network Technology Recommendations
Network Technology Selection Criteria
Selection
Criteria
Name
Selection Criteria Description
Selection Criteria Value (Weighting
i
n
Points)
18. Ease of use
Technology should be easy to use for all
users
without any training involved.
6
Cost
It should be affordable to procure and
maintain the technology.
8
Reliability
The network should always work
regardless of any failure. All nodes should
support each other.
7
Feasibility
19. The broadband should be
affordable
based on capital and operational costs
8
Accessibility
Ensure the network provides different
paths so that all nodes get connected
7
Cyber
security
This ensures detection and protection
from data breaches, virus, or malware
attacks
8
Network
21. Network Technology Selection Criteria
Selection
Criteria
Name
Selection Criteria Description Selection Criteria Value
(Weighting in
Points)
Ease of use Technology should be easy to use for all
users without any training involved.
6
Cost It should be affordable to procure and
maintain the technology.
8
Reliability The network should always work
regardless of any failure. All nodes should
support each other.
7
Feasibility The broadband should be affordable
based on capital and operational costs
8
Accessibility Ensure the network provides different
paths so that all nodes get connected
7
Cyber
security
22. This ensures detection and protection
from data breaches, virus, or malware
attacks
8
Network Technology Recommendation
Recommended
Network
Technologies
Description Benefits Aggregate
Selection
Criteria Score
Select 5 of the following questions (20% each).
Answer in complete sentences. Use concise, accurate writing
to explain your answers. Use a separate sheet(s) of paper for
your answers. Make sure to number your answers.
Briefly describe the primary components of monetary policy and
what tools are available to manipulate portions of the
macroeconomy.
Briefly describe the primary components of fiscal policy.
Provide three examples of fiscal policy and its influence on the
23. macroeconomy.
Explain the concept of “crowding out” and how that can
negatively affect the U.S. economy in the future. Make sure to
include the role of government expenditures and investments in
your explanation.
How does the large size of the U.S. governmental deficit and
overall debt present a macroeconomic challenge in the
upcoming years? Provide three examples of tough choices in
the near future.
How does velocity have a role in the overall performance of an
economy? Make sure to include the role of the money
multiplier effect in your explanation.
What are the advantages and disadvantages of a strong dollar
and a weak dollar? Make sure to cite the proportion of the US
import-export variables in relation to its overall GDP in your
explanation.
24. How are “stickiness” and Keynesianism related? Cite several
examples that explain the connection. Also, make sure to
explain how conditions may either be similar or different from
the days of Keynes to our present-day challenges.
BSA/425 v1.3
Project Plan Draft
BSA/425 v1.3
Page 12 of 12
Project Plan Draft
Fill out each of the sections below with information relevant to
your project. Be sure to include the company name associated
with your project.
Company Name: Techlynk LimitedNetwork Technology
Recommendations
Network Technology Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Ease of use
Technology should be easy to use for all users without any
training involved.
25. 6
Cost
It should be affordable to procure and maintain the technology.
8
Reliability
The network should always work regardless of any failure. All
nodes should support each other.
7
Feasibility
The broadband should be affordable based on capital and
operational costs
8
Accessibility
Ensure the network provides different paths so that all nodes get
connected
7
Cyber security
This ensures detection and protection from data breaches, virus,
or malware attacks
8
Network Technology Recommendation
Recommended Network Technologies
Description
Benefits
26. Aggregate Selection Criteria Score
Local area network (LAN
Local area networks connect groups of computers and low -
voltage devices over short distances (within a building or
between a group of two or three buildings very close to each
other) to share information and resources. Businesses generally
manage and maintain local networks. Through the use of
routers, LANs can connect to wide area networks (WANs,
explained below) to transfer data quickly and securely.
Most local area networks have a router that connects to the
internet. So being on such a local area network, you can
communicate with other devices on your network and are
protected from internet-based sniffing and monitoring software
(i.e. things on the internet can’t see your internal traffic
between devices). And yet, you still have the ability to go out to
the internet by simply entering an internet IP address in your
browser’s URL field.
7
Wireless local area network (WLAN)
WLANs use wireless network technology, such as Wi-Fi.
Generally seen in the same types of applications as local area
networks, these types of networks do not require devices to rely
on physical cables to connect to the network.
You can access network resources from any location within the
wireless network's coverage area. Wireless access to the
27. Internet and to company resources help your staff be more
productive and collaborative.
You don't have to string cables, as you do with wired networks.
Installation can be quick and cost-effective. You can easily
expand WLANs where and as needed, because no wires are
involved.
8
Network Technology Vendor Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Quality of Product or Service
They must provide high quality services to meet organization
goals. Services provided must meet the required market
standards.
6
Price
Services must be affordable to the organization i.e. must be
within the organization budget.
6
Network Technology Recommended Vendors
Vendor Name
Vendor Strengths
28. Vendor Weaknesses
Products/Services Provided to Project
Aggregate Selection Criteria Score
Cisco
Cisco maintains a strong lead in nearly every networking
hardware category
Their gadgets are expensive
Video conferencing, network gadgets, switch, routers
6
Arista
Arista also recognizes the importance of diversification. They
now offer network monitoring, automation, and analytics for
hybrid cloud environments.
Arista appears weaker in areas of SD-WAN and security, which
could affect their future agility.
They now offer network monitoring, automation, and analytics
for hybrid cloud environments.
4
Network Technology Deployment Challenges
Deployment Challenge
Deployment Challenge Description
Infrastructure
Some of network technology is not compatible with some
gadgets
29. Cost
It is very expensive to buy some of network technology
Usability
The issue can cause network problems when users do not get
expected outcomes
Poor network performance
It limits productivity and does not offer full robust network
output
Installation and configuration management
Settings can get performed in methods that are not required and
cause improper actions
Connectivity
Issues can develop when there is no connection to the internet
to produce network services
Scalability
The network can have issues when attempting to grow it or
increase productivity
Accessibility
Inability to connect to servers and internet access produces
network issues
Security
Issues like phishing, viruses, malware, or rogue usage causes
problems
Resiliency
Problems due to limited ability to recover of network problems
30. Integration
Problems when attempting to connect networks to new systems
Technology Adoption Methods
Method Name
Method Description
Strategic planning method
Involve developing a technique to implement the technology, it
also comprise measuring its progress and take needed corrective
actions. This happens through the entire process of adoption.
Collaborative approach
This comprise involving intended users to help in identifying
needs, goals, capacity and alignment. An investment of time and
energy in the planning discussion encourages investment in the
overall process which can ultimately promote the success of
adoption.
Cost/Benefit Considerations
Benefits
Costs
Considerations
Indirect
Indirect
Adopt
Intangible
31. Intangible
AdoptDatabase System Recommendation
Database System Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Performance
For the kinds of operations, the volume of data, numbers of
concurrent user sessions, and transaction rate (if applicable)
that my application will need to perform, can this DBMS meet
organization required SLAs?
5
Philosophy
Does the design of the DBMS, its record types, how it handles
scaling (up or out), how it handles multiple user access to the
same data, schema versus schema-less, etc. match how my
applications will need to use it?
5
Database System Recommendation
Recommended Database System
Description
Benefits
Aggregate Selection Criteria Score
Oracle
32. It’s powerful but complex. New users will want to invest in
solid training to ensure they’re getting the most from the
software.
Very secure
8
MySQL
MySQL powers commercial websites by the hundreds of
thousands, and it also serves as the backend for a huge number
of internal enterprise applications.
Open-source hence can be improved in terms of design and
security by different developers
6
Database System Vendor Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Reliability
Vendor must be reliable in terms of service delivery. They must
be available to fix any form of downtime as well as provide risk
mitigation guidelines
8
Certification
A vendor must be must be a member of a certified by a
professional body to offer cloud services
33. 8
Hosted solutions
Picking a suitable vendor who offers cloud-based solutions
saves of productivity
8
Cost
Database costs depending on solutions offered is critical
8
Scalability
The database provider should offer a reliable method of adding
or removing database resources as required
8
Security
The vendor should constantly perform security checks to
determine database reliability
8
Accuracy
All data values must get stored correctly to increase reliable
management
8
Flexibility
There should be constant working of the database without
external productivity issues
8
34. Database System Recommended Vendors
Vendor Name
Vendor Strengths
Vendor Weaknesses
Products/Services Provided to Project
Aggregate Selection Criteria Score
Oracle
One can temporarily block all damages from an ally
Poor navigation makes it harder to move around in the database.
Database
6
MySQL
Easy to use
Open-source hence can be easily manipulated
Database
5
Database System Deployment Challenges
Deployment Challenge
Deployment Challenge Description
Integration
Some database system only work with specific gadgets hence
hard to install
Cost
It is costly in terms of installation as well as maintenance to
35. deploy database systems
Security/vulnerabilities
Installation of antivirus and penetration testing are crucial to
promote productivity
Resource utilization
Problems occur due to increase in data volumes and unreliable
storage spaces
Data migration
Finding an accurate method of connecting different data sources
can create issues
High availability
The database can have issues and prevent user access
Technology Adoption Methods
Method Name
Method Description
Strategic planning method
Involve developing a technique to implement the technology, it
also comprise measuring its progress and take needed corrective
actions. This happens through the entire process of adoption.
Collaborative approach
This comprise involving intended users to help in identifying
needs, goals, capacity and alignment. An investment of time and
energy in the planning discussion encourages investment in the
overall process which can ultimately promote the success of
36. adoption.
Cost/Benefit Considerations
Benefits
Costs
Considerations
Indirect
Opportunity
Adopt
Intangible
Intangible
AdoptSoftware Application Recommendations
Software Application Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Compatibility
If the software needs to operate with a certain device (card
reader, high capacity storage device, printer video camera) will
you have to buy new devices? Are you dependent on the devices
you have on the system that may be obsolete and unsupported
by the new software when the software supplier upgrades the
program?
8
Cost
37. Is it a buy-once and forget about it? Or is it a subscription
service? Are there additional costs to make it work on your
system?
8
Usability
The software should not require too many settings to ensure
users understand its operation
8
Integration with other systems
It is imperative to migrate software through different systems
like moving from legacy systems to current technology
8
Security
Use of antivirus software, firewalls, and regular backup are
mandatory
8
Accessibility
Users and other devices need to find it easy to operate the
software
8
Scalability
The software should operate effectively regardless of many
users or activities
8
38. Software Application Recommendation
Recommended Software Application
Description
Benefits
Aggregate Selection Criteria Score
Microsoft
Develop operating systems and different types of applications
Widely used hence affordable
8
IBM
Develop server systems as well as hardware.
Secure to use
6
Software Application Vendor Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Reliability
Vendor must be reliable in terms of service delivery. They must
be available to fix any form of downtime as well as provide risk
mitigation guidelines
8
Certification
A vendor must be must be a member of a certified by a
39. professional body to offer cloud services
6
Software Application Recommended Vendors
Vendor Name
Vendor Strengths
Vendor Weaknesses
Products/Services Provided to Project
Aggregate Selection Criteria Score
Microsoft
Widely used hence compatible with many applications
Easily attacked by hackers
Operating systems and applications
8
IBM
Secure in terms of security
Expensive
Operating systems and applications
6
Software Application Deployment Challenges
Deployment Challenge
Deployment Challenge Description
Compatibility
Sometime a software can fail to integrate with some systems
40. within the organization forcing the organization to buy new
equipment.
Cost
Some software are very expensive to buy as well as maintain
Data migration
Issues like confusion and data loss can occur in the system
Time
Amount of time taken to ensure software applications operate
gets affected
Technology Adoption Methods
Method Name
Method Description
Strategic planning method
Involve developing a technique to implement the technology, it
also comprise measuring its progress and take needed corrective
actions. This happens through the entire process of adoption.
Collaborative approach
This comprise involving intended users to help in identifying
needs, goals, capacity and alignment. An investment of time and
energy in the planning discussion encourages investment in the
overall process which can ultimately promote the success of
adoption.
Cost/Benefit Considerations
41. Benefits
Costs
Considerations
Indirect
indirect
Adopt
Intangible
Intangible
AdoptCloud Services Recommendations
Cloud Services Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Cost
Services should be affordable in terms installation as well as
cost as well as maintenance.
6
Bandwidth
Should have strong bandwidth to run any service that
organization intend to run.
8
Cloud Services Recommendation
Recommended Cloud Services
Description
42. Benefits
Aggregate Selection Criteria Score
Amazon Web Services
Help businesses manage challenges and meet their
organizational goals. It offers tools that support all industries.
Easy to use and adopt
6
Microsoft Azure
Widely used and offer wide range of services.
Easy few resources to roll out
4
Cloud Services Vendor Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Reliability
Vendor must be reliable in terms of service delivery. They must
be available to fix any form of downtime as well as provide risk
mitigation guidelines
5
Certification
A vendor must be must be a member of a certified by a
professional body to offer cloud services
6
43. Cloud Services Recommended Vendors
Vendor Name
Vendor Strengths
Vendor Weaknesses
Products/Services Provided to Project
Aggregate Selection Criteria Score
Amazon Web Services
Easy to use and adopt
High technical support fee
IaaS
PaaS
SaaS
6
Microsoft Azure
Easy to use
Expensive
IaaS
PaaS
SaaS
4
Cloud Services Deployment Challenges
Deployment Challenge
44. Deployment Challenge Description
Multi-cloud
Once application is designed for distributed deployment in
multiple regions, it works in multi-cloud environment unless
cloud specific services are used. However, application delivery
comes as challenge.
Distributed Infrastructure
From monitoring point of view, some running machines may
easily be hidden in a different region and keep contributing to
the bill. From application point of view, cloud services needs a
different design. When companies try to port traditional
application to cloud, the efficiency doesn’t increase.
Technology Adoption Methods
Method Name
Method Description
Strategic planning method
Involve developing a technique to implement the technology, it
also comprise measuring its progress and take needed corrective
actions. This happens through the entire process of adoption.
Collaborative approach
This comprise involving intended users to help in identifying
needs, goals, capacity and alignment. An investment of time and
energy in the planning discussion encourages investment in the
overall process which can ultimately promote the success of