SlideShare a Scribd company logo
1 of 16
BSA/425 v1.3
Supporting Research Report
BSA/425 v1.3
Page 2 of 2
Supporting Research Report
Fill out each section with information relevant to your project.
Be sure to include the name and purpose of your project.
Supporting Research Report for:
Project name:
Purpose of project:
· Executive Summary
· Industry Background
· Technology Trends
· Project Approach
· Selected Vendors
· Alternative Approach
· Impact Analysis
· Cost-Benefit Analysis
· Financial Analysis
· Risk Analysis
Copyright 2020 by University of Phoenix. All rights reserved.
Copyright 2020 by University of Phoenix. All rights reserved.
BSA/425 v1.3
Project Plan Draft
BSA/425 v1.3
Page 11 of 11
Project Plan Draft
Fill out each of the sections below with information relevant to
your project. Be sure to include the company name associated
with your project.
Lowkey IncNetwork Technology Recommendations
Network Technology Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Wide Area Network
This ty0pe of network connects computers within a long
distance
10
Accessibility
The system should be easily accessible to users
20
security
The technology’s integrity should not be interfered with by
hackers and malicious parties
30
Compatibility
It should be compatible with all the information resources that
the firm uses.
20
Network Technology Recommendation
Recommended Network Technologies
Description
Benefits
Aggregate Selection Criteria Score
Emails
Promotes communication cross different parties
Facilitates communication with customers
40
Firewalls
This resource safeguards the firm’s network from unauthorized
access and disruptions
Prevents fraudulent activities
20
Artificial Intelligence
Enhances the efficiency of the network
Integrates the services and key procedures, thus improving
changes adopted
20
Internetworking tools
Promotes integrated communication to attain networking goals
Increases the efficiency of communication
20
Network Technology Vendor Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Price
The cost of purchasing the network infrastructures
20
Quality
The efficiency and effectiveness of the technologies in attaining
their goals
40
Proximity
Physical distance from the firm
20
After Sales Service
The services provided by the firm following the purchase of the
systems
20
Network Technology Recommended Vendors
Vendor Name
Vendor Strengths
Vendor Weaknesses
Products/Services Provided to Project
Aggregate Selection Criteria Score
Cisco
Cost-efficient and responsive customer care
Highly responsive
Encryption can safeguard the network against interceptions
50
Alloys
Fast network connectivity
Network fluctuates
They can offer heavy network
30
Oracle
Low cost
Highly expensive
Provides a repair and maintenance software
20
Network Technology Deployment Challenges
Deployment Challenge
Deployment Challenge Description
Deployment of physical over logical controls
Physical network appliances are linked using protocols while in
logical networks, there is utilization of different traffics that are
agnostic to physical
Scalable deployments
The networks should be both automatic and scalable
High costs
High deployment costs is a challenge
Inaccessibility
Insufficient accessibility approach is a major problem
Technology Adoption Methods
Method Name
Method Description
Parallel Approach
The adoption occurs when the new system is introduced while
the old one is still in use
Phased
Gradually replacing small parts of the old system with the new
one until it is fully implemented
Piloting
Using a small group of users to test the new system before it is
widely adopted
Direct Adoption
Implementing a new system radically
Cost/Benefit Considerations
Benefits
Costs
Considerations
Increased efficiency
Personnel
Hiring the most qualified pool of IT professionals
Flexibility
Organizational expenses
Training employees to adapt to the new technology
Cost cutting
Cost of tools
Seek the vendors who provide cost-effective and quality
hardware and software technologies
Access and availability
Maintenance costs
Repair and maintenance must be done regularlyDatabase System
Recommendation
Database System Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Operational consideration
Ability to manage failure recovery and maintain availability
30
Security
The database’s integrity should not be tampered with
20
Development consideration
The openness of the support options
20
Commercial consideration
Its potential commercial importance and benefits
20
Database System Recommendation
Recommended Database System
Description
Benefits
Aggregate Selection Criteria Score
Relational database management system
Comprises multiple tables of data with rows and columns that
relate to each other
These databases are more flexible
40
Hierarchical database systems
This model resembles a tree structure, with pre-defined
relationships
Requires users to pass hierarchies to access the required data,
hence secure
10
Network database systems
Supports many to many relationships
Can promote integration of systems
40
Object-oriented database systems
Information is represented as objects
Supports different forms of programming
10
Database System Vendor Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Usability
User friendliness and ease of use
30
Visualization and reporting
Ease of visually analyzing and displaying data and results
20
Security
Ability to be stored securely
10
Functionality
Ability to meet business requirements
40
Database System Recommended Vendors
Vendor Name
Vendor Strengths
Vendor Weaknesses
Products/Services Provided to Project
Aggregate Selection Criteria Score
Oracle
Has syntax enhancements and performance improvements
expensive
Multitenancy, database in-memory, and database Sharding
30
Microsoft
Ease of use and high availability
Challenges in seamlessly integrating high volumes of corporate
data
SQL Server
30
IBM
Can accommodate big data
Expensive
IDM DB2
20
Knack
Provides many tools for online databases
It is highly customized
Knack
20
Database System Deployment Challenges
Deployment Challenge
Deployment Challenge Description
Data security
The organization may lack resources for securing its database
Performance
The database may have harsh performance criteria
Resource utilization
The database may not have the best hardware available to run
on
High availability
In case the single server goes down, the firm’s operations are
paralyzed
Technology Adoption Methods
Method Name
Method Description
Method Name
Method Description
Parallel Approach
The adoption occurs when the new system is introduced while
the old one is still in use
Phased
Gradually replacing small parts of the old system with the new
one until it is fully implemented
Piloting
Using a small group of users to test the new system before it is
widely adopted
Direct Adoption
Implementing a new system radically
Cost/Benefit Considerations
Benefits
Costs
Considerations
Increased efficiency
Personnel
Hiring the most qualified pool of IT professionals
Flexibility
Organizational expenses
Training employees to adapt to the new technology
Cost cutting
Cost of tools
Seek the vendors who provide cost-effective and quality
hardware and software technologies
Access and availability
Maintenance costs
Repair and maintenance must be done regularlySoftware
Application Recommendations
Software Application Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Suitability
Ability to provide appropriate set of functions
40
Accuracy
Ability to provide the right or agreed results
20
Interoperability
Ability to interact with one or more specified systems
20
Security
Ability to provide mechanisms to prevent the accidental or
deliberate interference with integrity
20
Software Application Recommendation
Recommended Software Application
Description
Benefits
Aggregate Selection Criteria Score
ERP
Integrated software for managing and coordinating all the
business activities
It provides real-time standardization and streamlining of
business processes.
30
Office production software
Producing and compiling information, such as documents and
reports
Reduces and heaps of paperwork
30
CRM
Facilitates interactions with customers
Can be used to analyze customer trends and preferences
20
MIS
Facilitates gathering, analyzing, and disseminated data for
organizational operations
Informs company decision-making
20
Software Application Vendor Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Rates
The vendors should not be too expensive
20
Main areas of expertise
Relevance of the software to the business functions
20
Certification
Must have local and international certification
20
Security
Should have an information security plan
20
Software Application Recommended Vendors
Vendor Name
Vendor Strengths
Vendor Weaknesses
Products/Services Provided to Project
Aggregate Selection Criteria Score
Microsoft
Can customize to the business’s needs
costly
Microsoft Office
20
IBM
They install and configure them for firms
Scalability and integration challenges
Sterling Order Management
20
Oracle
Portability
Expensive
Oracle CRM
30
SAP
Multiple database support
Very complex to use
SAP ERP
20
Software Application Deployment Challenges
Deployment Challenge
Deployment Challenge Description
Misaligned expectations
Project teams and stakeholders may differ on the needs and
requirements of the software
Data integrity
Lack of an effective strategy for securing data
Insufficient training tools
Employees maybe insufficiently prepared tom operate the
software
Testing problems
Lack of a testing and maintenance tool
Technology Adoption Methods
Method Name
Method Description
Parallel Approach
The adoption occurs when the new system is introduced while
the old one is still in use
Phased
Gradually replacing small parts of the old system with the new
one until it is fully implemented
Piloting
Using a small group of users to test the new system before it is
widely adopted
Direct Adoption
Implementing a new system radically
Cost/Benefit Considerations
Benefits
Costs
Considerations
Increased efficiency
Personnel
Hiring the most qualified pool of IT professionals
Flexibility
Organizational expenses
Training employees to adapt to the new technology
Cost cutting
Cost of tools
Seek the vendors who provide cost-effective and quality
hardware and software technologies
Access and availability
Maintenance costs
Repair and maintenance must be done regularlyCloud Services
Recommendations
Cloud Services Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Compliance with standards
Compliance with government and professional regulations
30
Service roadmap
Current goals and objectives of the vendors
40
Terms of service
If they do not have tough terms and conditions
10
Data security
Ability to secure the data
20
Cloud Services Recommendation
Recommended Cloud Services
Description
Benefits
Aggregate Selection Criteria Score
Amazon
Provides additional services, such as storage and security
Support users to integrate with business
20
Google Cloud
Can provide free packages
Supports all organizational functions
20
IBM
Fast response to customer enquiries
Can provide platform as a service
40
Adobe
Ideal for supporting publishing and editing
it is a creative cloud system
20
Cloud Services Recommended Vendors
Vendor Name
Vendor Strengths
Vendor Weaknesses
Products/Services Provided to Project
Aggregate Selection Criteria Score
Amazon
Provides additional services, such as storage and security
Cannot be customized
Amazon Cloud
30
Google Cloud
Can provide free packages
Slow responsiveness to customer inquiries
Google Cloud
20
IBM
Fast response to customer enquiries
Expensive
IBM Cloud
30
Adobe
Ideal for supporting publishing and editing
Only ideal for media and publishing
Adobe
20
Cloud Services Deployment Challenges
Deployment Challenge
Deployment Challenge Description
Data security
Increased incidences of hacking of cloud resources
Performance issues
Disruptions from vendors due to maintenance
Availability problems
Lack of availability of services when technical issues emerge
Data safety
Data may be affected when the computer systems are infected
by viruses
Technology Adoption Methods
Method Name
Method Description
Parallel Approach
The adoption occurs when the new system is introduced while
the old one is still in use
Phased
Gradually replacing small parts of the old system with the new
one until it is fully implemented
Piloting
Using a small group of users to test the new system before it is
widely adopted
Direct Adoption
Implementing a new system radically
Cost/Benefit Considerations
Benefits
Costs
Considerations
Increase in efficiency
$4000
Installing efficient and state-of-the art hardware and software
resources to speed up business transactions
Reduction in costs
$3000
Eliminating heaps of paperwork
Hiring more staff
$10000
Individuals who will operate or control the cloud resources
Purchasing more computer resources
$5000
Devices should be purchased to support the running of the cloud
computing system
Copyright 2020 by University of Phoenix. All rights reserved.
Copyright 2020 by University of Phoenix. All rights reserved.

More Related Content

Similar to BSA425 v1.3Supporting Research ReportBSA425 v1.3Page 2 of

Similar to BSA425 v1.3Supporting Research ReportBSA425 v1.3Page 2 of (20)

Keeping the World Connected with CompTIA Network+
Keeping the World Connected with CompTIA Network+Keeping the World Connected with CompTIA Network+
Keeping the World Connected with CompTIA Network+
 
Integrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk ManagementIntegrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk Management
 
Integrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk ManagementIntegrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk Management
 
Forecast 2014: SaaS Data Exchange
Forecast 2014: SaaS Data ExchangeForecast 2014: SaaS Data Exchange
Forecast 2014: SaaS Data Exchange
 
Yongsan presentation 3
Yongsan presentation 3Yongsan presentation 3
Yongsan presentation 3
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0
 
Best Practices for Building Scalable Visibility Architectures
Best Practices for Building Scalable Visibility ArchitecturesBest Practices for Building Scalable Visibility Architectures
Best Practices for Building Scalable Visibility Architectures
 
Presentation: To an efficient tool for securing the card data on the Cloud: C...
Presentation: To an efficient tool for securing the card data on the Cloud: C...Presentation: To an efficient tool for securing the card data on the Cloud: C...
Presentation: To an efficient tool for securing the card data on the Cloud: C...
 
Forecast 2014: Welcome to the ODCA University - School is Way Cool!
Forecast 2014: Welcome to the ODCA University - School is Way Cool!Forecast 2014: Welcome to the ODCA University - School is Way Cool!
Forecast 2014: Welcome to the ODCA University - School is Way Cool!
 
Cloud Computing - A Primer
Cloud Computing - A PrimerCloud Computing - A Primer
Cloud Computing - A Primer
 
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessMoving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
 
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...
 
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
 
ch10.pptx
ch10.pptxch10.pptx
ch10.pptx
 
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & BarcoMongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
 
Latest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and PrivacyLatest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and Privacy
 
Bringing the Cloud Back to Earth
Bringing the Cloud Back to EarthBringing the Cloud Back to Earth
Bringing the Cloud Back to Earth
 
talk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptxtalk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptx
 
Keod '19 - Validation and Recommendation Engine from Service Architecture and...
Keod '19 - Validation and Recommendation Engine from Service Architecture and...Keod '19 - Validation and Recommendation Engine from Service Architecture and...
Keod '19 - Validation and Recommendation Engine from Service Architecture and...
 
How to Use Open Source Technologies in Safety-critical Digital Health Applica...
How to Use Open Source Technologies in Safety-critical Digital Health Applica...How to Use Open Source Technologies in Safety-critical Digital Health Applica...
How to Use Open Source Technologies in Safety-critical Digital Health Applica...
 

More from VannaSchrader3

topic Errors (medication or patient injury)in particular stra.docx
topic Errors (medication or patient injury)in particular stra.docxtopic Errors (medication or patient injury)in particular stra.docx
topic Errors (medication or patient injury)in particular stra.docx
VannaSchrader3
 

More from VannaSchrader3 (20)

Topic that identifies characteristics of Native American Culture and.docx
Topic that identifies characteristics of Native American Culture and.docxTopic that identifies characteristics of Native American Culture and.docx
Topic that identifies characteristics of Native American Culture and.docx
 
Topic Stem Cell ResearchAPA Format I need these topics. don.docx
Topic Stem Cell ResearchAPA Format I need these topics. don.docxTopic Stem Cell ResearchAPA Format I need these topics. don.docx
Topic Stem Cell ResearchAPA Format I need these topics. don.docx
 
Topic Styles of PolicingYou are a patrol officer in a middle- to .docx
Topic Styles of PolicingYou are a patrol officer in a middle- to .docxTopic Styles of PolicingYou are a patrol officer in a middle- to .docx
Topic Styles of PolicingYou are a patrol officer in a middle- to .docx
 
Topic the legalization of same sex adoptionThese same sex adopti.docx
Topic the legalization of same sex adoptionThese same sex adopti.docxTopic the legalization of same sex adoptionThese same sex adopti.docx
Topic the legalization of same sex adoptionThese same sex adopti.docx
 
TOPIC The Truth About Caffeine3 pages,give some statistics of neg.docx
TOPIC The Truth About Caffeine3 pages,give some statistics of neg.docxTOPIC The Truth About Caffeine3 pages,give some statistics of neg.docx
TOPIC The Truth About Caffeine3 pages,give some statistics of neg.docx
 
Topic Media Example (article)1) as usual, do an analysis of the.docx
Topic Media Example (article)1) as usual, do an analysis of the.docxTopic Media Example (article)1) as usual, do an analysis of the.docx
Topic Media Example (article)1) as usual, do an analysis of the.docx
 
Topic Servant LeadershipThread In our reading we explored th.docx
Topic Servant LeadershipThread In our reading we explored th.docxTopic Servant LeadershipThread In our reading we explored th.docx
Topic Servant LeadershipThread In our reading we explored th.docx
 
Topic Organization of Law Enforcement AgenciesDo you agree or d.docx
Topic Organization of Law Enforcement AgenciesDo you agree or d.docxTopic Organization of Law Enforcement AgenciesDo you agree or d.docx
Topic Organization of Law Enforcement AgenciesDo you agree or d.docx
 
Topic Parents Should have a license to have childrenaprox. 500 wo.docx
Topic Parents Should have a license to have childrenaprox. 500 wo.docxTopic Parents Should have a license to have childrenaprox. 500 wo.docx
Topic Parents Should have a license to have childrenaprox. 500 wo.docx
 
Topic PATIENT DATA PRIVACYPerformance Improvement plan Proper an.docx
Topic PATIENT DATA PRIVACYPerformance Improvement plan Proper an.docxTopic PATIENT DATA PRIVACYPerformance Improvement plan Proper an.docx
Topic PATIENT DATA PRIVACYPerformance Improvement plan Proper an.docx
 
Topic Kelly’s Personal ConstructsQuestionPrompt  Analyze th.docx
Topic Kelly’s Personal ConstructsQuestionPrompt  Analyze th.docxTopic Kelly’s Personal ConstructsQuestionPrompt  Analyze th.docx
Topic Kelly’s Personal ConstructsQuestionPrompt  Analyze th.docx
 
Topic Fingerprints.Study fingerprinting in the textbook and res.docx
Topic Fingerprints.Study fingerprinting in the textbook and res.docxTopic Fingerprints.Study fingerprinting in the textbook and res.docx
Topic Fingerprints.Study fingerprinting in the textbook and res.docx
 
Topic is Domestic Violence, Both men and women being the abus.docx
Topic is Domestic Violence, Both men and women being the abus.docxTopic is Domestic Violence, Both men and women being the abus.docx
Topic is Domestic Violence, Both men and women being the abus.docx
 
Topic is regional integration .First You need to find article and re.docx
Topic is regional integration .First You need to find article and re.docxTopic is regional integration .First You need to find article and re.docx
Topic is regional integration .First You need to find article and re.docx
 
Topic Human Trafficking in relation to US Border and Coastal securi.docx
Topic Human Trafficking in relation to US Border and Coastal securi.docxTopic Human Trafficking in relation to US Border and Coastal securi.docx
Topic Human Trafficking in relation to US Border and Coastal securi.docx
 
Topic is AutonomyShort papers should use double spacing, 12-point .docx
Topic is AutonomyShort papers should use double spacing, 12-point .docxTopic is AutonomyShort papers should use double spacing, 12-point .docx
Topic is AutonomyShort papers should use double spacing, 12-point .docx
 
Topic Genetic connection of hypertension to cardiovascular disease .docx
Topic Genetic connection of hypertension to cardiovascular disease .docxTopic Genetic connection of hypertension to cardiovascular disease .docx
Topic Genetic connection of hypertension to cardiovascular disease .docx
 
topic Errors (medication or patient injury)in particular stra.docx
topic Errors (medication or patient injury)in particular stra.docxtopic Errors (medication or patient injury)in particular stra.docx
topic Errors (medication or patient injury)in particular stra.docx
 
Topic differences between folk guitar and classic guitar.Minimu.docx
Topic differences between folk guitar and classic guitar.Minimu.docxTopic differences between folk guitar and classic guitar.Minimu.docx
Topic differences between folk guitar and classic guitar.Minimu.docx
 
Topic Death Investigations. Review homicide investigation as de.docx
Topic Death Investigations. Review homicide investigation as de.docxTopic Death Investigations. Review homicide investigation as de.docx
Topic Death Investigations. Review homicide investigation as de.docx
 

Recently uploaded

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Recently uploaded (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 

BSA425 v1.3Supporting Research ReportBSA425 v1.3Page 2 of

  • 1. BSA/425 v1.3 Supporting Research Report BSA/425 v1.3 Page 2 of 2 Supporting Research Report Fill out each section with information relevant to your project. Be sure to include the name and purpose of your project. Supporting Research Report for: Project name: Purpose of project: · Executive Summary · Industry Background · Technology Trends · Project Approach · Selected Vendors · Alternative Approach · Impact Analysis · Cost-Benefit Analysis · Financial Analysis · Risk Analysis Copyright 2020 by University of Phoenix. All rights reserved. Copyright 2020 by University of Phoenix. All rights reserved. BSA/425 v1.3 Project Plan Draft BSA/425 v1.3 Page 11 of 11 Project Plan Draft Fill out each of the sections below with information relevant to your project. Be sure to include the company name associated with your project. Lowkey IncNetwork Technology Recommendations
  • 2. Network Technology Selection Criteria Selection Criteria Name Selection Criteria Description Selection Criteria Value (Weighting in Points) Wide Area Network This ty0pe of network connects computers within a long distance 10 Accessibility The system should be easily accessible to users 20 security The technology’s integrity should not be interfered with by hackers and malicious parties 30 Compatibility It should be compatible with all the information resources that the firm uses. 20 Network Technology Recommendation Recommended Network Technologies Description Benefits Aggregate Selection Criteria Score Emails Promotes communication cross different parties Facilitates communication with customers 40 Firewalls This resource safeguards the firm’s network from unauthorized access and disruptions Prevents fraudulent activities 20 Artificial Intelligence Enhances the efficiency of the network
  • 3. Integrates the services and key procedures, thus improving changes adopted 20 Internetworking tools Promotes integrated communication to attain networking goals Increases the efficiency of communication 20 Network Technology Vendor Selection Criteria Selection Criteria Name Selection Criteria Description Selection Criteria Value (Weighting in Points) Price The cost of purchasing the network infrastructures 20 Quality The efficiency and effectiveness of the technologies in attaining their goals 40 Proximity Physical distance from the firm 20 After Sales Service The services provided by the firm following the purchase of the systems 20 Network Technology Recommended Vendors Vendor Name Vendor Strengths Vendor Weaknesses Products/Services Provided to Project Aggregate Selection Criteria Score Cisco Cost-efficient and responsive customer care Highly responsive
  • 4. Encryption can safeguard the network against interceptions 50 Alloys Fast network connectivity Network fluctuates They can offer heavy network 30 Oracle Low cost Highly expensive Provides a repair and maintenance software 20 Network Technology Deployment Challenges Deployment Challenge Deployment Challenge Description Deployment of physical over logical controls Physical network appliances are linked using protocols while in logical networks, there is utilization of different traffics that are agnostic to physical Scalable deployments The networks should be both automatic and scalable High costs High deployment costs is a challenge Inaccessibility Insufficient accessibility approach is a major problem Technology Adoption Methods Method Name Method Description Parallel Approach The adoption occurs when the new system is introduced while the old one is still in use Phased Gradually replacing small parts of the old system with the new one until it is fully implemented
  • 5. Piloting Using a small group of users to test the new system before it is widely adopted Direct Adoption Implementing a new system radically Cost/Benefit Considerations Benefits Costs Considerations Increased efficiency Personnel Hiring the most qualified pool of IT professionals Flexibility Organizational expenses Training employees to adapt to the new technology Cost cutting Cost of tools Seek the vendors who provide cost-effective and quality hardware and software technologies Access and availability Maintenance costs Repair and maintenance must be done regularlyDatabase System Recommendation Database System Selection Criteria Selection Criteria Name Selection Criteria Description Selection Criteria Value (Weighting in Points) Operational consideration Ability to manage failure recovery and maintain availability 30 Security The database’s integrity should not be tampered with 20 Development consideration The openness of the support options
  • 6. 20 Commercial consideration Its potential commercial importance and benefits 20 Database System Recommendation Recommended Database System Description Benefits Aggregate Selection Criteria Score Relational database management system Comprises multiple tables of data with rows and columns that relate to each other These databases are more flexible 40 Hierarchical database systems This model resembles a tree structure, with pre-defined relationships Requires users to pass hierarchies to access the required data, hence secure 10 Network database systems Supports many to many relationships Can promote integration of systems 40 Object-oriented database systems Information is represented as objects Supports different forms of programming 10 Database System Vendor Selection Criteria Selection Criteria Name Selection Criteria Description Selection Criteria Value (Weighting in Points) Usability User friendliness and ease of use
  • 7. 30 Visualization and reporting Ease of visually analyzing and displaying data and results 20 Security Ability to be stored securely 10 Functionality Ability to meet business requirements 40 Database System Recommended Vendors Vendor Name Vendor Strengths Vendor Weaknesses Products/Services Provided to Project Aggregate Selection Criteria Score Oracle Has syntax enhancements and performance improvements expensive Multitenancy, database in-memory, and database Sharding 30 Microsoft Ease of use and high availability Challenges in seamlessly integrating high volumes of corporate data SQL Server 30 IBM Can accommodate big data Expensive IDM DB2 20 Knack Provides many tools for online databases It is highly customized
  • 8. Knack 20 Database System Deployment Challenges Deployment Challenge Deployment Challenge Description Data security The organization may lack resources for securing its database Performance The database may have harsh performance criteria Resource utilization The database may not have the best hardware available to run on High availability In case the single server goes down, the firm’s operations are paralyzed Technology Adoption Methods Method Name Method Description Method Name Method Description Parallel Approach The adoption occurs when the new system is introduced while the old one is still in use Phased Gradually replacing small parts of the old system with the new one until it is fully implemented Piloting Using a small group of users to test the new system before it is widely adopted Direct Adoption Implementing a new system radically Cost/Benefit Considerations
  • 9. Benefits Costs Considerations Increased efficiency Personnel Hiring the most qualified pool of IT professionals Flexibility Organizational expenses Training employees to adapt to the new technology Cost cutting Cost of tools Seek the vendors who provide cost-effective and quality hardware and software technologies Access and availability Maintenance costs Repair and maintenance must be done regularlySoftware Application Recommendations Software Application Selection Criteria Selection Criteria Name Selection Criteria Description Selection Criteria Value (Weighting in Points) Suitability Ability to provide appropriate set of functions 40 Accuracy Ability to provide the right or agreed results 20 Interoperability Ability to interact with one or more specified systems 20 Security Ability to provide mechanisms to prevent the accidental or deliberate interference with integrity 20 Software Application Recommendation
  • 10. Recommended Software Application Description Benefits Aggregate Selection Criteria Score ERP Integrated software for managing and coordinating all the business activities It provides real-time standardization and streamlining of business processes. 30 Office production software Producing and compiling information, such as documents and reports Reduces and heaps of paperwork 30 CRM Facilitates interactions with customers Can be used to analyze customer trends and preferences 20 MIS Facilitates gathering, analyzing, and disseminated data for organizational operations Informs company decision-making 20 Software Application Vendor Selection Criteria Selection Criteria Name Selection Criteria Description Selection Criteria Value (Weighting in Points) Rates The vendors should not be too expensive 20 Main areas of expertise Relevance of the software to the business functions 20 Certification
  • 11. Must have local and international certification 20 Security Should have an information security plan 20 Software Application Recommended Vendors Vendor Name Vendor Strengths Vendor Weaknesses Products/Services Provided to Project Aggregate Selection Criteria Score Microsoft Can customize to the business’s needs costly Microsoft Office 20 IBM They install and configure them for firms Scalability and integration challenges Sterling Order Management 20 Oracle Portability Expensive Oracle CRM 30 SAP Multiple database support Very complex to use SAP ERP 20 Software Application Deployment Challenges Deployment Challenge Deployment Challenge Description
  • 12. Misaligned expectations Project teams and stakeholders may differ on the needs and requirements of the software Data integrity Lack of an effective strategy for securing data Insufficient training tools Employees maybe insufficiently prepared tom operate the software Testing problems Lack of a testing and maintenance tool Technology Adoption Methods Method Name Method Description Parallel Approach The adoption occurs when the new system is introduced while the old one is still in use Phased Gradually replacing small parts of the old system with the new one until it is fully implemented Piloting Using a small group of users to test the new system before it is widely adopted Direct Adoption Implementing a new system radically Cost/Benefit Considerations Benefits Costs Considerations Increased efficiency Personnel Hiring the most qualified pool of IT professionals Flexibility Organizational expenses Training employees to adapt to the new technology
  • 13. Cost cutting Cost of tools Seek the vendors who provide cost-effective and quality hardware and software technologies Access and availability Maintenance costs Repair and maintenance must be done regularlyCloud Services Recommendations Cloud Services Selection Criteria Selection Criteria Name Selection Criteria Description Selection Criteria Value (Weighting in Points) Compliance with standards Compliance with government and professional regulations 30 Service roadmap Current goals and objectives of the vendors 40 Terms of service If they do not have tough terms and conditions 10 Data security Ability to secure the data 20 Cloud Services Recommendation Recommended Cloud Services Description Benefits Aggregate Selection Criteria Score Amazon Provides additional services, such as storage and security Support users to integrate with business 20 Google Cloud Can provide free packages
  • 14. Supports all organizational functions 20 IBM Fast response to customer enquiries Can provide platform as a service 40 Adobe Ideal for supporting publishing and editing it is a creative cloud system 20 Cloud Services Recommended Vendors Vendor Name Vendor Strengths Vendor Weaknesses Products/Services Provided to Project Aggregate Selection Criteria Score Amazon Provides additional services, such as storage and security Cannot be customized Amazon Cloud 30 Google Cloud Can provide free packages Slow responsiveness to customer inquiries Google Cloud 20 IBM Fast response to customer enquiries Expensive
  • 15. IBM Cloud 30 Adobe Ideal for supporting publishing and editing Only ideal for media and publishing Adobe 20 Cloud Services Deployment Challenges Deployment Challenge Deployment Challenge Description Data security Increased incidences of hacking of cloud resources Performance issues Disruptions from vendors due to maintenance Availability problems Lack of availability of services when technical issues emerge Data safety Data may be affected when the computer systems are infected by viruses Technology Adoption Methods Method Name Method Description Parallel Approach The adoption occurs when the new system is introduced while the old one is still in use Phased Gradually replacing small parts of the old system with the new one until it is fully implemented Piloting Using a small group of users to test the new system before it is widely adopted Direct Adoption Implementing a new system radically
  • 16. Cost/Benefit Considerations Benefits Costs Considerations Increase in efficiency $4000 Installing efficient and state-of-the art hardware and software resources to speed up business transactions Reduction in costs $3000 Eliminating heaps of paperwork Hiring more staff $10000 Individuals who will operate or control the cloud resources Purchasing more computer resources $5000 Devices should be purchased to support the running of the cloud computing system Copyright 2020 by University of Phoenix. All rights reserved. Copyright 2020 by University of Phoenix. All rights reserved.