SlideShare a Scribd company logo
1 of 45
BSA/425 v1.3
Project Plan Draft
BSA/425 v1.3
Page 12 of 12
Project Plan Draft
Fill out each of the sections below with information relevant to
your project. Be sure to include the company name associated
with your project.
Company Name: Techlynk LimitedNetwork Technology
Recommendations
Network Technology Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Ease of use
Technology should be easy to use for all users without any
training involved.
6
Cost
It should be affordable to procure and maintain the technology.
8
Reliability
The network should always work regardless of any failure. All
nodes should support each other.
7
Feasibility
The broadband should be affordable based on capital and
operational costs
8
Accessibility
Ensure the network provides different paths so that all nodes get
connected
7
Cyber security
This ensures detection and protection from data breaches, virus,
or malware attacks
8
Network Technology Recommendation
Recommended Network Technologies
Description
Benefits
Aggregate Selection Criteria Score
Local area network (LAN
Local area networks connect groups of computers and low -
voltage devices over short distances (within a building or
between a group of two or three buildings very close to each
other) to share information and resources. Businesses generally
manage and maintain local networks. Through the use of
routers, LANs can connect to wide area networks (WANs,
explained below) to transfer data quickly and securely.
Most local area networks have a router that connects to the
internet. So being on such a local area network, you can
communicate with other devices on your network and are
protected from internet-based sniffing and monitoring software
(i.e. things on the internet can’t see your internal traffic
between devices). And yet, you still have the ability to go out to
the internet by simply entering an internet IP address in your
browser’s URL field.
7
Wireless local area network (WLAN)
WLANs use wireless network technology, such as Wi-Fi.
Generally seen in the same types of applications as local area
networks, these types of networks do not require devices to rely
on physical cables to connect to the network.
You can access network resources from any location within the
wireless network's coverage area. Wireless access to the
Internet and to company resources help your staff be more
productive and collaborative.
You don't have to string cables, as you do with wired networks.
Installation can be quick and cost-effective. You can easily
expand WLANs where and as needed, because no wires are
involved.
8
Network Technology Vendor Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Quality of Product or Service
They must provide high quality services to meet organization
goals. Services provided must meet the required market
standards.
6
Price
Services must be affordable to the organization i.e. must be
within the organization budget.
6
Network Technology Recommended Vendors
Vendor Name
Vendor Strengths
Vendor Weaknesses
Products/Services Provided to Project
Aggregate Selection Criteria Score
Cisco
Cisco maintains a strong lead in nearly every networking
hardware category
Their gadgets are expensive
Video conferencing, network gadgets, switch, routers
6
Arista
Arista also recognizes the importance of diversification. They
now offer network monitoring, automation, and analytics for
hybrid cloud environments.
Arista appears weaker in areas of SD-WAN and security, which
could affect their future agility.
They now offer network monitoring, automation, and analytics
for hybrid cloud environments.
4
Network Technology Deployment Challenges
Deployment Challenge
Deployment Challenge Description
Infrastructure
Some of network technology is not compatible with some
gadgets
Cost
It is very expensive to buy some of network technology
Usability
The issue can cause network problems when users do not get
expected outcomes
Poor network performance
It limits productivity and does not offer full robust network
output
Installation and configuration management
Settings can get performed in methods that are not required and
cause improper actions
Connectivity
Issues can develop when there is no connection to the internet
to produce network services
Scalability
The network can have issues when attempting to grow it or
increase productivity
Accessibility
Inability to connect to servers and internet access produces
network issues
Security
Issues like phishing, viruses, malware, or rogue usage causes
problems
Resiliency
Problems due to limited ability to recover of network problems
Integration
Problems when attempting to connect networks to new systems
Technology Adoption Methods
Method Name
Method Description
Strategic planning method
Involve developing a technique to implement the technology, it
also comprise measuring its progress and take needed corrective
actions. This happens through the entire process of adoption.
Collaborative approach
This comprise involving intended users to help in identifying
needs, goals, capacity and alignment. An investment of time and
energy in the planning discussion encourages investment in the
overall process which can ultimately promote the success of
adoption.
Cost/Benefit Considerations
Benefits
Costs
Considerations
Indirect
Indirect
Adopt
Intangible
Intangible
AdoptDatabase System Recommendation
Database System Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Performance
For the kinds of operations, the volume of data, numbers of
concurrent user sessions, and transaction rate (if applicable)
that my application will need to perform, can this DBMS meet
organization required SLAs?
5
Philosophy
Does the design of the DBMS, its record types, how it handles
scaling (up or out), how it handles multiple user access to the
same data, schema versus schema-less, etc. match how my
applications will need to use it?
5
Database System Recommendation
Recommended Database System
Description
Benefits
Aggregate Selection Criteria Score
Oracle
It’s powerful but complex. New users will want to invest in
solid training to ensure they’re getting the most from the
software.
Very secure
8
MySQL
MySQL powers commercial websites by the hundreds of
thousands, and it also serves as the backend for a huge number
of internal enterprise applications.
Open-source hence can be improved in terms of design and
security by different developers
6
Database System Vendor Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Reliability
Vendor must be reliable in terms of service delivery. They must
be available to fix any form of downtime as well as provide risk
mitigation guidelines
8
Certification
A vendor must be must be a member of a certified by a
professional body to offer cloud services
8
Hosted solutions
Picking a suitable vendor who offers cloud-based solutions
saves of productivity
8
Cost
Database costs depending on solutions offered is critical
8
Scalability
The database provider should offer a reliable method of adding
or removing database resources as required
8
Security
The vendor should constantly perform security checks to
determine database reliability
8
Accuracy
All data values must get stored correctly to increase reliable
management
8
Flexibility
There should be constant working of the database without
external productivity issues
8
Database System Recommended Vendors
Vendor Name
Vendor Strengths
Vendor Weaknesses
Products/Services Provided to Project
Aggregate Selection Criteria Score
Oracle
One can temporarily block all damages from an ally
Poor navigation makes it harder to move around in the database.
Database
6
MySQL
Easy to use
Open-source hence can be easily manipulated
Database
5
Database System Deployment Challenges
Deployment Challenge
Deployment Challenge Description
Integration
Some database system only work with specific gadgets hence
hard to install
Cost
It is costly in terms of installation as well as maintenance to
deploy database systems
Security/vulnerabilities
Installation of antivirus and penetration testing are crucial to
promote productivity
Resource utilization
Problems occur due to increase in data volumes and unreliable
storage spaces
Data migration
Finding an accurate method of connecting different data sources
can create issues
High availability
The database can have issues and prevent user access
Technology Adoption Methods
Method Name
Method Description
Strategic planning method
Involve developing a technique to implement the technology, it
also comprise measuring its progress and take needed corrective
actions. This happens through the entire process of adoption.
Collaborative approach
This comprise involving intended users to help in identifying
needs, goals, capacity and alignment. An investment of time and
energy in the planning discussion encourages investment in the
overall process which can ultimately promote the success of
adoption.
Cost/Benefit Considerations
Benefits
Costs
Considerations
Indirect
Opportunity
Adopt
Intangible
Intangible
AdoptSoftware Application Recommendations
Software Application Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Compatibility
If the software needs to operate with a certain device (card
reader, high capacity storage device, printer video camera) will
you have to buy new devices? Are you dependent on the devices
you have on the system that may be obsolete and unsupported
by the new software when the software supplier upgrades the
program?
8
Cost
Is it a buy-once and forget about it? Or is it a subscription
service? Are there additional costs to make it work on your
system?
8
Usability
The software should not require too many settings to ensure
users understand its operation
8
Integration with other systems
It is imperative to migrate software through different systems
like moving from legacy systems to current technology
8
Security
Use of antivirus software, firewalls, and regular backup are
mandatory
8
Accessibility
Users and other devices need to find it easy to operate the
software
8
Scalability
The software should operate effectively regardless of many
users or activities
8
Software Application Recommendation
Recommended Software Application
Description
Benefits
Aggregate Selection Criteria Score
Microsoft
Develop operating systems and different types of applications
Widely used hence affordable
8
IBM
Develop server systems as well as hardware.
Secure to use
6
Software Application Vendor Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Reliability
Vendor must be reliable in terms of service delivery. They must
be available to fix any form of downtime as well as provide risk
mitigation guidelines
8
Certification
A vendor must be must be a member of a certified by a
professional body to offer cloud services
6
Software Application Recommended Vendors
Vendor Name
Vendor Strengths
Vendor Weaknesses
Products/Services Provided to Project
Aggregate Selection Criteria Score
Microsoft
Widely used hence compatible with many applications
Easily attacked by hackers
Operating systems and applications
8
IBM
Secure in terms of security
Expensive
Operating systems and applications
6
Software Application Deployment Challenges
Deployment Challenge
Deployment Challenge Description
Compatibility
Sometime a software can fail to integrate with some systems
within the organization forcing the organization to buy new
equipment.
Cost
Some software are very expensive to buy as well as maintain
Data migration
Issues like confusion and data loss can occur in the system
Time
Amount of time taken to ensure software applications operate
gets affected
Technology Adoption Methods
Method Name
Method Description
Strategic planning method
Involve developing a technique to implement the technology, it
also comprise measuring its progress and take needed corrective
actions. This happens through the entire process of adoption.
Collaborative approach
This comprise involving intended users to help in identifying
needs, goals, capacity and alignment. An investment of time and
energy in the planning discussion encourages investment in the
overall process which can ultimately promote the success of
adoption.
Cost/Benefit Considerations
Benefits
Costs
Considerations
Indirect
indirect
Adopt
Intangible
Intangible
AdoptCloud Services Recommendations
Cloud Services Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Cost
Services should be affordable in terms installation as well as
cost as well as maintenance.
6
Bandwidth
Should have strong bandwidth to run any service that
organization intend to run.
8
Cloud Services Recommendation
Recommended Cloud Services
Description
Benefits
Aggregate Selection Criteria Score
Amazon Web Services
Help businesses manage challenges and meet their
organizational goals. It offers tools that support all industries.
Easy to use and adopt
6
Microsoft Azure
Widely used and offer wide range of services.
Easy few resources to roll out
4
Cloud Services Vendor Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Reliability
Vendor must be reliable in terms of service delivery. They must
be available to fix any form of downtime as well as provide risk
mitigation guidelines
5
Certification
A vendor must be must be a member of a certified by a
professional body to offer cloud services
6
Cloud Services Recommended Vendors
Vendor Name
Vendor Strengths
Vendor Weaknesses
Products/Services Provided to Project
Aggregate Selection Criteria Score
Amazon Web Services
Easy to use and adopt
High technical support fee
IaaS
PaaS
SaaS
6
Microsoft Azure
Easy to use
Expensive
IaaS
PaaS
SaaS
4
Cloud Services Deployment Challenges
Deployment Challenge
Deployment Challenge Description
Multi-cloud
Once application is designed for distributed deployment in
multiple regions, it works in multi-cloud environment unless
cloud specific services are used. However, application delivery
comes as challenge.
Distributed Infrastructure
From monitoring point of view, some running machines may
easily be hidden in a different region and keep contributing to
the bill. From application point of view, cloud services needs a
different design. When companies try to port traditional
application to cloud, the efficiency doesn’t increase.
Technology Adoption Methods
Method Name
Method Description
Strategic planning method
Involve developing a technique to implement the technology, it
also comprise measuring its progress and take needed corrective
actions. This happens through the entire process of adoption.
Collaborative approach
This comprise involving intended users to help in identifying
needs, goals, capacity and alignment. An investment of time and
energy in the planning discussion encourages investment in the
overall process which can ultimately promote the success of
adoption.
Cost/Benefit Considerations
Benefits
Costs
Considerations
Intangible
Indirect
Adopt
Direct
Intangible
Adopt
References
Vera
Solution
s. (2019). 10 Criteria To Evaluate When Choosing A New
Technology. Retrieved 13 December 2021 from
https://www.verasolutions.org/10-criteria-to-evaluate-when-
choosing-a-new-technology/?locale=en.
Copyright 2020 by University of Phoenix. All rights reserved.
Copyright 2020 by University of Phoenix. All rights reserved.
BSA/425
v
1.3
Copyright
20
20
by University of Phoenix. All rights reserved.
Project Plan Draft
Fill out each of the sections below with information relevant to
your project. Be sure to include the
company name associated with your project.
Company Name
:
Techlynk Limited
Network Technology Recommendations
Network Technology Selection Criteria
Selection
Criteria
Name
Selection Criteria Description
Selection Criteria Value (Weighting
i
n
Points)
Ease of use
Technology should be easy to use for all
users
without any training involved.
6
Cost
It should be affordable to procure and
maintain the technology.
8
Reliability
The network should always work
regardless of any failure. All nodes should
support each other.
7
Feasibility
The broadband should be
affordable
based on capital and operational costs
8
Accessibility
Ensure the network provides different
paths so that all nodes get connected
7
Cyber
security
This ensures detection and protection
from data breaches, virus, or malware
attacks
8
Network
Technology Recommendation
Recommended
Network
Technologies
Description
Benefits
Aggregate
Selection
Criteria Score
BSA/425 v1.3
Copyright 2020 by University of Phoenix. All rights reserved.
Project Plan Draft
Fill out each of the sections below with information relevant to
your project. Be sure to include the
company name associated with your project.
Company Name: Techlynk Limited
Network Technology Recommendations
Network Technology Selection Criteria
Selection
Criteria
Name
Selection Criteria Description Selection Criteria Value
(Weighting in
Points)
Ease of use Technology should be easy to use for all
users without any training involved.
6
Cost It should be affordable to procure and
maintain the technology.
8
Reliability The network should always work
regardless of any failure. All nodes should
support each other.
7
Feasibility The broadband should be affordable
based on capital and operational costs
8
Accessibility Ensure the network provides different
paths so that all nodes get connected
7
Cyber
security
This ensures detection and protection
from data breaches, virus, or malware
attacks
8
Network Technology Recommendation
Recommended
Network
Technologies
Description Benefits Aggregate
Selection
Criteria Score
Select 5 of the following questions (20% each).
Answer in complete sentences. Use concise, accurate writing
to explain your answers. Use a separate sheet(s) of paper for
your answers. Make sure to number your answers.
Briefly describe the primary components of monetary policy and
what tools are available to manipulate portions of the
macroeconomy.
Briefly describe the primary components of fiscal policy.
Provide three examples of fiscal policy and its influence on the
macroeconomy.
Explain the concept of “crowding out” and how that can
negatively affect the U.S. economy in the future. Make sure to
include the role of government expenditures and investments in
your explanation.
How does the large size of the U.S. governmental deficit and
overall debt present a macroeconomic challenge in the
upcoming years? Provide three examples of tough choices in
the near future.
How does velocity have a role in the overall performance of an
economy? Make sure to include the role of the money
multiplier effect in your explanation.
What are the advantages and disadvantages of a strong dollar
and a weak dollar? Make sure to cite the proportion of the US
import-export variables in relation to its overall GDP in your
explanation.
How are “stickiness” and Keynesianism related? Cite several
examples that explain the connection. Also, make sure to
explain how conditions may either be similar or different from
the days of Keynes to our present-day challenges.
BSA/425 v1.3
Project Plan Draft
BSA/425 v1.3
Page 12 of 12
Project Plan Draft
Fill out each of the sections below with information relevant to
your project. Be sure to include the company name associated
with your project.
Company Name: Techlynk LimitedNetwork Technology
Recommendations
Network Technology Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Ease of use
Technology should be easy to use for all users without any
training involved.
6
Cost
It should be affordable to procure and maintain the technology.
8
Reliability
The network should always work regardless of any failure. All
nodes should support each other.
7
Feasibility
The broadband should be affordable based on capital and
operational costs
8
Accessibility
Ensure the network provides different paths so that all nodes get
connected
7
Cyber security
This ensures detection and protection from data breaches, virus,
or malware attacks
8
Network Technology Recommendation
Recommended Network Technologies
Description
Benefits
Aggregate Selection Criteria Score
Local area network (LAN
Local area networks connect groups of computers and low -
voltage devices over short distances (within a building or
between a group of two or three buildings very close to each
other) to share information and resources. Businesses generally
manage and maintain local networks. Through the use of
routers, LANs can connect to wide area networks (WANs,
explained below) to transfer data quickly and securely.
Most local area networks have a router that connects to the
internet. So being on such a local area network, you can
communicate with other devices on your network and are
protected from internet-based sniffing and monitoring software
(i.e. things on the internet can’t see your internal traffic
between devices). And yet, you still have the ability to go out to
the internet by simply entering an internet IP address in your
browser’s URL field.
7
Wireless local area network (WLAN)
WLANs use wireless network technology, such as Wi-Fi.
Generally seen in the same types of applications as local area
networks, these types of networks do not require devices to rely
on physical cables to connect to the network.
You can access network resources from any location within the
wireless network's coverage area. Wireless access to the
Internet and to company resources help your staff be more
productive and collaborative.
You don't have to string cables, as you do with wired networks.
Installation can be quick and cost-effective. You can easily
expand WLANs where and as needed, because no wires are
involved.
8
Network Technology Vendor Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Quality of Product or Service
They must provide high quality services to meet organization
goals. Services provided must meet the required market
standards.
6
Price
Services must be affordable to the organization i.e. must be
within the organization budget.
6
Network Technology Recommended Vendors
Vendor Name
Vendor Strengths
Vendor Weaknesses
Products/Services Provided to Project
Aggregate Selection Criteria Score
Cisco
Cisco maintains a strong lead in nearly every networking
hardware category
Their gadgets are expensive
Video conferencing, network gadgets, switch, routers
6
Arista
Arista also recognizes the importance of diversification. They
now offer network monitoring, automation, and analytics for
hybrid cloud environments.
Arista appears weaker in areas of SD-WAN and security, which
could affect their future agility.
They now offer network monitoring, automation, and analytics
for hybrid cloud environments.
4
Network Technology Deployment Challenges
Deployment Challenge
Deployment Challenge Description
Infrastructure
Some of network technology is not compatible with some
gadgets
Cost
It is very expensive to buy some of network technology
Usability
The issue can cause network problems when users do not get
expected outcomes
Poor network performance
It limits productivity and does not offer full robust network
output
Installation and configuration management
Settings can get performed in methods that are not required and
cause improper actions
Connectivity
Issues can develop when there is no connection to the internet
to produce network services
Scalability
The network can have issues when attempting to grow it or
increase productivity
Accessibility
Inability to connect to servers and internet access produces
network issues
Security
Issues like phishing, viruses, malware, or rogue usage causes
problems
Resiliency
Problems due to limited ability to recover of network problems
Integration
Problems when attempting to connect networks to new systems
Technology Adoption Methods
Method Name
Method Description
Strategic planning method
Involve developing a technique to implement the technology, it
also comprise measuring its progress and take needed corrective
actions. This happens through the entire process of adoption.
Collaborative approach
This comprise involving intended users to help in identifying
needs, goals, capacity and alignment. An investment of time and
energy in the planning discussion encourages investment in the
overall process which can ultimately promote the success of
adoption.
Cost/Benefit Considerations
Benefits
Costs
Considerations
Indirect
Indirect
Adopt
Intangible
Intangible
AdoptDatabase System Recommendation
Database System Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Performance
For the kinds of operations, the volume of data, numbers of
concurrent user sessions, and transaction rate (if applicable)
that my application will need to perform, can this DBMS meet
organization required SLAs?
5
Philosophy
Does the design of the DBMS, its record types, how it handles
scaling (up or out), how it handles multiple user access to the
same data, schema versus schema-less, etc. match how my
applications will need to use it?
5
Database System Recommendation
Recommended Database System
Description
Benefits
Aggregate Selection Criteria Score
Oracle
It’s powerful but complex. New users will want to invest in
solid training to ensure they’re getting the most from the
software.
Very secure
8
MySQL
MySQL powers commercial websites by the hundreds of
thousands, and it also serves as the backend for a huge number
of internal enterprise applications.
Open-source hence can be improved in terms of design and
security by different developers
6
Database System Vendor Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Reliability
Vendor must be reliable in terms of service delivery. They must
be available to fix any form of downtime as well as provide risk
mitigation guidelines
8
Certification
A vendor must be must be a member of a certified by a
professional body to offer cloud services
8
Hosted solutions
Picking a suitable vendor who offers cloud-based solutions
saves of productivity
8
Cost
Database costs depending on solutions offered is critical
8
Scalability
The database provider should offer a reliable method of adding
or removing database resources as required
8
Security
The vendor should constantly perform security checks to
determine database reliability
8
Accuracy
All data values must get stored correctly to increase reliable
management
8
Flexibility
There should be constant working of the database without
external productivity issues
8
Database System Recommended Vendors
Vendor Name
Vendor Strengths
Vendor Weaknesses
Products/Services Provided to Project
Aggregate Selection Criteria Score
Oracle
One can temporarily block all damages from an ally
Poor navigation makes it harder to move around in the database.
Database
6
MySQL
Easy to use
Open-source hence can be easily manipulated
Database
5
Database System Deployment Challenges
Deployment Challenge
Deployment Challenge Description
Integration
Some database system only work with specific gadgets hence
hard to install
Cost
It is costly in terms of installation as well as maintenance to
deploy database systems
Security/vulnerabilities
Installation of antivirus and penetration testing are crucial to
promote productivity
Resource utilization
Problems occur due to increase in data volumes and unreliable
storage spaces
Data migration
Finding an accurate method of connecting different data sources
can create issues
High availability
The database can have issues and prevent user access
Technology Adoption Methods
Method Name
Method Description
Strategic planning method
Involve developing a technique to implement the technology, it
also comprise measuring its progress and take needed corrective
actions. This happens through the entire process of adoption.
Collaborative approach
This comprise involving intended users to help in identifying
needs, goals, capacity and alignment. An investment of time and
energy in the planning discussion encourages investment in the
overall process which can ultimately promote the success of
adoption.
Cost/Benefit Considerations
Benefits
Costs
Considerations
Indirect
Opportunity
Adopt
Intangible
Intangible
AdoptSoftware Application Recommendations
Software Application Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Compatibility
If the software needs to operate with a certain device (card
reader, high capacity storage device, printer video camera) will
you have to buy new devices? Are you dependent on the devices
you have on the system that may be obsolete and unsupported
by the new software when the software supplier upgrades the
program?
8
Cost
Is it a buy-once and forget about it? Or is it a subscription
service? Are there additional costs to make it work on your
system?
8
Usability
The software should not require too many settings to ensure
users understand its operation
8
Integration with other systems
It is imperative to migrate software through different systems
like moving from legacy systems to current technology
8
Security
Use of antivirus software, firewalls, and regular backup are
mandatory
8
Accessibility
Users and other devices need to find it easy to operate the
software
8
Scalability
The software should operate effectively regardless of many
users or activities
8
Software Application Recommendation
Recommended Software Application
Description
Benefits
Aggregate Selection Criteria Score
Microsoft
Develop operating systems and different types of applications
Widely used hence affordable
8
IBM
Develop server systems as well as hardware.
Secure to use
6
Software Application Vendor Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Reliability
Vendor must be reliable in terms of service delivery. They must
be available to fix any form of downtime as well as provide risk
mitigation guidelines
8
Certification
A vendor must be must be a member of a certified by a
professional body to offer cloud services
6
Software Application Recommended Vendors
Vendor Name
Vendor Strengths
Vendor Weaknesses
Products/Services Provided to Project
Aggregate Selection Criteria Score
Microsoft
Widely used hence compatible with many applications
Easily attacked by hackers
Operating systems and applications
8
IBM
Secure in terms of security
Expensive
Operating systems and applications
6
Software Application Deployment Challenges
Deployment Challenge
Deployment Challenge Description
Compatibility
Sometime a software can fail to integrate with some systems
within the organization forcing the organization to buy new
equipment.
Cost
Some software are very expensive to buy as well as maintain
Data migration
Issues like confusion and data loss can occur in the system
Time
Amount of time taken to ensure software applications operate
gets affected
Technology Adoption Methods
Method Name
Method Description
Strategic planning method
Involve developing a technique to implement the technology, it
also comprise measuring its progress and take needed corrective
actions. This happens through the entire process of adoption.
Collaborative approach
This comprise involving intended users to help in identifying
needs, goals, capacity and alignment. An investment of time and
energy in the planning discussion encourages investment in the
overall process which can ultimately promote the success of
adoption.
Cost/Benefit Considerations
Benefits
Costs
Considerations
Indirect
indirect
Adopt
Intangible
Intangible
AdoptCloud Services Recommendations
Cloud Services Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Cost
Services should be affordable in terms installation as well as
cost as well as maintenance.
6
Bandwidth
Should have strong bandwidth to run any service that
organization intend to run.
8
Cloud Services Recommendation
Recommended Cloud Services
Description
Benefits
Aggregate Selection Criteria Score
Amazon Web Services
Help businesses manage challenges and meet their
organizational goals. It offers tools that support all industries.
Easy to use and adopt
6
Microsoft Azure
Widely used and offer wide range of services.
Easy few resources to roll out
4
Cloud Services Vendor Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Reliability
Vendor must be reliable in terms of service delivery. They must
be available to fix any form of downtime as well as provide risk
mitigation guidelines
5
Certification
A vendor must be must be a member of a certified by a
professional body to offer cloud services
6
Cloud Services Recommended Vendors
Vendor Name
Vendor Strengths
Vendor Weaknesses
Products/Services Provided to Project
Aggregate Selection Criteria Score
Amazon Web Services
Easy to use and adopt
High technical support fee
IaaS
PaaS
SaaS
6
Microsoft Azure
Easy to use
Expensive
IaaS
PaaS
SaaS
4
Cloud Services Deployment Challenges
Deployment Challenge
Deployment Challenge Description
Multi-cloud
Once application is designed for distributed deployment in
multiple regions, it works in multi-cloud environment unless
cloud specific services are used. However, application delivery
comes as challenge.
Distributed Infrastructure
From monitoring point of view, some running machines may
easily be hidden in a different region and keep contributing to
the bill. From application point of view, cloud services needs a
different design. When companies try to port traditional
application to cloud, the efficiency doesn’t increase.
Technology Adoption Methods
Method Name
Method Description
Strategic planning method
Involve developing a technique to implement the technology, it
also comprise measuring its progress and take needed corrective
actions. This happens through the entire process of adoption.
Collaborative approach
This comprise involving intended users to help in identifying
needs, goals, capacity and alignment. An investment of time and
energy in the planning discussion encourages investment in the
overall process which can ultimately promote the success of
adoption.
Cost/Benefit Considerations
Benefits
Costs
Considerations
Intangible
Indirect
Adopt
Direct
Intangible
Adopt
References
Vera

More Related Content

Similar to BSA425 v1.3Project Plan DraftBSA425 v1.3Page 12 of 12

1606662359-chapter-1-top-down-network-design.pptx
1606662359-chapter-1-top-down-network-design.pptx1606662359-chapter-1-top-down-network-design.pptx
1606662359-chapter-1-top-down-network-design.pptxHaniYousef8
 
Best Practices for Building Scalable Visibility Architectures
Best Practices for Building Scalable Visibility ArchitecturesBest Practices for Building Scalable Visibility Architectures
Best Practices for Building Scalable Visibility ArchitecturesEnterprise Management Associates
 
Performance Testing Cloud-Based Systems
Performance Testing Cloud-Based SystemsPerformance Testing Cloud-Based Systems
Performance Testing Cloud-Based SystemsTechWell
 
West Consulting Modular Design ProposalMichael BoddieNetwork.docx
West Consulting Modular Design ProposalMichael BoddieNetwork.docxWest Consulting Modular Design ProposalMichael BoddieNetwork.docx
West Consulting Modular Design ProposalMichael BoddieNetwork.docxphilipnelson29183
 
ISV Integrations
ISV IntegrationsISV Integrations
ISV Integrationsmufflerdog
 
Best Practices In Load And Stress Testing Cmg Seminar[1]
Best Practices In Load And Stress Testing Cmg Seminar[1]Best Practices In Load And Stress Testing Cmg Seminar[1]
Best Practices In Load And Stress Testing Cmg Seminar[1]Munirathnam Naidu
 
Keeping the World Connected with CompTIA Network+
Keeping the World Connected with CompTIA Network+Keeping the World Connected with CompTIA Network+
Keeping the World Connected with CompTIA Network+CompTIA
 
ISV Integrations
ISV IntegrationsISV Integrations
ISV IntegrationsBlueFish
 
Best Practices for Integrating Applications Development
Best Practices for Integrating Applications DevelopmentBest Practices for Integrating Applications Development
Best Practices for Integrating Applications DevelopmentKovair
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital ForensicIRJET Journal
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET Journal
 
Gitex journey to the cloud
Gitex journey to the cloudGitex journey to the cloud
Gitex journey to the cloudJorge Sebastiao
 
2018 NAMIC - Practical Applications for Web Services
2018 NAMIC - Practical Applications for Web Services2018 NAMIC - Practical Applications for Web Services
2018 NAMIC - Practical Applications for Web ServicesPhil Reynolds
 
Trusted db a trusted hardware based database with privacy and data confidenti...
Trusted db a trusted hardware based database with privacy and data confidenti...Trusted db a trusted hardware based database with privacy and data confidenti...
Trusted db a trusted hardware based database with privacy and data confidenti...LeMeniz Infotech
 
Building Cloud capability for startups
Building Cloud capability for startupsBuilding Cloud capability for startups
Building Cloud capability for startupsSekhar Mohanty
 

Similar to BSA425 v1.3Project Plan DraftBSA425 v1.3Page 12 of 12 (20)

Ms.azure in detail
Ms.azure in detailMs.azure in detail
Ms.azure in detail
 
1606662359-chapter-1-top-down-network-design.pptx
1606662359-chapter-1-top-down-network-design.pptx1606662359-chapter-1-top-down-network-design.pptx
1606662359-chapter-1-top-down-network-design.pptx
 
Best Practices for Building Scalable Visibility Architectures
Best Practices for Building Scalable Visibility ArchitecturesBest Practices for Building Scalable Visibility Architectures
Best Practices for Building Scalable Visibility Architectures
 
Performance Testing Cloud-Based Systems
Performance Testing Cloud-Based SystemsPerformance Testing Cloud-Based Systems
Performance Testing Cloud-Based Systems
 
West Consulting Modular Design ProposalMichael BoddieNetwork.docx
West Consulting Modular Design ProposalMichael BoddieNetwork.docxWest Consulting Modular Design ProposalMichael BoddieNetwork.docx
West Consulting Modular Design ProposalMichael BoddieNetwork.docx
 
ISV Integrations
ISV IntegrationsISV Integrations
ISV Integrations
 
Best Practices In Load And Stress Testing Cmg Seminar[1]
Best Practices In Load And Stress Testing Cmg Seminar[1]Best Practices In Load And Stress Testing Cmg Seminar[1]
Best Practices In Load And Stress Testing Cmg Seminar[1]
 
Keeping the World Connected with CompTIA Network+
Keeping the World Connected with CompTIA Network+Keeping the World Connected with CompTIA Network+
Keeping the World Connected with CompTIA Network+
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
 
ISV Integrations
ISV IntegrationsISV Integrations
ISV Integrations
 
Best Practices for Integrating Applications Development
Best Practices for Integrating Applications DevelopmentBest Practices for Integrating Applications Development
Best Practices for Integrating Applications Development
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
 
Quality 4.0 and reimagining quality
Quality 4.0 and reimagining qualityQuality 4.0 and reimagining quality
Quality 4.0 and reimagining quality
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
 
Cloud Computing.pptx
Cloud Computing.pptxCloud Computing.pptx
Cloud Computing.pptx
 
Unit-II-part 3.pdf
Unit-II-part 3.pdfUnit-II-part 3.pdf
Unit-II-part 3.pdf
 
Gitex journey to the cloud
Gitex journey to the cloudGitex journey to the cloud
Gitex journey to the cloud
 
2018 NAMIC - Practical Applications for Web Services
2018 NAMIC - Practical Applications for Web Services2018 NAMIC - Practical Applications for Web Services
2018 NAMIC - Practical Applications for Web Services
 
Trusted db a trusted hardware based database with privacy and data confidenti...
Trusted db a trusted hardware based database with privacy and data confidenti...Trusted db a trusted hardware based database with privacy and data confidenti...
Trusted db a trusted hardware based database with privacy and data confidenti...
 
Building Cloud capability for startups
Building Cloud capability for startupsBuilding Cloud capability for startups
Building Cloud capability for startups
 

More from VannaSchrader3

Topic that identifies characteristics of Native American Culture and.docx
Topic that identifies characteristics of Native American Culture and.docxTopic that identifies characteristics of Native American Culture and.docx
Topic that identifies characteristics of Native American Culture and.docxVannaSchrader3
 
Topic Stem Cell ResearchAPA Format I need these topics. don.docx
Topic Stem Cell ResearchAPA Format I need these topics. don.docxTopic Stem Cell ResearchAPA Format I need these topics. don.docx
Topic Stem Cell ResearchAPA Format I need these topics. don.docxVannaSchrader3
 
Topic Styles of PolicingYou are a patrol officer in a middle- to .docx
Topic Styles of PolicingYou are a patrol officer in a middle- to .docxTopic Styles of PolicingYou are a patrol officer in a middle- to .docx
Topic Styles of PolicingYou are a patrol officer in a middle- to .docxVannaSchrader3
 
Topic the legalization of same sex adoptionThese same sex adopti.docx
Topic the legalization of same sex adoptionThese same sex adopti.docxTopic the legalization of same sex adoptionThese same sex adopti.docx
Topic the legalization of same sex adoptionThese same sex adopti.docxVannaSchrader3
 
TOPIC The Truth About Caffeine3 pages,give some statistics of neg.docx
TOPIC The Truth About Caffeine3 pages,give some statistics of neg.docxTOPIC The Truth About Caffeine3 pages,give some statistics of neg.docx
TOPIC The Truth About Caffeine3 pages,give some statistics of neg.docxVannaSchrader3
 
Topic Media Example (article)1) as usual, do an analysis of the.docx
Topic Media Example (article)1) as usual, do an analysis of the.docxTopic Media Example (article)1) as usual, do an analysis of the.docx
Topic Media Example (article)1) as usual, do an analysis of the.docxVannaSchrader3
 
Topic Servant LeadershipThread In our reading we explored th.docx
Topic Servant LeadershipThread In our reading we explored th.docxTopic Servant LeadershipThread In our reading we explored th.docx
Topic Servant LeadershipThread In our reading we explored th.docxVannaSchrader3
 
Topic Organization of Law Enforcement AgenciesDo you agree or d.docx
Topic Organization of Law Enforcement AgenciesDo you agree or d.docxTopic Organization of Law Enforcement AgenciesDo you agree or d.docx
Topic Organization of Law Enforcement AgenciesDo you agree or d.docxVannaSchrader3
 
Topic Parents Should have a license to have childrenaprox. 500 wo.docx
Topic Parents Should have a license to have childrenaprox. 500 wo.docxTopic Parents Should have a license to have childrenaprox. 500 wo.docx
Topic Parents Should have a license to have childrenaprox. 500 wo.docxVannaSchrader3
 
Topic PATIENT DATA PRIVACYPerformance Improvement plan Proper an.docx
Topic PATIENT DATA PRIVACYPerformance Improvement plan Proper an.docxTopic PATIENT DATA PRIVACYPerformance Improvement plan Proper an.docx
Topic PATIENT DATA PRIVACYPerformance Improvement plan Proper an.docxVannaSchrader3
 
Topic Kelly’s Personal ConstructsQuestionPrompt  Analyze th.docx
Topic Kelly’s Personal ConstructsQuestionPrompt  Analyze th.docxTopic Kelly’s Personal ConstructsQuestionPrompt  Analyze th.docx
Topic Kelly’s Personal ConstructsQuestionPrompt  Analyze th.docxVannaSchrader3
 
Topic Fingerprints.Study fingerprinting in the textbook and res.docx
Topic Fingerprints.Study fingerprinting in the textbook and res.docxTopic Fingerprints.Study fingerprinting in the textbook and res.docx
Topic Fingerprints.Study fingerprinting in the textbook and res.docxVannaSchrader3
 
Topic is Domestic Violence, Both men and women being the abus.docx
Topic is Domestic Violence, Both men and women being the abus.docxTopic is Domestic Violence, Both men and women being the abus.docx
Topic is Domestic Violence, Both men and women being the abus.docxVannaSchrader3
 
Topic is regional integration .First You need to find article and re.docx
Topic is regional integration .First You need to find article and re.docxTopic is regional integration .First You need to find article and re.docx
Topic is regional integration .First You need to find article and re.docxVannaSchrader3
 
Topic Human Trafficking in relation to US Border and Coastal securi.docx
Topic Human Trafficking in relation to US Border and Coastal securi.docxTopic Human Trafficking in relation to US Border and Coastal securi.docx
Topic Human Trafficking in relation to US Border and Coastal securi.docxVannaSchrader3
 
Topic is AutonomyShort papers should use double spacing, 12-point .docx
Topic is AutonomyShort papers should use double spacing, 12-point .docxTopic is AutonomyShort papers should use double spacing, 12-point .docx
Topic is AutonomyShort papers should use double spacing, 12-point .docxVannaSchrader3
 
Topic Genetic connection of hypertension to cardiovascular disease .docx
Topic Genetic connection of hypertension to cardiovascular disease .docxTopic Genetic connection of hypertension to cardiovascular disease .docx
Topic Genetic connection of hypertension to cardiovascular disease .docxVannaSchrader3
 
topic Errors (medication or patient injury)in particular stra.docx
topic Errors (medication or patient injury)in particular stra.docxtopic Errors (medication or patient injury)in particular stra.docx
topic Errors (medication or patient injury)in particular stra.docxVannaSchrader3
 
Topic differences between folk guitar and classic guitar.Minimu.docx
Topic differences between folk guitar and classic guitar.Minimu.docxTopic differences between folk guitar and classic guitar.Minimu.docx
Topic differences between folk guitar and classic guitar.Minimu.docxVannaSchrader3
 
Topic Death Investigations. Review homicide investigation as de.docx
Topic Death Investigations. Review homicide investigation as de.docxTopic Death Investigations. Review homicide investigation as de.docx
Topic Death Investigations. Review homicide investigation as de.docxVannaSchrader3
 

More from VannaSchrader3 (20)

Topic that identifies characteristics of Native American Culture and.docx
Topic that identifies characteristics of Native American Culture and.docxTopic that identifies characteristics of Native American Culture and.docx
Topic that identifies characteristics of Native American Culture and.docx
 
Topic Stem Cell ResearchAPA Format I need these topics. don.docx
Topic Stem Cell ResearchAPA Format I need these topics. don.docxTopic Stem Cell ResearchAPA Format I need these topics. don.docx
Topic Stem Cell ResearchAPA Format I need these topics. don.docx
 
Topic Styles of PolicingYou are a patrol officer in a middle- to .docx
Topic Styles of PolicingYou are a patrol officer in a middle- to .docxTopic Styles of PolicingYou are a patrol officer in a middle- to .docx
Topic Styles of PolicingYou are a patrol officer in a middle- to .docx
 
Topic the legalization of same sex adoptionThese same sex adopti.docx
Topic the legalization of same sex adoptionThese same sex adopti.docxTopic the legalization of same sex adoptionThese same sex adopti.docx
Topic the legalization of same sex adoptionThese same sex adopti.docx
 
TOPIC The Truth About Caffeine3 pages,give some statistics of neg.docx
TOPIC The Truth About Caffeine3 pages,give some statistics of neg.docxTOPIC The Truth About Caffeine3 pages,give some statistics of neg.docx
TOPIC The Truth About Caffeine3 pages,give some statistics of neg.docx
 
Topic Media Example (article)1) as usual, do an analysis of the.docx
Topic Media Example (article)1) as usual, do an analysis of the.docxTopic Media Example (article)1) as usual, do an analysis of the.docx
Topic Media Example (article)1) as usual, do an analysis of the.docx
 
Topic Servant LeadershipThread In our reading we explored th.docx
Topic Servant LeadershipThread In our reading we explored th.docxTopic Servant LeadershipThread In our reading we explored th.docx
Topic Servant LeadershipThread In our reading we explored th.docx
 
Topic Organization of Law Enforcement AgenciesDo you agree or d.docx
Topic Organization of Law Enforcement AgenciesDo you agree or d.docxTopic Organization of Law Enforcement AgenciesDo you agree or d.docx
Topic Organization of Law Enforcement AgenciesDo you agree or d.docx
 
Topic Parents Should have a license to have childrenaprox. 500 wo.docx
Topic Parents Should have a license to have childrenaprox. 500 wo.docxTopic Parents Should have a license to have childrenaprox. 500 wo.docx
Topic Parents Should have a license to have childrenaprox. 500 wo.docx
 
Topic PATIENT DATA PRIVACYPerformance Improvement plan Proper an.docx
Topic PATIENT DATA PRIVACYPerformance Improvement plan Proper an.docxTopic PATIENT DATA PRIVACYPerformance Improvement plan Proper an.docx
Topic PATIENT DATA PRIVACYPerformance Improvement plan Proper an.docx
 
Topic Kelly’s Personal ConstructsQuestionPrompt  Analyze th.docx
Topic Kelly’s Personal ConstructsQuestionPrompt  Analyze th.docxTopic Kelly’s Personal ConstructsQuestionPrompt  Analyze th.docx
Topic Kelly’s Personal ConstructsQuestionPrompt  Analyze th.docx
 
Topic Fingerprints.Study fingerprinting in the textbook and res.docx
Topic Fingerprints.Study fingerprinting in the textbook and res.docxTopic Fingerprints.Study fingerprinting in the textbook and res.docx
Topic Fingerprints.Study fingerprinting in the textbook and res.docx
 
Topic is Domestic Violence, Both men and women being the abus.docx
Topic is Domestic Violence, Both men and women being the abus.docxTopic is Domestic Violence, Both men and women being the abus.docx
Topic is Domestic Violence, Both men and women being the abus.docx
 
Topic is regional integration .First You need to find article and re.docx
Topic is regional integration .First You need to find article and re.docxTopic is regional integration .First You need to find article and re.docx
Topic is regional integration .First You need to find article and re.docx
 
Topic Human Trafficking in relation to US Border and Coastal securi.docx
Topic Human Trafficking in relation to US Border and Coastal securi.docxTopic Human Trafficking in relation to US Border and Coastal securi.docx
Topic Human Trafficking in relation to US Border and Coastal securi.docx
 
Topic is AutonomyShort papers should use double spacing, 12-point .docx
Topic is AutonomyShort papers should use double spacing, 12-point .docxTopic is AutonomyShort papers should use double spacing, 12-point .docx
Topic is AutonomyShort papers should use double spacing, 12-point .docx
 
Topic Genetic connection of hypertension to cardiovascular disease .docx
Topic Genetic connection of hypertension to cardiovascular disease .docxTopic Genetic connection of hypertension to cardiovascular disease .docx
Topic Genetic connection of hypertension to cardiovascular disease .docx
 
topic Errors (medication or patient injury)in particular stra.docx
topic Errors (medication or patient injury)in particular stra.docxtopic Errors (medication or patient injury)in particular stra.docx
topic Errors (medication or patient injury)in particular stra.docx
 
Topic differences between folk guitar and classic guitar.Minimu.docx
Topic differences between folk guitar and classic guitar.Minimu.docxTopic differences between folk guitar and classic guitar.Minimu.docx
Topic differences between folk guitar and classic guitar.Minimu.docx
 
Topic Death Investigations. Review homicide investigation as de.docx
Topic Death Investigations. Review homicide investigation as de.docxTopic Death Investigations. Review homicide investigation as de.docx
Topic Death Investigations. Review homicide investigation as de.docx
 

Recently uploaded

Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 

Recently uploaded (20)

Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 

BSA425 v1.3Project Plan DraftBSA425 v1.3Page 12 of 12

  • 1. BSA/425 v1.3 Project Plan Draft BSA/425 v1.3 Page 12 of 12 Project Plan Draft Fill out each of the sections below with information relevant to your project. Be sure to include the company name associated with your project. Company Name: Techlynk LimitedNetwork Technology Recommendations Network Technology Selection Criteria Selection Criteria Name Selection Criteria Description Selection Criteria Value (Weighting in Points) Ease of use Technology should be easy to use for all users without any training involved. 6 Cost It should be affordable to procure and maintain the technology. 8 Reliability The network should always work regardless of any failure. All nodes should support each other. 7 Feasibility The broadband should be affordable based on capital and operational costs 8 Accessibility Ensure the network provides different paths so that all nodes get connected
  • 2. 7 Cyber security This ensures detection and protection from data breaches, virus, or malware attacks 8 Network Technology Recommendation Recommended Network Technologies Description Benefits Aggregate Selection Criteria Score Local area network (LAN Local area networks connect groups of computers and low - voltage devices over short distances (within a building or between a group of two or three buildings very close to each other) to share information and resources. Businesses generally manage and maintain local networks. Through the use of routers, LANs can connect to wide area networks (WANs, explained below) to transfer data quickly and securely. Most local area networks have a router that connects to the internet. So being on such a local area network, you can communicate with other devices on your network and are protected from internet-based sniffing and monitoring software (i.e. things on the internet can’t see your internal traffic between devices). And yet, you still have the ability to go out to the internet by simply entering an internet IP address in your browser’s URL field. 7 Wireless local area network (WLAN) WLANs use wireless network technology, such as Wi-Fi. Generally seen in the same types of applications as local area networks, these types of networks do not require devices to rely on physical cables to connect to the network. You can access network resources from any location within the wireless network's coverage area. Wireless access to the Internet and to company resources help your staff be more
  • 3. productive and collaborative. You don't have to string cables, as you do with wired networks. Installation can be quick and cost-effective. You can easily expand WLANs where and as needed, because no wires are involved. 8 Network Technology Vendor Selection Criteria Selection Criteria Name Selection Criteria Description Selection Criteria Value (Weighting in Points) Quality of Product or Service They must provide high quality services to meet organization goals. Services provided must meet the required market standards. 6 Price Services must be affordable to the organization i.e. must be within the organization budget. 6 Network Technology Recommended Vendors Vendor Name Vendor Strengths Vendor Weaknesses Products/Services Provided to Project Aggregate Selection Criteria Score Cisco Cisco maintains a strong lead in nearly every networking hardware category Their gadgets are expensive Video conferencing, network gadgets, switch, routers 6 Arista Arista also recognizes the importance of diversification. They now offer network monitoring, automation, and analytics for
  • 4. hybrid cloud environments. Arista appears weaker in areas of SD-WAN and security, which could affect their future agility. They now offer network monitoring, automation, and analytics for hybrid cloud environments. 4 Network Technology Deployment Challenges Deployment Challenge Deployment Challenge Description Infrastructure Some of network technology is not compatible with some gadgets Cost It is very expensive to buy some of network technology Usability The issue can cause network problems when users do not get expected outcomes Poor network performance It limits productivity and does not offer full robust network output Installation and configuration management Settings can get performed in methods that are not required and cause improper actions Connectivity Issues can develop when there is no connection to the internet to produce network services Scalability The network can have issues when attempting to grow it or increase productivity Accessibility Inability to connect to servers and internet access produces network issues Security Issues like phishing, viruses, malware, or rogue usage causes problems
  • 5. Resiliency Problems due to limited ability to recover of network problems Integration Problems when attempting to connect networks to new systems Technology Adoption Methods Method Name Method Description Strategic planning method Involve developing a technique to implement the technology, it also comprise measuring its progress and take needed corrective actions. This happens through the entire process of adoption. Collaborative approach This comprise involving intended users to help in identifying needs, goals, capacity and alignment. An investment of time and energy in the planning discussion encourages investment in the overall process which can ultimately promote the success of adoption. Cost/Benefit Considerations Benefits Costs Considerations Indirect Indirect Adopt Intangible Intangible AdoptDatabase System Recommendation Database System Selection Criteria Selection Criteria Name Selection Criteria Description Selection Criteria Value (Weighting in Points) Performance For the kinds of operations, the volume of data, numbers of concurrent user sessions, and transaction rate (if applicable)
  • 6. that my application will need to perform, can this DBMS meet organization required SLAs? 5 Philosophy Does the design of the DBMS, its record types, how it handles scaling (up or out), how it handles multiple user access to the same data, schema versus schema-less, etc. match how my applications will need to use it? 5 Database System Recommendation Recommended Database System Description Benefits Aggregate Selection Criteria Score Oracle It’s powerful but complex. New users will want to invest in solid training to ensure they’re getting the most from the software. Very secure 8 MySQL MySQL powers commercial websites by the hundreds of thousands, and it also serves as the backend for a huge number of internal enterprise applications. Open-source hence can be improved in terms of design and security by different developers 6 Database System Vendor Selection Criteria Selection Criteria Name Selection Criteria Description Selection Criteria Value (Weighting in Points) Reliability Vendor must be reliable in terms of service delivery. They must be available to fix any form of downtime as well as provide risk
  • 7. mitigation guidelines 8 Certification A vendor must be must be a member of a certified by a professional body to offer cloud services 8 Hosted solutions Picking a suitable vendor who offers cloud-based solutions saves of productivity 8 Cost Database costs depending on solutions offered is critical 8 Scalability The database provider should offer a reliable method of adding or removing database resources as required 8 Security The vendor should constantly perform security checks to determine database reliability 8 Accuracy All data values must get stored correctly to increase reliable management 8 Flexibility There should be constant working of the database without external productivity issues 8 Database System Recommended Vendors Vendor Name Vendor Strengths Vendor Weaknesses Products/Services Provided to Project Aggregate Selection Criteria Score
  • 8. Oracle One can temporarily block all damages from an ally Poor navigation makes it harder to move around in the database. Database 6 MySQL Easy to use Open-source hence can be easily manipulated Database 5 Database System Deployment Challenges Deployment Challenge Deployment Challenge Description Integration Some database system only work with specific gadgets hence hard to install Cost It is costly in terms of installation as well as maintenance to deploy database systems Security/vulnerabilities Installation of antivirus and penetration testing are crucial to promote productivity Resource utilization Problems occur due to increase in data volumes and unreliable storage spaces Data migration Finding an accurate method of connecting different data sources can create issues High availability The database can have issues and prevent user access Technology Adoption Methods Method Name Method Description Strategic planning method
  • 9. Involve developing a technique to implement the technology, it also comprise measuring its progress and take needed corrective actions. This happens through the entire process of adoption. Collaborative approach This comprise involving intended users to help in identifying needs, goals, capacity and alignment. An investment of time and energy in the planning discussion encourages investment in the overall process which can ultimately promote the success of adoption. Cost/Benefit Considerations Benefits Costs Considerations Indirect Opportunity Adopt Intangible Intangible AdoptSoftware Application Recommendations Software Application Selection Criteria Selection Criteria Name Selection Criteria Description Selection Criteria Value (Weighting in Points) Compatibility If the software needs to operate with a certain device (card reader, high capacity storage device, printer video camera) will you have to buy new devices? Are you dependent on the devices you have on the system that may be obsolete and unsupported by the new software when the software supplier upgrades the program? 8 Cost Is it a buy-once and forget about it? Or is it a subscription service? Are there additional costs to make it work on your system?
  • 10. 8 Usability The software should not require too many settings to ensure users understand its operation 8 Integration with other systems It is imperative to migrate software through different systems like moving from legacy systems to current technology 8 Security Use of antivirus software, firewalls, and regular backup are mandatory 8 Accessibility Users and other devices need to find it easy to operate the software 8 Scalability The software should operate effectively regardless of many users or activities 8 Software Application Recommendation Recommended Software Application Description Benefits Aggregate Selection Criteria Score Microsoft Develop operating systems and different types of applications Widely used hence affordable 8 IBM Develop server systems as well as hardware. Secure to use 6
  • 11. Software Application Vendor Selection Criteria Selection Criteria Name Selection Criteria Description Selection Criteria Value (Weighting in Points) Reliability Vendor must be reliable in terms of service delivery. They must be available to fix any form of downtime as well as provide risk mitigation guidelines 8 Certification A vendor must be must be a member of a certified by a professional body to offer cloud services 6 Software Application Recommended Vendors Vendor Name Vendor Strengths Vendor Weaknesses Products/Services Provided to Project Aggregate Selection Criteria Score Microsoft Widely used hence compatible with many applications Easily attacked by hackers Operating systems and applications 8 IBM Secure in terms of security Expensive Operating systems and applications 6 Software Application Deployment Challenges Deployment Challenge Deployment Challenge Description Compatibility Sometime a software can fail to integrate with some systems
  • 12. within the organization forcing the organization to buy new equipment. Cost Some software are very expensive to buy as well as maintain Data migration Issues like confusion and data loss can occur in the system Time Amount of time taken to ensure software applications operate gets affected Technology Adoption Methods Method Name Method Description Strategic planning method Involve developing a technique to implement the technology, it also comprise measuring its progress and take needed corrective actions. This happens through the entire process of adoption. Collaborative approach This comprise involving intended users to help in identifying needs, goals, capacity and alignment. An investment of time and energy in the planning discussion encourages investment in the overall process which can ultimately promote the success of adoption. Cost/Benefit Considerations Benefits Costs Considerations Indirect indirect Adopt Intangible Intangible AdoptCloud Services Recommendations Cloud Services Selection Criteria Selection Criteria Name
  • 13. Selection Criteria Description Selection Criteria Value (Weighting in Points) Cost Services should be affordable in terms installation as well as cost as well as maintenance. 6 Bandwidth Should have strong bandwidth to run any service that organization intend to run. 8 Cloud Services Recommendation Recommended Cloud Services Description Benefits Aggregate Selection Criteria Score Amazon Web Services Help businesses manage challenges and meet their organizational goals. It offers tools that support all industries. Easy to use and adopt 6 Microsoft Azure Widely used and offer wide range of services. Easy few resources to roll out 4 Cloud Services Vendor Selection Criteria Selection Criteria Name Selection Criteria Description Selection Criteria Value (Weighting in Points) Reliability Vendor must be reliable in terms of service delivery. They must be available to fix any form of downtime as well as provide risk mitigation guidelines 5 Certification
  • 14. A vendor must be must be a member of a certified by a professional body to offer cloud services 6 Cloud Services Recommended Vendors Vendor Name Vendor Strengths Vendor Weaknesses Products/Services Provided to Project Aggregate Selection Criteria Score Amazon Web Services Easy to use and adopt High technical support fee IaaS PaaS SaaS 6 Microsoft Azure Easy to use Expensive IaaS PaaS SaaS 4 Cloud Services Deployment Challenges Deployment Challenge Deployment Challenge Description Multi-cloud Once application is designed for distributed deployment in multiple regions, it works in multi-cloud environment unless cloud specific services are used. However, application delivery comes as challenge. Distributed Infrastructure From monitoring point of view, some running machines may
  • 15. easily be hidden in a different region and keep contributing to the bill. From application point of view, cloud services needs a different design. When companies try to port traditional application to cloud, the efficiency doesn’t increase. Technology Adoption Methods Method Name Method Description Strategic planning method Involve developing a technique to implement the technology, it also comprise measuring its progress and take needed corrective actions. This happens through the entire process of adoption. Collaborative approach This comprise involving intended users to help in identifying needs, goals, capacity and alignment. An investment of time and energy in the planning discussion encourages investment in the overall process which can ultimately promote the success of adoption. Cost/Benefit Considerations Benefits Costs Considerations Intangible Indirect Adopt Direct Intangible Adopt References Vera
  • 16. Solution s. (2019). 10 Criteria To Evaluate When Choosing A New Technology. Retrieved 13 December 2021 from https://www.verasolutions.org/10-criteria-to-evaluate-when- choosing-a-new-technology/?locale=en. Copyright 2020 by University of Phoenix. All rights reserved. Copyright 2020 by University of Phoenix. All rights reserved. BSA/425 v 1.3 Copyright 20 20 by University of Phoenix. All rights reserved.
  • 17. Project Plan Draft Fill out each of the sections below with information relevant to your project. Be sure to include the company name associated with your project. Company Name : Techlynk Limited Network Technology Recommendations Network Technology Selection Criteria Selection Criteria Name Selection Criteria Description Selection Criteria Value (Weighting i n Points)
  • 18. Ease of use Technology should be easy to use for all users without any training involved. 6 Cost It should be affordable to procure and maintain the technology. 8 Reliability The network should always work regardless of any failure. All nodes should support each other. 7 Feasibility
  • 19. The broadband should be affordable based on capital and operational costs 8 Accessibility Ensure the network provides different paths so that all nodes get connected 7 Cyber security This ensures detection and protection from data breaches, virus, or malware attacks 8 Network
  • 20. Technology Recommendation Recommended Network Technologies Description Benefits Aggregate Selection Criteria Score BSA/425 v1.3 Copyright 2020 by University of Phoenix. All rights reserved. Project Plan Draft Fill out each of the sections below with information relevant to your project. Be sure to include the company name associated with your project. Company Name: Techlynk Limited Network Technology Recommendations
  • 21. Network Technology Selection Criteria Selection Criteria Name Selection Criteria Description Selection Criteria Value (Weighting in Points) Ease of use Technology should be easy to use for all users without any training involved. 6 Cost It should be affordable to procure and maintain the technology. 8 Reliability The network should always work regardless of any failure. All nodes should support each other. 7 Feasibility The broadband should be affordable based on capital and operational costs 8 Accessibility Ensure the network provides different paths so that all nodes get connected 7 Cyber security
  • 22. This ensures detection and protection from data breaches, virus, or malware attacks 8 Network Technology Recommendation Recommended Network Technologies Description Benefits Aggregate Selection Criteria Score Select 5 of the following questions (20% each). Answer in complete sentences. Use concise, accurate writing to explain your answers. Use a separate sheet(s) of paper for your answers. Make sure to number your answers. Briefly describe the primary components of monetary policy and what tools are available to manipulate portions of the macroeconomy. Briefly describe the primary components of fiscal policy. Provide three examples of fiscal policy and its influence on the
  • 23. macroeconomy. Explain the concept of “crowding out” and how that can negatively affect the U.S. economy in the future. Make sure to include the role of government expenditures and investments in your explanation. How does the large size of the U.S. governmental deficit and overall debt present a macroeconomic challenge in the upcoming years? Provide three examples of tough choices in the near future. How does velocity have a role in the overall performance of an economy? Make sure to include the role of the money multiplier effect in your explanation. What are the advantages and disadvantages of a strong dollar and a weak dollar? Make sure to cite the proportion of the US import-export variables in relation to its overall GDP in your explanation.
  • 24. How are “stickiness” and Keynesianism related? Cite several examples that explain the connection. Also, make sure to explain how conditions may either be similar or different from the days of Keynes to our present-day challenges. BSA/425 v1.3 Project Plan Draft BSA/425 v1.3 Page 12 of 12 Project Plan Draft Fill out each of the sections below with information relevant to your project. Be sure to include the company name associated with your project. Company Name: Techlynk LimitedNetwork Technology Recommendations Network Technology Selection Criteria Selection Criteria Name Selection Criteria Description Selection Criteria Value (Weighting in Points) Ease of use Technology should be easy to use for all users without any training involved.
  • 25. 6 Cost It should be affordable to procure and maintain the technology. 8 Reliability The network should always work regardless of any failure. All nodes should support each other. 7 Feasibility The broadband should be affordable based on capital and operational costs 8 Accessibility Ensure the network provides different paths so that all nodes get connected 7 Cyber security This ensures detection and protection from data breaches, virus, or malware attacks 8 Network Technology Recommendation Recommended Network Technologies Description Benefits
  • 26. Aggregate Selection Criteria Score Local area network (LAN Local area networks connect groups of computers and low - voltage devices over short distances (within a building or between a group of two or three buildings very close to each other) to share information and resources. Businesses generally manage and maintain local networks. Through the use of routers, LANs can connect to wide area networks (WANs, explained below) to transfer data quickly and securely. Most local area networks have a router that connects to the internet. So being on such a local area network, you can communicate with other devices on your network and are protected from internet-based sniffing and monitoring software (i.e. things on the internet can’t see your internal traffic between devices). And yet, you still have the ability to go out to the internet by simply entering an internet IP address in your browser’s URL field. 7 Wireless local area network (WLAN) WLANs use wireless network technology, such as Wi-Fi. Generally seen in the same types of applications as local area networks, these types of networks do not require devices to rely on physical cables to connect to the network. You can access network resources from any location within the wireless network's coverage area. Wireless access to the
  • 27. Internet and to company resources help your staff be more productive and collaborative. You don't have to string cables, as you do with wired networks. Installation can be quick and cost-effective. You can easily expand WLANs where and as needed, because no wires are involved. 8 Network Technology Vendor Selection Criteria Selection Criteria Name Selection Criteria Description Selection Criteria Value (Weighting in Points) Quality of Product or Service They must provide high quality services to meet organization goals. Services provided must meet the required market standards. 6 Price Services must be affordable to the organization i.e. must be within the organization budget. 6 Network Technology Recommended Vendors Vendor Name Vendor Strengths
  • 28. Vendor Weaknesses Products/Services Provided to Project Aggregate Selection Criteria Score Cisco Cisco maintains a strong lead in nearly every networking hardware category Their gadgets are expensive Video conferencing, network gadgets, switch, routers 6 Arista Arista also recognizes the importance of diversification. They now offer network monitoring, automation, and analytics for hybrid cloud environments. Arista appears weaker in areas of SD-WAN and security, which could affect their future agility. They now offer network monitoring, automation, and analytics for hybrid cloud environments. 4 Network Technology Deployment Challenges Deployment Challenge Deployment Challenge Description Infrastructure Some of network technology is not compatible with some gadgets
  • 29. Cost It is very expensive to buy some of network technology Usability The issue can cause network problems when users do not get expected outcomes Poor network performance It limits productivity and does not offer full robust network output Installation and configuration management Settings can get performed in methods that are not required and cause improper actions Connectivity Issues can develop when there is no connection to the internet to produce network services Scalability The network can have issues when attempting to grow it or increase productivity Accessibility Inability to connect to servers and internet access produces network issues Security Issues like phishing, viruses, malware, or rogue usage causes problems Resiliency Problems due to limited ability to recover of network problems
  • 30. Integration Problems when attempting to connect networks to new systems Technology Adoption Methods Method Name Method Description Strategic planning method Involve developing a technique to implement the technology, it also comprise measuring its progress and take needed corrective actions. This happens through the entire process of adoption. Collaborative approach This comprise involving intended users to help in identifying needs, goals, capacity and alignment. An investment of time and energy in the planning discussion encourages investment in the overall process which can ultimately promote the success of adoption. Cost/Benefit Considerations Benefits Costs Considerations Indirect Indirect Adopt Intangible
  • 31. Intangible AdoptDatabase System Recommendation Database System Selection Criteria Selection Criteria Name Selection Criteria Description Selection Criteria Value (Weighting in Points) Performance For the kinds of operations, the volume of data, numbers of concurrent user sessions, and transaction rate (if applicable) that my application will need to perform, can this DBMS meet organization required SLAs? 5 Philosophy Does the design of the DBMS, its record types, how it handles scaling (up or out), how it handles multiple user access to the same data, schema versus schema-less, etc. match how my applications will need to use it? 5 Database System Recommendation Recommended Database System Description Benefits Aggregate Selection Criteria Score Oracle
  • 32. It’s powerful but complex. New users will want to invest in solid training to ensure they’re getting the most from the software. Very secure 8 MySQL MySQL powers commercial websites by the hundreds of thousands, and it also serves as the backend for a huge number of internal enterprise applications. Open-source hence can be improved in terms of design and security by different developers 6 Database System Vendor Selection Criteria Selection Criteria Name Selection Criteria Description Selection Criteria Value (Weighting in Points) Reliability Vendor must be reliable in terms of service delivery. They must be available to fix any form of downtime as well as provide risk mitigation guidelines 8 Certification A vendor must be must be a member of a certified by a professional body to offer cloud services
  • 33. 8 Hosted solutions Picking a suitable vendor who offers cloud-based solutions saves of productivity 8 Cost Database costs depending on solutions offered is critical 8 Scalability The database provider should offer a reliable method of adding or removing database resources as required 8 Security The vendor should constantly perform security checks to determine database reliability 8 Accuracy All data values must get stored correctly to increase reliable management 8 Flexibility There should be constant working of the database without external productivity issues 8
  • 34. Database System Recommended Vendors Vendor Name Vendor Strengths Vendor Weaknesses Products/Services Provided to Project Aggregate Selection Criteria Score Oracle One can temporarily block all damages from an ally Poor navigation makes it harder to move around in the database. Database 6 MySQL Easy to use Open-source hence can be easily manipulated Database 5 Database System Deployment Challenges Deployment Challenge Deployment Challenge Description Integration Some database system only work with specific gadgets hence hard to install Cost It is costly in terms of installation as well as maintenance to
  • 35. deploy database systems Security/vulnerabilities Installation of antivirus and penetration testing are crucial to promote productivity Resource utilization Problems occur due to increase in data volumes and unreliable storage spaces Data migration Finding an accurate method of connecting different data sources can create issues High availability The database can have issues and prevent user access Technology Adoption Methods Method Name Method Description Strategic planning method Involve developing a technique to implement the technology, it also comprise measuring its progress and take needed corrective actions. This happens through the entire process of adoption. Collaborative approach This comprise involving intended users to help in identifying needs, goals, capacity and alignment. An investment of time and energy in the planning discussion encourages investment in the overall process which can ultimately promote the success of
  • 36. adoption. Cost/Benefit Considerations Benefits Costs Considerations Indirect Opportunity Adopt Intangible Intangible AdoptSoftware Application Recommendations Software Application Selection Criteria Selection Criteria Name Selection Criteria Description Selection Criteria Value (Weighting in Points) Compatibility If the software needs to operate with a certain device (card reader, high capacity storage device, printer video camera) will you have to buy new devices? Are you dependent on the devices you have on the system that may be obsolete and unsupported by the new software when the software supplier upgrades the program? 8 Cost
  • 37. Is it a buy-once and forget about it? Or is it a subscription service? Are there additional costs to make it work on your system? 8 Usability The software should not require too many settings to ensure users understand its operation 8 Integration with other systems It is imperative to migrate software through different systems like moving from legacy systems to current technology 8 Security Use of antivirus software, firewalls, and regular backup are mandatory 8 Accessibility Users and other devices need to find it easy to operate the software 8 Scalability The software should operate effectively regardless of many users or activities 8
  • 38. Software Application Recommendation Recommended Software Application Description Benefits Aggregate Selection Criteria Score Microsoft Develop operating systems and different types of applications Widely used hence affordable 8 IBM Develop server systems as well as hardware. Secure to use 6 Software Application Vendor Selection Criteria Selection Criteria Name Selection Criteria Description Selection Criteria Value (Weighting in Points) Reliability Vendor must be reliable in terms of service delivery. They must be available to fix any form of downtime as well as provide risk mitigation guidelines 8 Certification A vendor must be must be a member of a certified by a
  • 39. professional body to offer cloud services 6 Software Application Recommended Vendors Vendor Name Vendor Strengths Vendor Weaknesses Products/Services Provided to Project Aggregate Selection Criteria Score Microsoft Widely used hence compatible with many applications Easily attacked by hackers Operating systems and applications 8 IBM Secure in terms of security Expensive Operating systems and applications 6 Software Application Deployment Challenges Deployment Challenge Deployment Challenge Description Compatibility Sometime a software can fail to integrate with some systems
  • 40. within the organization forcing the organization to buy new equipment. Cost Some software are very expensive to buy as well as maintain Data migration Issues like confusion and data loss can occur in the system Time Amount of time taken to ensure software applications operate gets affected Technology Adoption Methods Method Name Method Description Strategic planning method Involve developing a technique to implement the technology, it also comprise measuring its progress and take needed corrective actions. This happens through the entire process of adoption. Collaborative approach This comprise involving intended users to help in identifying needs, goals, capacity and alignment. An investment of time and energy in the planning discussion encourages investment in the overall process which can ultimately promote the success of adoption. Cost/Benefit Considerations
  • 41. Benefits Costs Considerations Indirect indirect Adopt Intangible Intangible AdoptCloud Services Recommendations Cloud Services Selection Criteria Selection Criteria Name Selection Criteria Description Selection Criteria Value (Weighting in Points) Cost Services should be affordable in terms installation as well as cost as well as maintenance. 6 Bandwidth Should have strong bandwidth to run any service that organization intend to run. 8 Cloud Services Recommendation Recommended Cloud Services Description
  • 42. Benefits Aggregate Selection Criteria Score Amazon Web Services Help businesses manage challenges and meet their organizational goals. It offers tools that support all industries. Easy to use and adopt 6 Microsoft Azure Widely used and offer wide range of services. Easy few resources to roll out 4 Cloud Services Vendor Selection Criteria Selection Criteria Name Selection Criteria Description Selection Criteria Value (Weighting in Points) Reliability Vendor must be reliable in terms of service delivery. They must be available to fix any form of downtime as well as provide risk mitigation guidelines 5 Certification A vendor must be must be a member of a certified by a professional body to offer cloud services 6
  • 43. Cloud Services Recommended Vendors Vendor Name Vendor Strengths Vendor Weaknesses Products/Services Provided to Project Aggregate Selection Criteria Score Amazon Web Services Easy to use and adopt High technical support fee IaaS PaaS SaaS 6 Microsoft Azure Easy to use Expensive IaaS PaaS SaaS 4 Cloud Services Deployment Challenges Deployment Challenge
  • 44. Deployment Challenge Description Multi-cloud Once application is designed for distributed deployment in multiple regions, it works in multi-cloud environment unless cloud specific services are used. However, application delivery comes as challenge. Distributed Infrastructure From monitoring point of view, some running machines may easily be hidden in a different region and keep contributing to the bill. From application point of view, cloud services needs a different design. When companies try to port traditional application to cloud, the efficiency doesn’t increase. Technology Adoption Methods Method Name Method Description Strategic planning method Involve developing a technique to implement the technology, it also comprise measuring its progress and take needed corrective actions. This happens through the entire process of adoption. Collaborative approach This comprise involving intended users to help in identifying needs, goals, capacity and alignment. An investment of time and energy in the planning discussion encourages investment in the overall process which can ultimately promote the success of