SlideShare a Scribd company logo
1 of 43
Running Head: CLOUD TECHNOLOGY AND
VIRTUALIZATION
CLOUD TECHNOLOGY AND VIRTUALIZATION 6
Project Deliverable 4: Cloud Technology and Virtualization
Charles Tinsley
Dr. Mark Cohen
CIS 599
August 17, 2019
Introduction
The company’s operations will result in the generation of large
amounts of data, which will necessitate the introduction of tools
capable of handling the data. Many organizations are
increasingly turning towards cloud technology as the preferred
technology tool to effectively deliver the tools and capabilities
for the management of the data. On the other hand, the adoption
of virtualization will result in cost savings as it is a technology
with minimal hardware requirements.
Need for Cloud Technology and Virtualization
Cloud technology delivers computing resources to a client from
a remote data center. From their computer terminal, a user can
access cloud resources through the use of a browser and with an
internet connection. This saves the user or organization the need
of installing various technology resources within their premises
and having to cater to the accompanying costs of maintaining
them. Cloud technology provides organizations with the
capability to access multiple computer resources like storage,
database, applications, networking, development, and
management tools, as well as security solutions from a cloud
vendor. The latter will provide a portal where all these
resources can be easily accessed. The cloud vendor gets to
maintain the physical data centers where all these computing
resources are hosted. These resources are always online,
meaning a client can access at any time, day or night, from
anywhere in the world as long they have an internet connection.
It also supports access from various devices, including the
ubiquitous mobile devices like tablets and smartphones, further
spreading the reach of cloud technology. With virtualization,
there will be a maximization of the hardware resources of an
organization. Virtualization allows for the creation of virtual
machines, and many of them can be created in a single server.
This only necessitates the company to keep a small number of
servers, which are already available, hence no need to purchase
new ones. With a reduced number of physical servers to
maintain, it will mean lower costs with the attendant benefits of
virtualizations. A virtual machine operates as an independent
computing environment, allowing for various operations and
applications to run as if on separate physical computers
(Bizarro, & Garcia, 2015).
There is always an expectation that a company will experience
significant growth over a given period. There is the need to
ensure the available tools and resources are indeed capable of
supporting such growth. When selecting the technology to be
implemented, it will be important to consider its scalability, the
capacity to expand in its capabilities to support the increased
workload by the organization’s operations. Usually, such
growth would require investment in a completely new set of
infrastructure since the existing isn’t designed to handle the
increased loads. However, given the cost of investing in new
infrastructure is high, many organizations prefer acquiring that
is capable of adapting to the change in size and scope of its
operations with ease. Cloud technology offers a virtually
infinite capability for scalability, allowing for capacity to be
added on demand. Also, cloud vendors enable the clients to only
pay for the capacity they utilize, which can rise or fall
depending on the operations. With virtualization, scalability is
achieved by the capability to create new virtual machines as
needed. A single server can hold a vast number of virtual
machines. The available servers can support as many
independent computing environments as needed (Krutz, &
Vines, 2014).
There is a noted increase in cyberattacks targeted towards
corporations, with many of them resulting in devastating
consequences for the victim companies. With the current
security environment, many organizations understand that these
attacks are inevitable. With that in mind, these organizations
then come up with mitigation measures that allow them to
weather these attacks with minimal damage to their
infrastructure and minimal disruption to their operations. With
cloud technology, a company is provided with a solution for
disaster recovery that allows it to avoid these damages. Since
the cloud vendor is responsible for hosting the computer
resources, they put in place measures that ensure an attacker is
severely limited in the amount of damage and disruption they
can cause. These include defense-in-depth and segmentation,
among other security solutions. A successful attack is unlikely
to cause any noticeable damage, with the system able to be
restored in less time than if it was hosted within a company’s
premises. Regular backups ensure that the most recent versions
of computer resources are always available, allowing for
operations to resume as soon as possible. Most cloud vendors
have data centers in many different locations, allowing for one
to take over should another fail. A virtualization solution
provides for independent environments which ensure that the
failure of one virtual machine will not result in the failure of
others within the same server (Pearson, 2013).
Cost Savings in Hardware Infrastructure
Investment in hardware infrastructure is usually one of the
biggest IT costs for many organizations. Beyond the initial
investment, they also have to factor in the cost of maintenance,
including the qualified personnel. With the speed of the
advancement of technology, more often than not, a company
might find itself with hardware that has essentially been
rendered obsolete, necessitating further investment. However,
with cloud technology, a company no longer has to worry about
how much to spend on hardware. The cloud vendor is
responsible for physical data centers where the resources are
hosted, along with the attendant costs of maintaining the centers
and their hardware. As a result of economies of scale, they can
pass along the savings to their customers, resulting in lower
prices. The company will only need internet-capable devices to
access their cloud-hosted resources, with no further need for
investment in any hardware from them. Virtualization only
requires a few servers, with the company having no need for the
excess servers. With the capability to host a huge of virtual
machines, the cost of hardware maintenance can be kept as low
as possible (Krutz, & Vines, 2014).
For many organizations in their early stages of growth, they are
limited in the number of funds available to them. As such, the
implementation of technology that requires minimal investment
in hardware is a benefit to them. On top of that, cloud vendors
can offer top-notch services at considerably lower prices,
allowing the company to have access to superior solutions and
technologies without the high investment and maintenance costs
(Pearson, 2013).
Reduction in Human Capital
With the cloud vendor handling most of the responsibilities
necessary to ensure the continued availability of resources and
services to customers, the company will not need to employ its
personnel. The company will only maintain a minimal
workforce as far as the system is concerned, having a lower
human capital spend on this aspect of its operations. Most of the
activities and operations will be automated, with human
involvement only being done when it is it is necessary. These
will mostly be a few system administrators with privileges and
will take over when needed to only (Krutz, & Vines, 2014).
Aligning Cloud Technology to Business Processes
Solution
Providers
The largest cloud vendor currently is Amazon Web Services
(AWS), who are pioneers in the enterprise cloud market. Other
companies in the market include Microsoft Cloud and Google
Cloud Platform. With its longevity operating in this sector,
AWS has been able to implement advanced technology and
deliver quality services to its customers, making the best option
for the company. AWS can provide storage, applications,
database, and database management, computer services,
networking, analytic tools to carry out big data solutions as well
as security and development tools. AWS allows for its clients to
only pay for the capacity they utilize, hence lower while
availing the capability scale as needed.
References
Bizarro, P. A., & Garcia, A. (2015). VIRTUALIZATION:
BENEFITS, RISKS, AND CONTROL. Internal Auditing, 28(4),
11-18.
Krutz, R. L., & Vines, R. D. (2014). Cloud security: A
comprehensive guide to secure cloud computing. Wiley
Publishing.
Pearson, S. (2013). Privacy, security, and trust in cloud
computing. In Privacy and Security for Cloud Computing (pp.
3-42). Springer London.
Running head: DATABASE AND DATA WAREHOUSING
DESIGN
DATABASE AND DATA WAREHOUSING DESIGN
11
Project Deliverable 3: Database and Data Warehousing Design
Section 1: Design Document
Charles Tinsley
Dr. Mark Cohen
CIS 599
August 13, 2019
Introduction
Data warehousing and relational databases have become very
popular these days for corporations and businesses. It has
become a standard for almost every company that intends to
compete effectively in the current world to own this unique
technology. Data from different sources such as sales and
marketing departments, finance department, and human
resources department in a company is collected, stored, and
processed in a database. The operational systems used in these
sources help to gather and disseminate data to the database.
This data is then analyzed to produce reports that may assist the
management in making strategic decisions. When a company
makes decisions based on real data, then it can stay a step ahead
of the competitors, among other benefits. It is important to note
that database design plays a crucial role in determining the
effectiveness of the flow of data in a system (Beynon-Davies,
2013). In our context, a relational database and data
warehousing will be very effective in the storage and processing
of data. Incorporating this technological solution into the
information network will enable consolidation of all data from
within and outside the company into one place hence making it
easier to manage.
Need for the Relational Database and Data Warehousing
Since the majority of the business activities and operations in
our company are online-based, then data warehouse will be one
of the best options to establish. Information from throughout the
organization will be aggregated into a single repository. The
data collected can then be utilized later to analyze various
business activities. Analysis of data in the data warehouse will
help in revealing the status quo of the company since it based
on facts (Van Aken et al., 2017).
A data warehouse is a central repository area for all the
company's data which helps the management to access unique
data that may not be found in other areas. The sources of data
include the Enterprise Resource Planning (ERP) system,
operating system, and the database will give distinct data in
different formats. A data warehouse will help in the processing
of this data into simple formats that will be easy to comprehend.
The good thing about a data warehouse is that processing of
data will be done in one centralized location instead of different
operational systems.
Since our company receives data from many clients, sometimes
making it hard and costly to manage it, then the data warehouse
will provide a solution to this problem. The data warehouse will
aggregate it to avail a database that is reportable and
searchable. The data warehouse will also enable consistency of
the data by establishing a similar process for all varieties of
data. One of the major purposes for the establishment of a data
warehouse will be to give more insight into the data aggregated
into it. The insight from the information generated will be used
in strategic planning, decision making, and supporting other
activities of the management (Beynon-Davies, 2013). By taking
into consideration the importance of the decision-making
process in a company, then this project must be implemented as
soon as possible. The insight from the data warehouse will be
easy to understand by all people in the company from juniors to
senior managers. Decisions made by the management will touch
every department of the company; hence, information derived
from the data warehouse will be reliable since the raw data will
have been from all departments. When a data warehouse is not
available, and every department is expected to generate its
report, the data is independent of other departments hence not
entirely reliable. This sometimes confuses the management
during the interpretation of reports since different departments
use distinct approaches and formats to process and analyze data.
Data warehouse eliminates such confusion and all possible
errors by generating consistent data in a centralized processing
location.
A data warehouse enables storage and easy analysis of
historical data based on past activities within or outside the
company. In most cases, past performance enables accurate
prediction of the future. Hence historical data should be treated
as a vital part of the company. Many big organizations thrive on
analysis of past data, which enables them to dominate in the
market. Having access to prior data is one of the key aspects
that allow big organizations to outdo startups. Such
organizations use past data to analyze risks; hence, they know
which direction to take at all times. This help to avoid or reduce
the effects of certain unfavorable scenarios before they happen.
Reports from past data enable organization management to make
effective decisions. To ensure that the data that is received and
stored in the database is reliable, then the right kind of
information should be fed to it at all times (Cuzzocrea et al.,
2017). All the data sources should be verified to ensure data
integrity and avoid contamination.
A data warehouse will help in data mining; this involves
processing and analysis of big amounts of data to produce
patterns and establish the relationship between different sets of
unrelated data. The data in the data warehouse originate from
different sources and have different formats. The data also
arrives in a raw and unstructured state, which is hard to
interpret. The data in its original state cannot provide the
expected insight; hence, it needs to be processed to be
meaningful. Data mining process enables sorting out and
processing of large chunks of data in the data warehouse to
identify patterns and relationship among different sets of data
(Cuzzocrea et al., 2017). For example, the relationship between
sales and prices can be established by the use of a graph, table,
or pattern. The main goal of data mining is to provide insights
to assist in making accurate predictions. Data mining also helps
identify problems in a company based on analyzed data. Various
parameters are utilized to produce results during the data
mining process enabled by data mining tools and techniques.
Data warehousing come in handy with data visualization tools.
This is in addition to its data analytic capabilities. The data
visualization tools enable a better presentation of the analyzed
reports. After analyzing data, users need to view it to
understand it. The process of presentation is, therefore, very
important; hence, it should be made easy. In the past
presentation of data was text-based data, but with the
advancement in technology, this has changed. Data visualization
tools are now used in the data warehouse to present data in a
more easily understandable format. There is a dashboard where
users can see the data information in various detailed versions
such as infographics, geographic maps, spark lines, and heat
maps (Beynon-Davies, 2013). Initially, texts were presented in
simple bar graphs and charts, but today, more detailed and
better visualization tools are continuing to dominate the market.
The modern visualization tools offer a more effective solution
for data analytics as they easily identify trends, patterns, and
correlations in data. The data is manipulated by the tools within
a short period to provide real-time graphical reports.
Data warehouses process data within a short period hence
proves to be one of the best technology solutions to be preferred
by any Internet-based companies that need to process a large
amount of data. Speed will help to save time and cost that
would otherwise have been incurred if data processing was done
manually or using other slower means. The data warehouse will
analyze large amounts of data at a faster rate than when human
users are used. This technological solution will help in quick
processing of queries during emergency meetings when the
management wants a quick data processing. Most times in
businesses emergencies do not have set times hence require
quick feedback which can be facilitated by shorter data
processing of the warehouse. The data warehousing has higher
data processing capability than most of the ordinary operational
systems; it should be a priority. The data warehouse also
processes data without impartiality associated with human
beings hence making reports from the more reliable and
accurate.
A data warehouse is highly secure to store the company’s data.
Confidential data such as personal data of clients, financial
data, and sales data can be safeguarded in the data warehouse
without unauthorized access that can lead to a data breach. With
the high data breaches in the world resulting from hacking and
illegal entry, every company should put in place security
measures to protect its data (Elmasri, & Navathe, 2017). A data
breach can be detrimental to the involved company in a variety
of ways such as financial loss, brand tarnishing, and getting
sued. Due to the centralized data processing state of the data
warehouse, the security also becomes centralized. This is
contrary to a situation where there are many entry and exit
points in the database, making it difficult to monitor and control
the access. The data warehouse can also enable encryption of
the data stored in hence preventing unauthorized access.
Database Schema
A database schema helps to illustrate the logical design of the
database. A database schema indicates a part of the database to
be implemented. Components of the database, descriptions on
data organization, attributes, and the relationship between
different components are indicated on the database schema.
Below is a schema for part of the database that will be ideal for
our company.
Diagram 1: Database Schema
The schema above is for the employee records for one of the
company’s customers. The schema indicates the relationship
between employees’ information and various components of the
organization. The components of the organization indicated to
be relating closely with employees’ records include titles,
departments, salaries, and department managers.
Entity Relationship Diagram (ERD)
Diagram 2: Entity Relationship Diagram (ERD)
The entity-relationship diagram above indicates the available
tables of employees, projects, departments, and salaries. The
table "works at" indicates a one-to-many relationship while
table "works on" indicates a many-to-many relationship
(Cuzzocrea et al., 2017).
Data Flow Diagram
The Data Flow Diagram (DFD) above indicates the setup for the
system functionalities.
Diagram 3: Data Flow Diagram
Diagram 4: Flow of Data used in the Data Warehouse
Operational System
Sales
ETL
Extraction,
Transformation, and Loading
ERP Marketing
Data Warehouse
OLAP Server
CRMProcurement
Human Resources
SCM
R&D
Flat Files
Senior Management
Conclusion
In the current world, data warehouses and relational databases
have become a standard requirement for all organizations that
want to compete effectively. The market has become very
competitive place hence the need for relying upon data
analytics. Data analytics have experienced massive growth in
recent years with high expectations of this continued growth in
the coming years. Data warehousing and relational databases
avail a good opportunity for organizations to benefit from data
analytics, which will give them a competitive advantage and a
chance for scalability in the future. Therefore, the
implementation of these technologies should be prioritized by
the management of any company.
References
Beynon-Davies, P. (2013). Database systems. Basingstoke:
Macmillan.
Cuzzocrea, A., Darmont, J., & Mahboubi, H. (2017).
Fragmenting very large XML data warehouses via k-means
clustering algorithm. arXiv preprint arXiv:1701.02190.
Elmasri, R., & Navathe, S. (2017). Fundamentals of database
systems. Pearson.
Van Aken, D., Pavlo, A., Gordon, G. J., & Zhang, B. (2017,
May). Automatic database management system tuning through
large-scale machine learning. In Proceedings of the 2017 ACM
International Conference on Management of Data (pp. 1009-
1024). ACM.
Running head: NETWORK INFRASTRUCTURE AND
SECURITY
NETWORK INFRASTRUCTURE AND SECURITY9
Project Deliverable 5: Network Infrastructure and Security
Charles Tinsley
Dr. Mark Cohen
CIS 599
August 25, 2019
Introduction
The company is on an upward growth trajectory and requires
information technology infrastructure to support this expansion.
The solution will need to be one that takes scalability into
consideration to ensure the company does not have to spend
more funds in the future to upgrade. With the growing threat of
cyberattacks, security will need to be another important
consideration for the development team, with tools to anticipate
and respond to security incidents built into the system.
Network Vulnerabilities
In the everyday operations of an information system, traffic will
move in and out of the network, with users sending and
receiving data. However, within this traffic is the possibility of
malicious content attempting to gain entry into the network to
cause damage to it. To avoid this, a network administrator will
implement a variety of intrusion detection measures to ensure
the security of the system. These solutions can, however, fail,
and malware can make its way into the network. The biggest
reason for this is usually the poor configuration of the security
solutions that make easy conduits for malicious content.
Intrusion prevention systems like firewalls often work by
screening traffic against a database of known threats, blocking
any piece of traffic that matches any of these threats. But newer
threats that have yet to be included in the database might pass
through the security tool uninhibited. It is crucial to carry out
regular system scans that will discover weaknesses within the
system that should be fixed and updated to reflect emerging
threats and vulnerabilities (Cranor, & Garfinkel, 2015).
The adoption of cloud technology tools allows the company to
implement a variety of progressive solutions to its workplace
like telecommuting, where users can work from home or away
on vacation and so forth. There are however issues with such a
solution where threats can be introduced into the network from
the devices used to access the cloud resources Without these
security requirements; these employee devices can be the
conduits through which malicious content is introduced into the
company network. To amend this situation, it is vital to
implement a veritable bring your device (BYOD) policy that
will guide how employees will use their devices to access
company resources. It should include fundamental security
requirements for the devices, as well as recommended tools
(Cranor, & Garfinkel, 2015).
Employee turnover is a normal part of the operations of any
company, with employees coming in and leaving depending on
the needs of the company. Given that each employee is issued
with credentials that they use to access the company’s systems,
these might be misused. It could be the employee can continue
accessing company resources after they have left, or their.
Company policy is ideally meant to require that the credentials
of a departing employee be deactivated the moment their
departure is effective. Leaving the credentials dormant becomes
a point of vulnerability for the network since anyone that uses
the account might appear legitimate even when they are not
(Cranor, & Garfinkel, 2015).
While virtualization allows for the creation of multiple virtual
environments that are independent of each other, these are still
located within a single server. The failure of such a server will
mean the loss of the virtual machines it hosts and all the
company processes and applications hosted within those virtual
machines. It is vital to have multiple servers that will enable
failover solutions for the servers in cases of disaster or
downtimes. Offsite backups should also be considered as
another measure to lessen the vulnerability of the system
(Rittinghouse, 2015).
Logical and Physical Topographical Layout
The physical network will use a star topology solution where
network devices will be converging on a central hub. On this
hub, they will be able to receive various network resources like
access to the cloud, bandwidth, and network security. The star
topology will make it easier for these resources to deploy
effectively and for network administrators to manage the system
more efficiently (Shinde, 2014).
The logical network will be developed under the bus topology,
different from the physical topology since their operations are
implemented independently of each other. The bus topology is a
solution where computers in a network are connected to a
central line that acts as a backbone. The computers can then
request for resources from this backbone(Shinde, 2014).
Figure 1 - Physical Layout
Figure 2 - Logical Layout
Security Policy
Data confidentiality is when access to a computer resource is
limited only to the user with express authorization to do so. The
company data with different levels of sensitivity, and therefore,
the access controls will differ depending on the data that is
accessed. On the other hand, with different users with
permissions to access resources within the network, they will
have different levels of access granted to them, which will
largely depend on the user’s roles and responsibilities within
the organization making confidentiality a smooth operation, it
will be necessary to classify the data within the company and
the employees as well. Data classification will ensure each
piece of data has been provided with its level of sensitivity that
will determine the kind of access controls to be placed on them.
Employee classification will give all users a security profile
that will take their job description and provide with varying
access privileges within the network. When deciding on
privileges to be granted to employees, the principle of least
privilege should be used. This is where a user is provided only
with the minimum access privileges to network resources that
are required to perform their responsibilities. This will ensure
the number of users with unlimited access privileges remains
the administrators that need them to effectively manage the
network (Cranor, & Garfinkel, 2015).
Data integrity is the state of a piece of data remaining safe from
undue modification while is being transmitted. A piece of data
is said to have retained its integrity if it remains in the same
state when it reaches the final recipient as it was when sent by
the original sender. The company transmits information daily,
whether among the employees of the company, to external
partners, customers, and so forth. This information needs to be
safe from any actions or situations that would lead to the
recipients receiving tainted data. This unauthorized
modification of data can be from cyber-attackers that intercept
the data while it is being transmitted to their final recipients.
They can then distort the data to have it that the recipients get a
different message or have access to sensitive information like
business secrets.
The information shared by a company, internally or externally
is vital to its interests. Some of this is used by senior executives
for critical decision making that will influence the company’s
strategic vision. As such, any undue modification to the data
will lead to these decisions being based on untrustworthy data,
with the repercussions going throughout the company. To avoid
threats to data integrity, it is necessary to institute actions that
will secure the transmission process. One the best ways to do
this will be through encryption, where the data is converted to
code before being sent. The legitimate is then provided with a
key they will use to decrypt the information when it reaches
them. This ensures that even the data is intercepted, the
unauthorized user will have no way accessing the data without
the corresponding key (Cranor, & Garfinkel, 2015).
Availability is the state where a system remains accessible and
sufficiently operable to its users. This is important for both
employees to access these resources to carry out their
responsibilities and the company’s customers access its
products and services. For the company to conduct its
operations as effectively as possible, it will be necessary that it
maintains the availability of these operations. An e-commerce
solution where customers shop on its site requires that these
customers can access the site at all times and conduct all the
activities they need to without downtime or drag. If downtime
occurs, the company will lose hours of productivity as well as
missed business opportunities in term of sales. It will also
damage the company’s reputation by making customers view its
services as unreliable, which will hurt future earning potential.
Availability of computer resources can be caused by among
others, power failures, system outages, natural disasters, as well
as cyberattacks like distributed denial of service (DDoS)
attacks. As such, it is crucial to implement a regime of system
resilience for the network that will make strong enough to
withstand a variety of threats to it without resulting in damages
or downtime. Activities like penetration tests can be used to
gauge just how much the network can withstand an attack before
breaking down. The results of the tests will then be used to
implement a variety of upgrades to strengthen the system. But
even with tools to ensure the resilience of the network, it will
be necessary to provide tools that take into account the
possibility of disaster happening. Even with all measures taken,
there is still the possibility for catastrophe to occur. In that
case, there needs to be a disaster recovery and business
continuity plan in place that will act as a response strategy for
the event disaster strikes. Regular backups will ensure that the
most recent version of the data is available to be accessed in
case of disaster (Cranor, & Garfinkel, 2015).
Network Components
Figure 3 - Network Components
Ethics in the Network
Ethics within the network will take the form of an enforced
confidentiality clauses in contracts as well as non-disclosure
agreements. Once signed, the party will be bound to keep all of
the company’s information they interact with confidential.
Failure to do so will result in legal proceedings against the
offending party (Patrignani, & Whitehouse, 2015). Employees
will be required to implement strong passwords that are difficult
to hack. This will be after they have been provided with
credentials unique to them that should not be shared by any
other employee. Strong passwords need to use both
alphanumeric and special characters to be effective, with a
reasonable length also (Cranor, & Garfinkel, 2015).
References
Cranor, L. F., & Garfinkel, S. (2015). Security and usability:
Designing secure systems that people can use. Beijing: O'Reilly.
Patrignani, N., & Whitehouse, D. (2015). Slow tech: bridging
computer ethics and business ethics. Information Technology &
People, 28(4), 775-789.
Rittinghouse, J. W. (2015). Cloud Computing: Implementation,
Management, and Security. Hoboken: CRC Press
Shinde, S. S. (2014). Computer network. New Delhi: New Age
International Ltd.
Project Deliverable
Project Deliverable
6
Project Deliverable
Charles Tinsley
Dr. Mark Cohen
CIS 599
July 14, 2019
Introduction
Home Shopping is one of the leading online retailers that allows
consumers to shop for products at the comfort of their homes.
Just like the name suggests, Home Shopping allows users to
shop for various products without having to visit the stores
physically. They place an order of the products, and the
products are delivered right at their doorstep. Within the recent
developments of technologies, there has been an increasing
trend of consumers preferring to carry out online shopping as
they have found out that this saves on cost and time as they do
not have to physically visit the supermarkets and grocery stores
to conduct their shopping activities. Recent studies carried out
indicate that over one billion people around the world to
purchase goods online (Nguyen, De Leeuw, & Dullaert, 2016).
The number is expected to grow tremendously with the
increased use of technology around the world. Well, numbers do
not lie, and online retailing has been one of the biggest trends
and opportunities for entrepreneurs in recent years.
Background Information
Home Shopping was established in the early 2000s in the wake
of the dot com generation. It was during this period that the use
of the internet started to pick up. With the company’s being
located in San Francisco, California, the company has been able
to grow to all states in the United States and outside the United
States of America. The company first began as an online
marketplace for clothing products but later shifted course and
included other products ranging from grocery products, books,
to electronics. Home Shopping established its first warehouse in
San Francisco but later opted to rather collaborate with clothing
stores when it changed its business models. The company has
collaborated with various stores across the world and acts as the
middleman between the consumers and other retailers. It began
with five employees but has grown up to 25 employees currently
operating in a one-floor office. These employees range from
drivers, warehouse employees, and customer care employees
that can link up the consumers with the different sellers. In the
recent financial year reports released by the company, it is
estimated that the company made over $50 million in terms of
revenue in the past financial year. To expand its business
operations, Home Shopping has opted to merge with a
multinational company. This will help expand its customer base
and sales in the years to come.
Business Activities
Home Shopping supporting trading community on the internet
via the world wide web. It provides a platform for other
retailers that it has collaborated with to sell products to buyers.
It also sells a variety of items directly to consumers through the
company’s online storefront. Most consumers visit the
company’s website with the assumptions that the products are
less expensive and are readily available for purchase and
shipping. In cases where the goods that they are consumers are
searching do lack in the company’s warehouse, the customer is
referred to a seller with the product. The company deals with a
large portfolio of products that range from clothing,
kitchenware, electronics, books, jewelry, liquor drinks, to
online music and movies streaming. In recent years, the
company has introduced grocery products in its products
portfolio. It has been able to collaborate with various grocery
stores where consumers can order for grocery products and are
delivered on the same day. This option has been tested in
multiple states across the United States and has proved to be
successful, and the company has plans to expand it to other
countries in which the company operates. This might be on
reality soon with the expected merge with DHL. DHL is a
multinational company that offers transportation and courier
services. This merger will help the company in its
transportation and logistics services. It will help in faster
delivery of customer orders. The customers can easily track the
progress of their delivery and can be able to estimate the exact
time delivery will take. One of the objectives of the company is
to improve its delivery time for goods as this is one of the
important aspects when it comes to online retailing. The
company will also be able to expand some of its business
operations too.
Outsourcing and Offshoring Opportunities
Home Shopping has benefited greatly from outsourcing of its
inventory management and labor. It has been able to save a lot
of costs by outsourcing labor, especially when it comes to some
of the human resource activities. It has been able to reduce its
employees up to 25 in total, which makes it easy to manage.
Outsourcing its inventory management has enabled it to provide
its customers with faster delivery from the company directly.
Inventory management is a critical process in any business or
organization, and Home Shopping has utilized it to be able to
operate efficiently. Almost 90% of the company’s sales mainly
comprise of third-party sellers. It outsources items that are not
regularly ordered and stored in the company’s warehouse. It has
been able to offshore outsource its logistics and delivery
options in the international markets that it operates. This
ensures that product delivery is made in the fastest way possible
and ensure that customer satisfaction is at its level best (Yao,
Huang, Song, & Mishra, 2018). With the introduction of grocery
items in the products portfolio, consumers can receive the
grocery products that they make an order.
Current Information System
The company relies heavily on its information system for its
day to day business operations. The current system allows users
to place an order which is then transferred to the warehouse. At
the warehouse, the system checks if the product is in stock and
if not advises the customer the best seller to get the product
from. If the product is available at the warehouse, it informs the
employees the exact location of the product, and this saves time
for searching for the product. After locating the product, the
system then advises the employees on the type of packaging
needed for the product. After packaging the system ticks a green
light indicating that the product has left the warehouse and
informs the customer. Depending on the location of the
customer, the system selects the best delivery option and how
long it would take for the order to be shipped to the consumer.
The consumer has an opportunity to track the progress of the
shipment after the delivery has begun. The current databases
store the company’s business operation ranging from inventory
to consumer’s data. The database stores inventory about goods
that are available in the warehouse. And those that are available
with the sellers. It also stores the information is given out by
the customers such as their names, locations, and payment
methods. These databases are linked up together in the data
warehouse. Data warehousing has provided crucial information
for analysis for the company’s future trends. The company
makes use of cloud computing for storage of the big chunks of
data collected every day. The network infrastructure helps link
up the company with different outsources. There have been
various security challenges facing the current information
system. One of the key challenges is that the current system
cannot be able to integrate with new technologies and also keep
up with the changing technologies. The current system does not
fully meet organizational demands.
References
Nguyen, D. H., De Leeuw, S., & Dullaert, W. E. (2016).
Consumer Behaviour and Order Fulfilment in Online Retailing:
A Systematic Review. International Journal of Management
Reviews, 20(2), 255-276. doi:10.1111/ijmr.12129
Yao, X., Huang, R., Song, M., & Mishra, N. (2018). Pre-
positioning inventory and service outsourcing of relief material
supply chain. International Journal of Production
Research, 56(21), 6859-6871.
doi:10.1080/00207543.2018.1495853
Running head: pROJECT DELIVERABLE 2
1
pROJECT DELIVERABLE 2
8Business Requirements Document
Charles Tinsley
Dr. Mark Cohen
CIS 599
July 28, 2019
Business Requirements Document
Providing better services to customers is one of the keys to a
successful business. Fulfilling customer’s requirements helps
achieve customers satisfaction; an important tool that drives the
business towards achievement. Customers’ requirements are
those needs that determine whether or not the customer needs
have been satisfied with the products. According to Spacey
(2017), a customer requirement is a specification that originates
with customers as opposed to internal stakeholders. This can
include both functional and non-function requirements for
products, services and experiences.Definition of the Scope and
how to Control the Scope of the Project
After brainstorming and interviewing customers, there was a
need to implement the voice of a customer in the business.
Voice of the customer involves capturing customer’s needs and
expectations before coming up with a product, services, and
brands. According to Saeed et al. study (2013), Innovation and
new product development connected with “customer needs and
expectations” differs across the marketing, engineering, and
industrial design literature. The goods in the market are of a
high quality due to the customer’s input during production.
Customers know what they want. Therefore, involving them
during production ensures that the goods produced to meet their
needs. This business aims at providing customers with better
services and products. Therefore, ensuring that customers are
satisfied by getting their feedback can be used as a control to
using Voice of Customers. Assessing increase in profits will
also help define whether this strategy is working.
Feedbacks and profits realized after the implementation of
Voice of Customer (VoC) will use as a way to realize
workability of this scope. Positive feedbacks from customers
will mean that their needs have been fully satisfied. However,
negative feedbacks will mean more has to be done. Better
strategies will have to be implemented to ensure mass
satisfaction of the customers. When balancing the books of
account, the profits increase that will be realized after the
implementation of VoC will mean success in the strategy.
However, no profits or losses will be linked to the failure in
workability of the strategy.Possible Risks, Constraints, and
Assumptions
This strategy has four distinct components, namely; Listening
(collecting data), understanding (analyzing data for insights),
sharing (distributing the insights), and taking action. Having all
the four components to work will involve using a lot of
resources from the company. The risks associated will be
getting individualized needs from the customers. Every
customer has his/her needs. It will be therefore, hard for the
analyzers to determine the need that will be likely to cause
customers’ satisfaction and achieve business goals. This will
mean adopting production strategies that may fail during the
process leading to losses. As this scope is limited only to
customers’ feedback, there will be a lack of consultation from
other external consultants. This strategy risks succumbing to
analysis paralysis as the business tries to ensure profits are
realized. We have to assume that the feedback we get always
aims at improving the customers’ needs.Integration with Other
Systems and Infrastructure
There is a need to integrate VoC with Database and Data
Warehousing, Cloud Technology and Virtualization, and
Network Infrastructure and Security to easily monitor its
workability. In other words, we are going to integrate VoC with
cloud infrastructure. According to Gilbert (2018), this will
virtualize all the resources to make them available on the
website of the company using the command line interfaces,
program interfaces, and graphical interfaces. The cloud
infrastructure will enable customers’ and the project team to see
the utilized resources and the corresponding resources to the
costs of the project. This will also ensure they can monitor the
achievements of the strategy.
The cloud storage infrastructure will also integrate software and
hardware elements that will reinforce the public and private
cloud storage services. The company will also use a virtual
integration of the infrastructure and other systems. In this case,
the subsystems will be assimilated based on the operation
ability of the information systems that are related to the
functional entities. This is one of the quickest available
methods that will be used with the network developers and
vendors. There is a need to come up with security measures to
ensure the protection of the company’s network. This will
enable information relayed from customers to the company and
from the company to the customers are not distorted hence
efficient data flow.Human Capital
According to Pettinger (2017), Human Capital is a measure of
the skills, education capacity, and attributes of labor, which
influence their productive capacity and earning potential. We
are planning to add up our task force to involve employees who
have prior knowledge of VoC. Kaplan & Norton (2005),
emphasizes that if the employees who are closest to customers
and who operate processes that create value are unaware of the
strategy, they surely cannot help the organization implement it
effectively. There will need to find individuals who have
worked in another organization that had implemented VoC to
help train some of our employees.
The company will develop a human capital planning tool that
will be employed to drive focused activities and achieve the
goals of the project (Wang, 2018). This plan will comprise of
software developers, web designers, virtual engineers, and IT
professionals that will enable the company to assess, plan, and
react to the needs of the project effectively. These professionals
will be highly skilled with great educational and work
experience from reputable organizations. These professionals
will help redesign the organization by developing a plan that
meets the needs of the organization as well as the goals,
mission, and vision of the company.
Possible Outsourcing or Offshoring Needs for Accomplishing
the Project
The information flow between the customers and the company
will involve a lot of traffic. Therefore, it is advisable for the
company to outsource storage facilities rather than buying and
maintaining the storage devices at the company to reduce
expenditure. The employee will have training from international
organizations, as VoC has never been implemented by the
company before. The company will also apply the offshoring
needs such as keeping the service desk in different countries so
to ensure customers’ feedbacks are received. This will also
ensure that those who seek the company’s products get first-
hand information about the products.Relevant Terms Used
Throughout the Project
Some of the terms that would be used throughout the project
implementation include project initiation, management
information system, and project scope, feedbacks, among others
(Said, 2018). Project initiation is the initial phase of the project
in the life cycle of project management. It encompasses
launching a new project. During this phase, employees will have
to be trained, and all the requirements put in place. VoC will
then be first implemented. Management Information System
(MIS) will be used to manage the information flow throughout
the company. Project scope is the determination of the
deliverables of the project, including the goals and the
objectives of the project, the costs, the tasks, and the schedule
of the project. Feedbacks from customers will form a base at
which information about reactions to a product, a person's
performance of a task will be used to determine better ways for
improvement.Cost Projections for Staffing, Infrastructure, and
Other Resources
There will be costs needs that we have to budget for. First of
all, there will be a need to determine the amount of labor
needed. This includes all the staff, trainers, and other specialists
that will be hired. Equipment for use and facilities to house
service desks in different countries will be needed. There is also
a need to add contingency costs for additional expenses that
cannot yet be foreseen. Labor costs for 50 staff, 3 trainers and
20 specialists will approximate to $500000. Specialists include
IT personnel, data analyzers, software developers, web
designers, and virtual engineers. Equipment and facilities in 10
countries that will first launch the strategy will be about
$600000. A contingency cost of $100000 will also be required.
Approximately, the whole project will cost 1.2 US Dollars.
References
Gilbert, T., Barr, S., James, P., Morley, J., & Ji, Q. (2018).
Software Systems Approach to Multi-Scale GIS-BIM Utility
Infrastructure Network Integration and Resource Flow
Simulation. ISPRS International Journal of Geo-Information,
7(8), 310.
Spacey, John. (2017). 4 Types of Customer Requirements.
Simplicable. Retrieved From
https://simplicable.com/new/customer-requirements
Kaplan, S. Robert, Norton, P. David. (2005). The Office of
Strategy Management. Harvard Business Review. Retrieved
From https://hbr.org/2005/10/the-office-of-strategy-management
Pettinger Tejvan. (2017). Human Capital Definition and
Importance. Economics. Retrieved From
https://www.economicshelp.org/blog/26076/economics/human-
capital-definition-and-importance/
Rashid Saeed, Rab Nawaz Lodhi, Jazba Munir, Shazza Riaz,
Fareha Dustgeer & Amna Sami. (2013). The Impact of Voice of
Customer on New Product. World Applied Science Journal.
24(9): 1255-1260, 2013. Retrieved From
https://pdfs.semanticscholar.org/a7bc/9f0c4ea9c7bda5b648e255
50938c58ccfb09.pdf
Saidi, S., Kattan, L., Jayasinghe, P., Hettiaratchi, P., & Taron,
J. (2018). Integrated infrastructure systems—A review.
Sustainable Cities and Society, 36, 1-11.
Wang, Y., Liu, Y., & Canel, C. (2018). Process coordination,
project attributes, and project performance in offshore-
outsourced service projects. International Journal of Project
Management, 36(7), 980-991.

More Related Content

Similar to Running Head CLOUD TECHNOLOGY AND VIRTUALIZATION CLOUD TECHN.docx

Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docx
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docxTrends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docx
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docxjuliennehar
 
What is-cloud-computing
What is-cloud-computingWhat is-cloud-computing
What is-cloud-computingg1vaddi
 
Cloud Computing Trends in MSMEs (2).pdf
Cloud Computing Trends in MSMEs (2).pdfCloud Computing Trends in MSMEs (2).pdf
Cloud Computing Trends in MSMEs (2).pdfgokulprasanna4
 
Top Emerging Cloud Computing Trends To Look for in 2021.pdf
Top Emerging Cloud Computing Trends To Look for in 2021.pdfTop Emerging Cloud Computing Trends To Look for in 2021.pdf
Top Emerging Cloud Computing Trends To Look for in 2021.pdfinfosec train
 
Cloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate futureCloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate futuredailytimeupdate.com
 
Cloud Computing 2.0
Cloud Computing 2.0Cloud Computing 2.0
Cloud Computing 2.0Ahmed Banafa
 
The cloud promises
The cloud promisesThe cloud promises
The cloud promisesGrand Crue
 
Cloud Computing
 Cloud Computing Cloud Computing
Cloud ComputingAbdul Aslam
 
CLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACHCLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACHSHAIMA A R
 
The Benefits of Cloud Computing for Application Modernization
The Benefits of Cloud Computing for Application ModernizationThe Benefits of Cloud Computing for Application Modernization
The Benefits of Cloud Computing for Application Modernizationbasilmph
 
How the Cloud is Revolutionizing the Retail Industry
How the Cloud is Revolutionizing the Retail IndustryHow the Cloud is Revolutionizing the Retail Industry
How the Cloud is Revolutionizing the Retail IndustryRaymark
 
2010 Cloud Computing
2010 Cloud Computing2010 Cloud Computing
2010 Cloud Computingck4eric
 

Similar to Running Head CLOUD TECHNOLOGY AND VIRTUALIZATION CLOUD TECHN.docx (20)

Cloud Computing Essays
Cloud Computing EssaysCloud Computing Essays
Cloud Computing Essays
 
Facing the Future - Is the cloud right for you?
Facing the Future - Is the cloud right for you?Facing the Future - Is the cloud right for you?
Facing the Future - Is the cloud right for you?
 
Cloud for startups
Cloud for startupsCloud for startups
Cloud for startups
 
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docx
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docxTrends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docx
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docx
 
What is-cloud-computing
What is-cloud-computingWhat is-cloud-computing
What is-cloud-computing
 
Cloud Computing Trends in MSMEs (2).pdf
Cloud Computing Trends in MSMEs (2).pdfCloud Computing Trends in MSMEs (2).pdf
Cloud Computing Trends in MSMEs (2).pdf
 
WHAT IS CLOUD COMPUTING
WHAT IS CLOUD COMPUTINGWHAT IS CLOUD COMPUTING
WHAT IS CLOUD COMPUTING
 
Top Emerging Cloud Computing Trends To Look for in 2021.pdf
Top Emerging Cloud Computing Trends To Look for in 2021.pdfTop Emerging Cloud Computing Trends To Look for in 2021.pdf
Top Emerging Cloud Computing Trends To Look for in 2021.pdf
 
Cloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate futureCloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate future
 
Cloud Computing 2.0
Cloud Computing 2.0Cloud Computing 2.0
Cloud Computing 2.0
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
The cloud promises
The cloud promisesThe cloud promises
The cloud promises
 
Cloud
CloudCloud
Cloud
 
Cloud Computing
 Cloud Computing Cloud Computing
Cloud Computing
 
CLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACHCLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACH
 
Cloud computing whitepaper(2)
Cloud computing whitepaper(2)Cloud computing whitepaper(2)
Cloud computing whitepaper(2)
 
Up in the Clouds
Up in the CloudsUp in the Clouds
Up in the Clouds
 
The Benefits of Cloud Computing for Application Modernization
The Benefits of Cloud Computing for Application ModernizationThe Benefits of Cloud Computing for Application Modernization
The Benefits of Cloud Computing for Application Modernization
 
How the Cloud is Revolutionizing the Retail Industry
How the Cloud is Revolutionizing the Retail IndustryHow the Cloud is Revolutionizing the Retail Industry
How the Cloud is Revolutionizing the Retail Industry
 
2010 Cloud Computing
2010 Cloud Computing2010 Cloud Computing
2010 Cloud Computing
 

More from healdkathaleen

Mill proposes his Art of Life, but he also insists that it is not ve.docx
Mill proposes his Art of Life, but he also insists that it is not ve.docxMill proposes his Art of Life, but he also insists that it is not ve.docx
Mill proposes his Art of Life, but he also insists that it is not ve.docxhealdkathaleen
 
Milford Bank and Trust Company is revamping its credit management de.docx
Milford Bank and Trust Company is revamping its credit management de.docxMilford Bank and Trust Company is revamping its credit management de.docx
Milford Bank and Trust Company is revamping its credit management de.docxhealdkathaleen
 
milies (most with teenage children) and the Baby Boomers (teens and .docx
milies (most with teenage children) and the Baby Boomers (teens and .docxmilies (most with teenage children) and the Baby Boomers (teens and .docx
milies (most with teenage children) and the Baby Boomers (teens and .docxhealdkathaleen
 
Midterm Paper - Recombinant DNA TechnologySome scientists are conc.docx
Midterm Paper - Recombinant DNA TechnologySome scientists are conc.docxMidterm Paper - Recombinant DNA TechnologySome scientists are conc.docx
Midterm Paper - Recombinant DNA TechnologySome scientists are conc.docxhealdkathaleen
 
Midterm Study GuideAnswers need to be based on the files i will em.docx
Midterm Study GuideAnswers need to be based on the files i will em.docxMidterm Study GuideAnswers need to be based on the files i will em.docx
Midterm Study GuideAnswers need to be based on the files i will em.docxhealdkathaleen
 
Michelle Carroll is a coworker of yours and she overheard a conversa.docx
Michelle Carroll is a coworker of yours and she overheard a conversa.docxMichelle Carroll is a coworker of yours and she overheard a conversa.docx
Michelle Carroll is a coworker of yours and she overheard a conversa.docxhealdkathaleen
 
Michelle is attending college and has a part-time job. Once she fini.docx
Michelle is attending college and has a part-time job. Once she fini.docxMichelle is attending college and has a part-time job. Once she fini.docx
Michelle is attending college and has a part-time job. Once she fini.docxhealdkathaleen
 
Midterm Assignment Instructions (due 31 August)The mid-term essay .docx
Midterm Assignment Instructions (due 31 August)The mid-term essay .docxMidterm Assignment Instructions (due 31 August)The mid-term essay .docx
Midterm Assignment Instructions (due 31 August)The mid-term essay .docxhealdkathaleen
 
Milestone 2Outline of Final PaperYou will create a robust.docx
Milestone 2Outline of Final PaperYou will create a robust.docxMilestone 2Outline of Final PaperYou will create a robust.docx
Milestone 2Outline of Final PaperYou will create a robust.docxhealdkathaleen
 
MigrationThe human population has lived a rural lifestyle thro.docx
MigrationThe human population has lived a rural lifestyle thro.docxMigrationThe human population has lived a rural lifestyle thro.docx
MigrationThe human population has lived a rural lifestyle thro.docxhealdkathaleen
 
Mid-TermDismiss Mid-Term1) As you consider the challenges fa.docx
Mid-TermDismiss Mid-Term1) As you consider the challenges fa.docxMid-TermDismiss Mid-Term1) As you consider the challenges fa.docx
Mid-TermDismiss Mid-Term1) As you consider the challenges fa.docxhealdkathaleen
 
MicroeconomicsUse what you have learned about economic indicators .docx
MicroeconomicsUse what you have learned about economic indicators .docxMicroeconomicsUse what you have learned about economic indicators .docx
MicroeconomicsUse what you have learned about economic indicators .docxhealdkathaleen
 
Michael Dell began building and selling computers from his dorm room.docx
Michael Dell began building and selling computers from his dorm room.docxMichael Dell began building and selling computers from his dorm room.docx
Michael Dell began building and selling computers from his dorm room.docxhealdkathaleen
 
Michael is a three-year-old boy with severe seizure activity. He h.docx
Michael is a three-year-old boy with severe seizure activity. He h.docxMichael is a three-year-old boy with severe seizure activity. He h.docx
Michael is a three-year-old boy with severe seizure activity. He h.docxhealdkathaleen
 
Michael graduates from New York University and on February 1st of th.docx
Michael graduates from New York University and on February 1st of th.docxMichael graduates from New York University and on February 1st of th.docx
Michael graduates from New York University and on February 1st of th.docxhealdkathaleen
 
Message Using Multisim 11, please help me build a home security sys.docx
Message Using Multisim 11, please help me build a home security sys.docxMessage Using Multisim 11, please help me build a home security sys.docx
Message Using Multisim 11, please help me build a home security sys.docxhealdkathaleen
 
Methodology of H&M internationalization Research purposeRe.docx
Methodology of H&M internationalization Research purposeRe.docxMethodology of H&M internationalization Research purposeRe.docx
Methodology of H&M internationalization Research purposeRe.docxhealdkathaleen
 
Mental Disability DiscussionConsider the typification of these c.docx
Mental Disability DiscussionConsider the typification of these c.docxMental Disability DiscussionConsider the typification of these c.docx
Mental Disability DiscussionConsider the typification of these c.docxhealdkathaleen
 
Meningitis Analyze the assigned neurological disorder and prepar.docx
Meningitis Analyze the assigned neurological disorder and prepar.docxMeningitis Analyze the assigned neurological disorder and prepar.docx
Meningitis Analyze the assigned neurological disorder and prepar.docxhealdkathaleen
 
Memoir Format(chart this)Introduction (that captures the r.docx
Memoir Format(chart this)Introduction (that captures the r.docxMemoir Format(chart this)Introduction (that captures the r.docx
Memoir Format(chart this)Introduction (that captures the r.docxhealdkathaleen
 

More from healdkathaleen (20)

Mill proposes his Art of Life, but he also insists that it is not ve.docx
Mill proposes his Art of Life, but he also insists that it is not ve.docxMill proposes his Art of Life, but he also insists that it is not ve.docx
Mill proposes his Art of Life, but he also insists that it is not ve.docx
 
Milford Bank and Trust Company is revamping its credit management de.docx
Milford Bank and Trust Company is revamping its credit management de.docxMilford Bank and Trust Company is revamping its credit management de.docx
Milford Bank and Trust Company is revamping its credit management de.docx
 
milies (most with teenage children) and the Baby Boomers (teens and .docx
milies (most with teenage children) and the Baby Boomers (teens and .docxmilies (most with teenage children) and the Baby Boomers (teens and .docx
milies (most with teenage children) and the Baby Boomers (teens and .docx
 
Midterm Paper - Recombinant DNA TechnologySome scientists are conc.docx
Midterm Paper - Recombinant DNA TechnologySome scientists are conc.docxMidterm Paper - Recombinant DNA TechnologySome scientists are conc.docx
Midterm Paper - Recombinant DNA TechnologySome scientists are conc.docx
 
Midterm Study GuideAnswers need to be based on the files i will em.docx
Midterm Study GuideAnswers need to be based on the files i will em.docxMidterm Study GuideAnswers need to be based on the files i will em.docx
Midterm Study GuideAnswers need to be based on the files i will em.docx
 
Michelle Carroll is a coworker of yours and she overheard a conversa.docx
Michelle Carroll is a coworker of yours and she overheard a conversa.docxMichelle Carroll is a coworker of yours and she overheard a conversa.docx
Michelle Carroll is a coworker of yours and she overheard a conversa.docx
 
Michelle is attending college and has a part-time job. Once she fini.docx
Michelle is attending college and has a part-time job. Once she fini.docxMichelle is attending college and has a part-time job. Once she fini.docx
Michelle is attending college and has a part-time job. Once she fini.docx
 
Midterm Assignment Instructions (due 31 August)The mid-term essay .docx
Midterm Assignment Instructions (due 31 August)The mid-term essay .docxMidterm Assignment Instructions (due 31 August)The mid-term essay .docx
Midterm Assignment Instructions (due 31 August)The mid-term essay .docx
 
Milestone 2Outline of Final PaperYou will create a robust.docx
Milestone 2Outline of Final PaperYou will create a robust.docxMilestone 2Outline of Final PaperYou will create a robust.docx
Milestone 2Outline of Final PaperYou will create a robust.docx
 
MigrationThe human population has lived a rural lifestyle thro.docx
MigrationThe human population has lived a rural lifestyle thro.docxMigrationThe human population has lived a rural lifestyle thro.docx
MigrationThe human population has lived a rural lifestyle thro.docx
 
Mid-TermDismiss Mid-Term1) As you consider the challenges fa.docx
Mid-TermDismiss Mid-Term1) As you consider the challenges fa.docxMid-TermDismiss Mid-Term1) As you consider the challenges fa.docx
Mid-TermDismiss Mid-Term1) As you consider the challenges fa.docx
 
MicroeconomicsUse what you have learned about economic indicators .docx
MicroeconomicsUse what you have learned about economic indicators .docxMicroeconomicsUse what you have learned about economic indicators .docx
MicroeconomicsUse what you have learned about economic indicators .docx
 
Michael Dell began building and selling computers from his dorm room.docx
Michael Dell began building and selling computers from his dorm room.docxMichael Dell began building and selling computers from his dorm room.docx
Michael Dell began building and selling computers from his dorm room.docx
 
Michael is a three-year-old boy with severe seizure activity. He h.docx
Michael is a three-year-old boy with severe seizure activity. He h.docxMichael is a three-year-old boy with severe seizure activity. He h.docx
Michael is a three-year-old boy with severe seizure activity. He h.docx
 
Michael graduates from New York University and on February 1st of th.docx
Michael graduates from New York University and on February 1st of th.docxMichael graduates from New York University and on February 1st of th.docx
Michael graduates from New York University and on February 1st of th.docx
 
Message Using Multisim 11, please help me build a home security sys.docx
Message Using Multisim 11, please help me build a home security sys.docxMessage Using Multisim 11, please help me build a home security sys.docx
Message Using Multisim 11, please help me build a home security sys.docx
 
Methodology of H&M internationalization Research purposeRe.docx
Methodology of H&M internationalization Research purposeRe.docxMethodology of H&M internationalization Research purposeRe.docx
Methodology of H&M internationalization Research purposeRe.docx
 
Mental Disability DiscussionConsider the typification of these c.docx
Mental Disability DiscussionConsider the typification of these c.docxMental Disability DiscussionConsider the typification of these c.docx
Mental Disability DiscussionConsider the typification of these c.docx
 
Meningitis Analyze the assigned neurological disorder and prepar.docx
Meningitis Analyze the assigned neurological disorder and prepar.docxMeningitis Analyze the assigned neurological disorder and prepar.docx
Meningitis Analyze the assigned neurological disorder and prepar.docx
 
Memoir Format(chart this)Introduction (that captures the r.docx
Memoir Format(chart this)Introduction (that captures the r.docxMemoir Format(chart this)Introduction (that captures the r.docx
Memoir Format(chart this)Introduction (that captures the r.docx
 

Recently uploaded

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 

Recently uploaded (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 

Running Head CLOUD TECHNOLOGY AND VIRTUALIZATION CLOUD TECHN.docx

  • 1. Running Head: CLOUD TECHNOLOGY AND VIRTUALIZATION CLOUD TECHNOLOGY AND VIRTUALIZATION 6 Project Deliverable 4: Cloud Technology and Virtualization Charles Tinsley Dr. Mark Cohen CIS 599 August 17, 2019 Introduction The company’s operations will result in the generation of large amounts of data, which will necessitate the introduction of tools capable of handling the data. Many organizations are increasingly turning towards cloud technology as the preferred technology tool to effectively deliver the tools and capabilities for the management of the data. On the other hand, the adoption of virtualization will result in cost savings as it is a technology with minimal hardware requirements.
  • 2. Need for Cloud Technology and Virtualization Cloud technology delivers computing resources to a client from a remote data center. From their computer terminal, a user can access cloud resources through the use of a browser and with an internet connection. This saves the user or organization the need of installing various technology resources within their premises and having to cater to the accompanying costs of maintaining them. Cloud technology provides organizations with the capability to access multiple computer resources like storage, database, applications, networking, development, and management tools, as well as security solutions from a cloud vendor. The latter will provide a portal where all these resources can be easily accessed. The cloud vendor gets to maintain the physical data centers where all these computing resources are hosted. These resources are always online, meaning a client can access at any time, day or night, from anywhere in the world as long they have an internet connection. It also supports access from various devices, including the ubiquitous mobile devices like tablets and smartphones, further spreading the reach of cloud technology. With virtualization, there will be a maximization of the hardware resources of an organization. Virtualization allows for the creation of virtual machines, and many of them can be created in a single server. This only necessitates the company to keep a small number of servers, which are already available, hence no need to purchase new ones. With a reduced number of physical servers to maintain, it will mean lower costs with the attendant benefits of virtualizations. A virtual machine operates as an independent computing environment, allowing for various operations and applications to run as if on separate physical computers (Bizarro, & Garcia, 2015). There is always an expectation that a company will experience significant growth over a given period. There is the need to ensure the available tools and resources are indeed capable of supporting such growth. When selecting the technology to be implemented, it will be important to consider its scalability, the
  • 3. capacity to expand in its capabilities to support the increased workload by the organization’s operations. Usually, such growth would require investment in a completely new set of infrastructure since the existing isn’t designed to handle the increased loads. However, given the cost of investing in new infrastructure is high, many organizations prefer acquiring that is capable of adapting to the change in size and scope of its operations with ease. Cloud technology offers a virtually infinite capability for scalability, allowing for capacity to be added on demand. Also, cloud vendors enable the clients to only pay for the capacity they utilize, which can rise or fall depending on the operations. With virtualization, scalability is achieved by the capability to create new virtual machines as needed. A single server can hold a vast number of virtual machines. The available servers can support as many independent computing environments as needed (Krutz, & Vines, 2014). There is a noted increase in cyberattacks targeted towards corporations, with many of them resulting in devastating consequences for the victim companies. With the current security environment, many organizations understand that these attacks are inevitable. With that in mind, these organizations then come up with mitigation measures that allow them to weather these attacks with minimal damage to their infrastructure and minimal disruption to their operations. With cloud technology, a company is provided with a solution for disaster recovery that allows it to avoid these damages. Since the cloud vendor is responsible for hosting the computer resources, they put in place measures that ensure an attacker is severely limited in the amount of damage and disruption they can cause. These include defense-in-depth and segmentation, among other security solutions. A successful attack is unlikely to cause any noticeable damage, with the system able to be restored in less time than if it was hosted within a company’s premises. Regular backups ensure that the most recent versions of computer resources are always available, allowing for
  • 4. operations to resume as soon as possible. Most cloud vendors have data centers in many different locations, allowing for one to take over should another fail. A virtualization solution provides for independent environments which ensure that the failure of one virtual machine will not result in the failure of others within the same server (Pearson, 2013). Cost Savings in Hardware Infrastructure Investment in hardware infrastructure is usually one of the biggest IT costs for many organizations. Beyond the initial investment, they also have to factor in the cost of maintenance, including the qualified personnel. With the speed of the advancement of technology, more often than not, a company might find itself with hardware that has essentially been rendered obsolete, necessitating further investment. However, with cloud technology, a company no longer has to worry about how much to spend on hardware. The cloud vendor is responsible for physical data centers where the resources are hosted, along with the attendant costs of maintaining the centers and their hardware. As a result of economies of scale, they can pass along the savings to their customers, resulting in lower prices. The company will only need internet-capable devices to access their cloud-hosted resources, with no further need for investment in any hardware from them. Virtualization only requires a few servers, with the company having no need for the excess servers. With the capability to host a huge of virtual machines, the cost of hardware maintenance can be kept as low as possible (Krutz, & Vines, 2014). For many organizations in their early stages of growth, they are limited in the number of funds available to them. As such, the implementation of technology that requires minimal investment in hardware is a benefit to them. On top of that, cloud vendors can offer top-notch services at considerably lower prices, allowing the company to have access to superior solutions and technologies without the high investment and maintenance costs (Pearson, 2013). Reduction in Human Capital
  • 5. With the cloud vendor handling most of the responsibilities necessary to ensure the continued availability of resources and services to customers, the company will not need to employ its personnel. The company will only maintain a minimal workforce as far as the system is concerned, having a lower human capital spend on this aspect of its operations. Most of the activities and operations will be automated, with human involvement only being done when it is it is necessary. These will mostly be a few system administrators with privileges and will take over when needed to only (Krutz, & Vines, 2014). Aligning Cloud Technology to Business Processes Solution Providers The largest cloud vendor currently is Amazon Web Services (AWS), who are pioneers in the enterprise cloud market. Other companies in the market include Microsoft Cloud and Google Cloud Platform. With its longevity operating in this sector, AWS has been able to implement advanced technology and deliver quality services to its customers, making the best option for the company. AWS can provide storage, applications,
  • 6. database, and database management, computer services, networking, analytic tools to carry out big data solutions as well as security and development tools. AWS allows for its clients to only pay for the capacity they utilize, hence lower while availing the capability scale as needed. References Bizarro, P. A., & Garcia, A. (2015). VIRTUALIZATION: BENEFITS, RISKS, AND CONTROL. Internal Auditing, 28(4), 11-18. Krutz, R. L., & Vines, R. D. (2014). Cloud security: A comprehensive guide to secure cloud computing. Wiley Publishing. Pearson, S. (2013). Privacy, security, and trust in cloud computing. In Privacy and Security for Cloud Computing (pp. 3-42). Springer London. Running head: DATABASE AND DATA WAREHOUSING DESIGN DATABASE AND DATA WAREHOUSING DESIGN
  • 7. 11 Project Deliverable 3: Database and Data Warehousing Design Section 1: Design Document Charles Tinsley Dr. Mark Cohen CIS 599 August 13, 2019
  • 8. Introduction Data warehousing and relational databases have become very popular these days for corporations and businesses. It has become a standard for almost every company that intends to compete effectively in the current world to own this unique technology. Data from different sources such as sales and marketing departments, finance department, and human resources department in a company is collected, stored, and processed in a database. The operational systems used in these sources help to gather and disseminate data to the database. This data is then analyzed to produce reports that may assist the
  • 9. management in making strategic decisions. When a company makes decisions based on real data, then it can stay a step ahead of the competitors, among other benefits. It is important to note that database design plays a crucial role in determining the effectiveness of the flow of data in a system (Beynon-Davies, 2013). In our context, a relational database and data warehousing will be very effective in the storage and processing of data. Incorporating this technological solution into the information network will enable consolidation of all data from within and outside the company into one place hence making it easier to manage. Need for the Relational Database and Data Warehousing Since the majority of the business activities and operations in our company are online-based, then data warehouse will be one of the best options to establish. Information from throughout the organization will be aggregated into a single repository. The data collected can then be utilized later to analyze various business activities. Analysis of data in the data warehouse will help in revealing the status quo of the company since it based on facts (Van Aken et al., 2017). A data warehouse is a central repository area for all the company's data which helps the management to access unique data that may not be found in other areas. The sources of data include the Enterprise Resource Planning (ERP) system, operating system, and the database will give distinct data in
  • 10. different formats. A data warehouse will help in the processing of this data into simple formats that will be easy to comprehend. The good thing about a data warehouse is that processing of data will be done in one centralized location instead of different operational systems. Since our company receives data from many clients, sometimes making it hard and costly to manage it, then the data warehouse will provide a solution to this problem. The data warehouse will aggregate it to avail a database that is reportable and searchable. The data warehouse will also enable consistency of the data by establishing a similar process for all varieties of data. One of the major purposes for the establishment of a data warehouse will be to give more insight into the data aggregated into it. The insight from the information generated will be used in strategic planning, decision making, and supporting other activities of the management (Beynon-Davies, 2013). By taking into consideration the importance of the decision-making process in a company, then this project must be implemented as soon as possible. The insight from the data warehouse will be easy to understand by all people in the company from juniors to senior managers. Decisions made by the management will touch every department of the company; hence, information derived from the data warehouse will be reliable since the raw data will have been from all departments. When a data warehouse is not available, and every department is expected to generate its
  • 11. report, the data is independent of other departments hence not entirely reliable. This sometimes confuses the management during the interpretation of reports since different departments use distinct approaches and formats to process and analyze data. Data warehouse eliminates such confusion and all possible errors by generating consistent data in a centralized processing location. A data warehouse enables storage and easy analysis of historical data based on past activities within or outside the company. In most cases, past performance enables accurate prediction of the future. Hence historical data should be treated as a vital part of the company. Many big organizations thrive on analysis of past data, which enables them to dominate in the market. Having access to prior data is one of the key aspects that allow big organizations to outdo startups. Such organizations use past data to analyze risks; hence, they know which direction to take at all times. This help to avoid or reduce the effects of certain unfavorable scenarios before they happen. Reports from past data enable organization management to make effective decisions. To ensure that the data that is received and stored in the database is reliable, then the right kind of information should be fed to it at all times (Cuzzocrea et al., 2017). All the data sources should be verified to ensure data integrity and avoid contamination. A data warehouse will help in data mining; this involves
  • 12. processing and analysis of big amounts of data to produce patterns and establish the relationship between different sets of unrelated data. The data in the data warehouse originate from different sources and have different formats. The data also arrives in a raw and unstructured state, which is hard to interpret. The data in its original state cannot provide the expected insight; hence, it needs to be processed to be meaningful. Data mining process enables sorting out and processing of large chunks of data in the data warehouse to identify patterns and relationship among different sets of data (Cuzzocrea et al., 2017). For example, the relationship between sales and prices can be established by the use of a graph, table, or pattern. The main goal of data mining is to provide insights to assist in making accurate predictions. Data mining also helps identify problems in a company based on analyzed data. Various parameters are utilized to produce results during the data mining process enabled by data mining tools and techniques. Data warehousing come in handy with data visualization tools. This is in addition to its data analytic capabilities. The data visualization tools enable a better presentation of the analyzed reports. After analyzing data, users need to view it to understand it. The process of presentation is, therefore, very important; hence, it should be made easy. In the past presentation of data was text-based data, but with the advancement in technology, this has changed. Data visualization
  • 13. tools are now used in the data warehouse to present data in a more easily understandable format. There is a dashboard where users can see the data information in various detailed versions such as infographics, geographic maps, spark lines, and heat maps (Beynon-Davies, 2013). Initially, texts were presented in simple bar graphs and charts, but today, more detailed and better visualization tools are continuing to dominate the market. The modern visualization tools offer a more effective solution for data analytics as they easily identify trends, patterns, and correlations in data. The data is manipulated by the tools within a short period to provide real-time graphical reports. Data warehouses process data within a short period hence proves to be one of the best technology solutions to be preferred by any Internet-based companies that need to process a large amount of data. Speed will help to save time and cost that would otherwise have been incurred if data processing was done manually or using other slower means. The data warehouse will analyze large amounts of data at a faster rate than when human users are used. This technological solution will help in quick processing of queries during emergency meetings when the management wants a quick data processing. Most times in businesses emergencies do not have set times hence require quick feedback which can be facilitated by shorter data processing of the warehouse. The data warehousing has higher data processing capability than most of the ordinary operational
  • 14. systems; it should be a priority. The data warehouse also processes data without impartiality associated with human beings hence making reports from the more reliable and accurate. A data warehouse is highly secure to store the company’s data. Confidential data such as personal data of clients, financial data, and sales data can be safeguarded in the data warehouse without unauthorized access that can lead to a data breach. With the high data breaches in the world resulting from hacking and illegal entry, every company should put in place security measures to protect its data (Elmasri, & Navathe, 2017). A data breach can be detrimental to the involved company in a variety of ways such as financial loss, brand tarnishing, and getting sued. Due to the centralized data processing state of the data warehouse, the security also becomes centralized. This is contrary to a situation where there are many entry and exit points in the database, making it difficult to monitor and control the access. The data warehouse can also enable encryption of the data stored in hence preventing unauthorized access. Database Schema A database schema helps to illustrate the logical design of the database. A database schema indicates a part of the database to be implemented. Components of the database, descriptions on data organization, attributes, and the relationship between different components are indicated on the database schema.
  • 15. Below is a schema for part of the database that will be ideal for our company. Diagram 1: Database Schema The schema above is for the employee records for one of the company’s customers. The schema indicates the relationship between employees’ information and various components of the organization. The components of the organization indicated to be relating closely with employees’ records include titles, departments, salaries, and department managers. Entity Relationship Diagram (ERD) Diagram 2: Entity Relationship Diagram (ERD) The entity-relationship diagram above indicates the available tables of employees, projects, departments, and salaries. The table "works at" indicates a one-to-many relationship while table "works on" indicates a many-to-many relationship (Cuzzocrea et al., 2017).
  • 16. Data Flow Diagram The Data Flow Diagram (DFD) above indicates the setup for the system functionalities. Diagram 3: Data Flow Diagram Diagram 4: Flow of Data used in the Data Warehouse Operational System Sales ETL Extraction, Transformation, and Loading
  • 17. ERP Marketing Data Warehouse OLAP Server CRMProcurement Human Resources SCM R&D Flat Files Senior Management
  • 18. Conclusion In the current world, data warehouses and relational databases have become a standard requirement for all organizations that want to compete effectively. The market has become very competitive place hence the need for relying upon data analytics. Data analytics have experienced massive growth in recent years with high expectations of this continued growth in the coming years. Data warehousing and relational databases avail a good opportunity for organizations to benefit from data analytics, which will give them a competitive advantage and a chance for scalability in the future. Therefore, the implementation of these technologies should be prioritized by the management of any company.
  • 19. References Beynon-Davies, P. (2013). Database systems. Basingstoke: Macmillan. Cuzzocrea, A., Darmont, J., & Mahboubi, H. (2017). Fragmenting very large XML data warehouses via k-means clustering algorithm. arXiv preprint arXiv:1701.02190. Elmasri, R., & Navathe, S. (2017). Fundamentals of database systems. Pearson. Van Aken, D., Pavlo, A., Gordon, G. J., & Zhang, B. (2017, May). Automatic database management system tuning through large-scale machine learning. In Proceedings of the 2017 ACM International Conference on Management of Data (pp. 1009- 1024). ACM.
  • 20. Running head: NETWORK INFRASTRUCTURE AND SECURITY NETWORK INFRASTRUCTURE AND SECURITY9 Project Deliverable 5: Network Infrastructure and Security Charles Tinsley Dr. Mark Cohen CIS 599 August 25, 2019
  • 21. Introduction The company is on an upward growth trajectory and requires information technology infrastructure to support this expansion. The solution will need to be one that takes scalability into consideration to ensure the company does not have to spend more funds in the future to upgrade. With the growing threat of cyberattacks, security will need to be another important consideration for the development team, with tools to anticipate and respond to security incidents built into the system. Network Vulnerabilities In the everyday operations of an information system, traffic will move in and out of the network, with users sending and receiving data. However, within this traffic is the possibility of malicious content attempting to gain entry into the network to cause damage to it. To avoid this, a network administrator will implement a variety of intrusion detection measures to ensure the security of the system. These solutions can, however, fail, and malware can make its way into the network. The biggest reason for this is usually the poor configuration of the security solutions that make easy conduits for malicious content. Intrusion prevention systems like firewalls often work by
  • 22. screening traffic against a database of known threats, blocking any piece of traffic that matches any of these threats. But newer threats that have yet to be included in the database might pass through the security tool uninhibited. It is crucial to carry out regular system scans that will discover weaknesses within the system that should be fixed and updated to reflect emerging threats and vulnerabilities (Cranor, & Garfinkel, 2015). The adoption of cloud technology tools allows the company to implement a variety of progressive solutions to its workplace like telecommuting, where users can work from home or away on vacation and so forth. There are however issues with such a solution where threats can be introduced into the network from the devices used to access the cloud resources Without these security requirements; these employee devices can be the conduits through which malicious content is introduced into the company network. To amend this situation, it is vital to implement a veritable bring your device (BYOD) policy that will guide how employees will use their devices to access company resources. It should include fundamental security requirements for the devices, as well as recommended tools (Cranor, & Garfinkel, 2015). Employee turnover is a normal part of the operations of any company, with employees coming in and leaving depending on the needs of the company. Given that each employee is issued with credentials that they use to access the company’s systems,
  • 23. these might be misused. It could be the employee can continue accessing company resources after they have left, or their. Company policy is ideally meant to require that the credentials of a departing employee be deactivated the moment their departure is effective. Leaving the credentials dormant becomes a point of vulnerability for the network since anyone that uses the account might appear legitimate even when they are not (Cranor, & Garfinkel, 2015). While virtualization allows for the creation of multiple virtual environments that are independent of each other, these are still located within a single server. The failure of such a server will mean the loss of the virtual machines it hosts and all the company processes and applications hosted within those virtual machines. It is vital to have multiple servers that will enable failover solutions for the servers in cases of disaster or downtimes. Offsite backups should also be considered as another measure to lessen the vulnerability of the system (Rittinghouse, 2015). Logical and Physical Topographical Layout The physical network will use a star topology solution where network devices will be converging on a central hub. On this hub, they will be able to receive various network resources like access to the cloud, bandwidth, and network security. The star topology will make it easier for these resources to deploy effectively and for network administrators to manage the system
  • 24. more efficiently (Shinde, 2014). The logical network will be developed under the bus topology, different from the physical topology since their operations are implemented independently of each other. The bus topology is a solution where computers in a network are connected to a central line that acts as a backbone. The computers can then request for resources from this backbone(Shinde, 2014). Figure 1 - Physical Layout Figure 2 - Logical Layout Security Policy Data confidentiality is when access to a computer resource is limited only to the user with express authorization to do so. The company data with different levels of sensitivity, and therefore, the access controls will differ depending on the data that is accessed. On the other hand, with different users with permissions to access resources within the network, they will have different levels of access granted to them, which will largely depend on the user’s roles and responsibilities within the organization making confidentiality a smooth operation, it will be necessary to classify the data within the company and the employees as well. Data classification will ensure each piece of data has been provided with its level of sensitivity that
  • 25. will determine the kind of access controls to be placed on them. Employee classification will give all users a security profile that will take their job description and provide with varying access privileges within the network. When deciding on privileges to be granted to employees, the principle of least privilege should be used. This is where a user is provided only with the minimum access privileges to network resources that are required to perform their responsibilities. This will ensure the number of users with unlimited access privileges remains the administrators that need them to effectively manage the network (Cranor, & Garfinkel, 2015). Data integrity is the state of a piece of data remaining safe from undue modification while is being transmitted. A piece of data is said to have retained its integrity if it remains in the same state when it reaches the final recipient as it was when sent by the original sender. The company transmits information daily, whether among the employees of the company, to external partners, customers, and so forth. This information needs to be safe from any actions or situations that would lead to the recipients receiving tainted data. This unauthorized modification of data can be from cyber-attackers that intercept the data while it is being transmitted to their final recipients. They can then distort the data to have it that the recipients get a different message or have access to sensitive information like business secrets.
  • 26. The information shared by a company, internally or externally is vital to its interests. Some of this is used by senior executives for critical decision making that will influence the company’s strategic vision. As such, any undue modification to the data will lead to these decisions being based on untrustworthy data, with the repercussions going throughout the company. To avoid threats to data integrity, it is necessary to institute actions that will secure the transmission process. One the best ways to do this will be through encryption, where the data is converted to code before being sent. The legitimate is then provided with a key they will use to decrypt the information when it reaches them. This ensures that even the data is intercepted, the unauthorized user will have no way accessing the data without the corresponding key (Cranor, & Garfinkel, 2015). Availability is the state where a system remains accessible and sufficiently operable to its users. This is important for both employees to access these resources to carry out their responsibilities and the company’s customers access its products and services. For the company to conduct its operations as effectively as possible, it will be necessary that it maintains the availability of these operations. An e-commerce solution where customers shop on its site requires that these customers can access the site at all times and conduct all the activities they need to without downtime or drag. If downtime occurs, the company will lose hours of productivity as well as
  • 27. missed business opportunities in term of sales. It will also damage the company’s reputation by making customers view its services as unreliable, which will hurt future earning potential. Availability of computer resources can be caused by among others, power failures, system outages, natural disasters, as well as cyberattacks like distributed denial of service (DDoS) attacks. As such, it is crucial to implement a regime of system resilience for the network that will make strong enough to withstand a variety of threats to it without resulting in damages or downtime. Activities like penetration tests can be used to gauge just how much the network can withstand an attack before breaking down. The results of the tests will then be used to implement a variety of upgrades to strengthen the system. But even with tools to ensure the resilience of the network, it will be necessary to provide tools that take into account the possibility of disaster happening. Even with all measures taken, there is still the possibility for catastrophe to occur. In that case, there needs to be a disaster recovery and business continuity plan in place that will act as a response strategy for the event disaster strikes. Regular backups will ensure that the most recent version of the data is available to be accessed in case of disaster (Cranor, & Garfinkel, 2015). Network Components Figure 3 - Network Components
  • 28. Ethics in the Network Ethics within the network will take the form of an enforced confidentiality clauses in contracts as well as non-disclosure agreements. Once signed, the party will be bound to keep all of the company’s information they interact with confidential. Failure to do so will result in legal proceedings against the offending party (Patrignani, & Whitehouse, 2015). Employees will be required to implement strong passwords that are difficult to hack. This will be after they have been provided with credentials unique to them that should not be shared by any other employee. Strong passwords need to use both alphanumeric and special characters to be effective, with a reasonable length also (Cranor, & Garfinkel, 2015). References Cranor, L. F., & Garfinkel, S. (2015). Security and usability: Designing secure systems that people can use. Beijing: O'Reilly. Patrignani, N., & Whitehouse, D. (2015). Slow tech: bridging computer ethics and business ethics. Information Technology & People, 28(4), 775-789. Rittinghouse, J. W. (2015). Cloud Computing: Implementation, Management, and Security. Hoboken: CRC Press Shinde, S. S. (2014). Computer network. New Delhi: New Age
  • 29. International Ltd. Project Deliverable Project Deliverable 6 Project Deliverable Charles Tinsley Dr. Mark Cohen CIS 599 July 14, 2019 Introduction Home Shopping is one of the leading online retailers that allows consumers to shop for products at the comfort of their homes. Just like the name suggests, Home Shopping allows users to shop for various products without having to visit the stores physically. They place an order of the products, and the products are delivered right at their doorstep. Within the recent developments of technologies, there has been an increasing
  • 30. trend of consumers preferring to carry out online shopping as they have found out that this saves on cost and time as they do not have to physically visit the supermarkets and grocery stores to conduct their shopping activities. Recent studies carried out indicate that over one billion people around the world to purchase goods online (Nguyen, De Leeuw, & Dullaert, 2016). The number is expected to grow tremendously with the increased use of technology around the world. Well, numbers do not lie, and online retailing has been one of the biggest trends and opportunities for entrepreneurs in recent years. Background Information Home Shopping was established in the early 2000s in the wake of the dot com generation. It was during this period that the use of the internet started to pick up. With the company’s being located in San Francisco, California, the company has been able to grow to all states in the United States and outside the United States of America. The company first began as an online marketplace for clothing products but later shifted course and included other products ranging from grocery products, books, to electronics. Home Shopping established its first warehouse in San Francisco but later opted to rather collaborate with clothing stores when it changed its business models. The company has collaborated with various stores across the world and acts as the middleman between the consumers and other retailers. It began
  • 31. with five employees but has grown up to 25 employees currently operating in a one-floor office. These employees range from drivers, warehouse employees, and customer care employees that can link up the consumers with the different sellers. In the recent financial year reports released by the company, it is estimated that the company made over $50 million in terms of revenue in the past financial year. To expand its business operations, Home Shopping has opted to merge with a multinational company. This will help expand its customer base and sales in the years to come. Business Activities Home Shopping supporting trading community on the internet via the world wide web. It provides a platform for other retailers that it has collaborated with to sell products to buyers. It also sells a variety of items directly to consumers through the company’s online storefront. Most consumers visit the company’s website with the assumptions that the products are less expensive and are readily available for purchase and shipping. In cases where the goods that they are consumers are searching do lack in the company’s warehouse, the customer is referred to a seller with the product. The company deals with a large portfolio of products that range from clothing, kitchenware, electronics, books, jewelry, liquor drinks, to online music and movies streaming. In recent years, the
  • 32. company has introduced grocery products in its products portfolio. It has been able to collaborate with various grocery stores where consumers can order for grocery products and are delivered on the same day. This option has been tested in multiple states across the United States and has proved to be successful, and the company has plans to expand it to other countries in which the company operates. This might be on reality soon with the expected merge with DHL. DHL is a multinational company that offers transportation and courier services. This merger will help the company in its transportation and logistics services. It will help in faster delivery of customer orders. The customers can easily track the progress of their delivery and can be able to estimate the exact time delivery will take. One of the objectives of the company is to improve its delivery time for goods as this is one of the important aspects when it comes to online retailing. The company will also be able to expand some of its business operations too. Outsourcing and Offshoring Opportunities Home Shopping has benefited greatly from outsourcing of its inventory management and labor. It has been able to save a lot of costs by outsourcing labor, especially when it comes to some of the human resource activities. It has been able to reduce its employees up to 25 in total, which makes it easy to manage.
  • 33. Outsourcing its inventory management has enabled it to provide its customers with faster delivery from the company directly. Inventory management is a critical process in any business or organization, and Home Shopping has utilized it to be able to operate efficiently. Almost 90% of the company’s sales mainly comprise of third-party sellers. It outsources items that are not regularly ordered and stored in the company’s warehouse. It has been able to offshore outsource its logistics and delivery options in the international markets that it operates. This ensures that product delivery is made in the fastest way possible and ensure that customer satisfaction is at its level best (Yao, Huang, Song, & Mishra, 2018). With the introduction of grocery items in the products portfolio, consumers can receive the grocery products that they make an order. Current Information System The company relies heavily on its information system for its day to day business operations. The current system allows users to place an order which is then transferred to the warehouse. At the warehouse, the system checks if the product is in stock and if not advises the customer the best seller to get the product from. If the product is available at the warehouse, it informs the employees the exact location of the product, and this saves time for searching for the product. After locating the product, the
  • 34. system then advises the employees on the type of packaging needed for the product. After packaging the system ticks a green light indicating that the product has left the warehouse and informs the customer. Depending on the location of the customer, the system selects the best delivery option and how long it would take for the order to be shipped to the consumer. The consumer has an opportunity to track the progress of the shipment after the delivery has begun. The current databases store the company’s business operation ranging from inventory to consumer’s data. The database stores inventory about goods that are available in the warehouse. And those that are available with the sellers. It also stores the information is given out by the customers such as their names, locations, and payment methods. These databases are linked up together in the data warehouse. Data warehousing has provided crucial information for analysis for the company’s future trends. The company makes use of cloud computing for storage of the big chunks of data collected every day. The network infrastructure helps link up the company with different outsources. There have been various security challenges facing the current information system. One of the key challenges is that the current system cannot be able to integrate with new technologies and also keep up with the changing technologies. The current system does not fully meet organizational demands. References
  • 35. Nguyen, D. H., De Leeuw, S., & Dullaert, W. E. (2016). Consumer Behaviour and Order Fulfilment in Online Retailing: A Systematic Review. International Journal of Management Reviews, 20(2), 255-276. doi:10.1111/ijmr.12129 Yao, X., Huang, R., Song, M., & Mishra, N. (2018). Pre- positioning inventory and service outsourcing of relief material supply chain. International Journal of Production Research, 56(21), 6859-6871. doi:10.1080/00207543.2018.1495853 Running head: pROJECT DELIVERABLE 2 1 pROJECT DELIVERABLE 2 8Business Requirements Document Charles Tinsley Dr. Mark Cohen CIS 599 July 28, 2019
  • 36. Business Requirements Document Providing better services to customers is one of the keys to a successful business. Fulfilling customer’s requirements helps achieve customers satisfaction; an important tool that drives the business towards achievement. Customers’ requirements are those needs that determine whether or not the customer needs have been satisfied with the products. According to Spacey (2017), a customer requirement is a specification that originates with customers as opposed to internal stakeholders. This can include both functional and non-function requirements for products, services and experiences.Definition of the Scope and how to Control the Scope of the Project After brainstorming and interviewing customers, there was a need to implement the voice of a customer in the business. Voice of the customer involves capturing customer’s needs and expectations before coming up with a product, services, and brands. According to Saeed et al. study (2013), Innovation and new product development connected with “customer needs and expectations” differs across the marketing, engineering, and industrial design literature. The goods in the market are of a high quality due to the customer’s input during production. Customers know what they want. Therefore, involving them during production ensures that the goods produced to meet their needs. This business aims at providing customers with better services and products. Therefore, ensuring that customers are
  • 37. satisfied by getting their feedback can be used as a control to using Voice of Customers. Assessing increase in profits will also help define whether this strategy is working. Feedbacks and profits realized after the implementation of Voice of Customer (VoC) will use as a way to realize workability of this scope. Positive feedbacks from customers will mean that their needs have been fully satisfied. However, negative feedbacks will mean more has to be done. Better strategies will have to be implemented to ensure mass satisfaction of the customers. When balancing the books of account, the profits increase that will be realized after the implementation of VoC will mean success in the strategy. However, no profits or losses will be linked to the failure in workability of the strategy.Possible Risks, Constraints, and Assumptions This strategy has four distinct components, namely; Listening (collecting data), understanding (analyzing data for insights), sharing (distributing the insights), and taking action. Having all the four components to work will involve using a lot of resources from the company. The risks associated will be getting individualized needs from the customers. Every customer has his/her needs. It will be therefore, hard for the analyzers to determine the need that will be likely to cause customers’ satisfaction and achieve business goals. This will
  • 38. mean adopting production strategies that may fail during the process leading to losses. As this scope is limited only to customers’ feedback, there will be a lack of consultation from other external consultants. This strategy risks succumbing to analysis paralysis as the business tries to ensure profits are realized. We have to assume that the feedback we get always aims at improving the customers’ needs.Integration with Other Systems and Infrastructure There is a need to integrate VoC with Database and Data Warehousing, Cloud Technology and Virtualization, and Network Infrastructure and Security to easily monitor its workability. In other words, we are going to integrate VoC with cloud infrastructure. According to Gilbert (2018), this will virtualize all the resources to make them available on the website of the company using the command line interfaces, program interfaces, and graphical interfaces. The cloud infrastructure will enable customers’ and the project team to see the utilized resources and the corresponding resources to the costs of the project. This will also ensure they can monitor the achievements of the strategy. The cloud storage infrastructure will also integrate software and hardware elements that will reinforce the public and private cloud storage services. The company will also use a virtual integration of the infrastructure and other systems. In this case, the subsystems will be assimilated based on the operation
  • 39. ability of the information systems that are related to the functional entities. This is one of the quickest available methods that will be used with the network developers and vendors. There is a need to come up with security measures to ensure the protection of the company’s network. This will enable information relayed from customers to the company and from the company to the customers are not distorted hence efficient data flow.Human Capital According to Pettinger (2017), Human Capital is a measure of the skills, education capacity, and attributes of labor, which influence their productive capacity and earning potential. We are planning to add up our task force to involve employees who have prior knowledge of VoC. Kaplan & Norton (2005), emphasizes that if the employees who are closest to customers and who operate processes that create value are unaware of the strategy, they surely cannot help the organization implement it effectively. There will need to find individuals who have worked in another organization that had implemented VoC to help train some of our employees. The company will develop a human capital planning tool that will be employed to drive focused activities and achieve the goals of the project (Wang, 2018). This plan will comprise of software developers, web designers, virtual engineers, and IT professionals that will enable the company to assess, plan, and
  • 40. react to the needs of the project effectively. These professionals will be highly skilled with great educational and work experience from reputable organizations. These professionals will help redesign the organization by developing a plan that meets the needs of the organization as well as the goals, mission, and vision of the company. Possible Outsourcing or Offshoring Needs for Accomplishing the Project The information flow between the customers and the company will involve a lot of traffic. Therefore, it is advisable for the company to outsource storage facilities rather than buying and maintaining the storage devices at the company to reduce expenditure. The employee will have training from international organizations, as VoC has never been implemented by the company before. The company will also apply the offshoring needs such as keeping the service desk in different countries so to ensure customers’ feedbacks are received. This will also ensure that those who seek the company’s products get first- hand information about the products.Relevant Terms Used Throughout the Project Some of the terms that would be used throughout the project implementation include project initiation, management information system, and project scope, feedbacks, among others (Said, 2018). Project initiation is the initial phase of the project in the life cycle of project management. It encompasses
  • 41. launching a new project. During this phase, employees will have to be trained, and all the requirements put in place. VoC will then be first implemented. Management Information System (MIS) will be used to manage the information flow throughout the company. Project scope is the determination of the deliverables of the project, including the goals and the objectives of the project, the costs, the tasks, and the schedule of the project. Feedbacks from customers will form a base at which information about reactions to a product, a person's performance of a task will be used to determine better ways for improvement.Cost Projections for Staffing, Infrastructure, and Other Resources There will be costs needs that we have to budget for. First of all, there will be a need to determine the amount of labor needed. This includes all the staff, trainers, and other specialists that will be hired. Equipment for use and facilities to house service desks in different countries will be needed. There is also a need to add contingency costs for additional expenses that cannot yet be foreseen. Labor costs for 50 staff, 3 trainers and 20 specialists will approximate to $500000. Specialists include IT personnel, data analyzers, software developers, web designers, and virtual engineers. Equipment and facilities in 10 countries that will first launch the strategy will be about $600000. A contingency cost of $100000 will also be required.
  • 42. Approximately, the whole project will cost 1.2 US Dollars. References Gilbert, T., Barr, S., James, P., Morley, J., & Ji, Q. (2018). Software Systems Approach to Multi-Scale GIS-BIM Utility Infrastructure Network Integration and Resource Flow Simulation. ISPRS International Journal of Geo-Information, 7(8), 310. Spacey, John. (2017). 4 Types of Customer Requirements. Simplicable. Retrieved From https://simplicable.com/new/customer-requirements Kaplan, S. Robert, Norton, P. David. (2005). The Office of Strategy Management. Harvard Business Review. Retrieved From https://hbr.org/2005/10/the-office-of-strategy-management Pettinger Tejvan. (2017). Human Capital Definition and Importance. Economics. Retrieved From https://www.economicshelp.org/blog/26076/economics/human- capital-definition-and-importance/ Rashid Saeed, Rab Nawaz Lodhi, Jazba Munir, Shazza Riaz, Fareha Dustgeer & Amna Sami. (2013). The Impact of Voice of Customer on New Product. World Applied Science Journal. 24(9): 1255-1260, 2013. Retrieved From https://pdfs.semanticscholar.org/a7bc/9f0c4ea9c7bda5b648e255 50938c58ccfb09.pdf Saidi, S., Kattan, L., Jayasinghe, P., Hettiaratchi, P., & Taron, J. (2018). Integrated infrastructure systems—A review.
  • 43. Sustainable Cities and Society, 36, 1-11. Wang, Y., Liu, Y., & Canel, C. (2018). Process coordination, project attributes, and project performance in offshore- outsourced service projects. International Journal of Project Management, 36(7), 980-991.