SlideShare a Scribd company logo
1 of 112
Download to read offline
TABLE OF CONTENTS

Company Background ……………………………………………………………………                                        1
Company Mission Statement ……………………………………………………………..                                  2
Company Objectives ……………………………………………………………………..                                      2
Company Value Statements ………………………………………………………………                                    3
Executive Profiles
        Ainsley Robson, Chief Executive Officer ……………………………………….                     5
        Ian Myers, Chief Operations Officer ……………………………………………..                      9
        Jon Wiesberg, Chief Financial Officer …………………………………………..                     13
        Vishal Narayan, Chief Information Officer ………………………………………                    15
        Priyesh Patel, Chief Technology Officer ………………………………………..                    17
        Sanjay Naidoo, Chief Security Officer …………………………………………..                     18
System Selection
        Basic Hardware Selection ………………………………………………………..                             23
        Selection By Department …………………………………………………………                               24
        Basic Software Selection ……………………………………………………...…                            27
        Warranty Information ……………………………………………………………                                 28
Budgeting Information
        Base Project Budget ………………………………………………………………                                 29
        Continuing Future Budget Information …………………………………………..                      29
        Cost Explanation …………………………………………………………………                                   30
Project Timeline …………………………………………………………………………..                                      33
Network Set-up Overview ………………………………………………………………..                                   43
Individual Office/Building Networks
        Administration …………………………………………………………………..                                   45
                Zone 1 (FAA Liaison/ Customer Liaison/ Engineering/ Maintenance)….   46
                Zone 2 (Accounting/ Human Resources/ IT/ Marketing/ Publications &
                Regulatory Data/ Sales & Contracts) …………………………………….                  48
                Zone 3 (Vice Presidents Offices/ President Office)……………………….         53
        Maintenance Facility ……………………………………………………………..                               55
Information Technology Policies
        Introduction ……………………………………………………………………...                                   57
        Acceptable Use Policy ...………………………………………………………….                             58
        Internet Usage Policy ……………………………………………………………..                              60
        Anti-Spam Policy ………………………...……………………………………….                                62
        Instant Message Policy …………………………..……………………………….                             63
        Software Installation Policy …………………………..…………………………..                        64
Training Program
        Introduction …………………………………………..…………………………..                                  65
        Training Outline - Microsoft Office 2007 ……………………………………….                    67
        Training Outline - Corridor Application ………………………………………...                   68
        Training Outline - Catea Application ……………………………………...…….                    68
        Training Outline - Information Technology Support …………………………….               69
Appendix
        RFP Checklist ……………………………………………………………………                                     71
        Equipment Screenshots ………………………………………………………….                                79
COMPANY BACKGRAOUND AND WHO WE ARE


       Titian Technologies Consulting began 5 years ago through providing small “mom and
pop” businesses with Information Technology Systems in order to facilitate their growth. Since
our beginning, we have always felt that it is important to provide personalized IT services that
mold perfectly to the desired business model and needs of our clients.

       Today, our company has grown in size from its initial offering of services to small
“mom and pop” business to serving mid-size companies in a similar manner. Our company
growth has sparked excitement throughout the company and further boosts our confidence in
what we do for the people we love.

        It is our profound dedication to serving clients exceptionally well that has continually
set us above our competitors. In our commitment to stay true to our past, we have provided each
of our clients with a personal consultant who is designated to finding, serving, and sustaining
the needs of our clients. Furthermore, our personal consultants act as the gatekeeper of
information between clientele needs during the project’s beginning and throughout its
longevity.

        The personal consultant is an experienced and highly qualified individual in customer
service and project management. Like out dedication to serving our clients, it is our well
qualified consultants that set us aside from our competitors. Under this personal consultant
(project manager), we provide a team of individuals who specialize in technologies and sales
and marketing who further facilitate the business needs of our clientele.

        As a part of our commitment to the client, we analyze the individual needs of the overall
client and, for example, provide catered services such as offering a department who needs
mobile technology, mobile technology. It is a simple methodology that works well and makes
you, the customer, feel good about your decision to use us as your consultant.

        We also strive to provide for the economic and social responsibilities that are important
in today’s society. For instance, each piece of hardware that we equip within a building is
energy-efficient which benefits the customer two-fold: reduces expenses and protects the
environment. Also, we participate in the “Build-a-Forest” program where we plant a tree for
each computer we install for our clients.

       Now that you know a little about our history and who we are, feel free to contact us for
more information via email or on one of our toll-free lines.




                                                                                                    1
MISSION STATEMENT

   To provide personalized, quality IT
consultation for organizations that need to
       advance their IT solutions.

             OBJECTIVE

Provide each of our customers with an in-house
consultant specific to each client. In addition,
to provide 365-7-24 technical support.

Offer quality consulting based IT services
personalized to each department/division of the
department

To return an annual investment of 12% profit

To interact in local community volunteer
programs, such as the Special Olympics and
“Build-a-Forest” Program.

Provide our customers with energy-efficient
“green” products.
                                                   2
VALUES
  STATEMENT

 Winning Attitudes
One-on-One Service
      Integrity
       Loyalty
Socially Responsible
     Teamwork




                       3
EXECUTIVE TEAM MEMBERS




                                      Ainsley Robson

                                      Chief Executive Officer
                                      Project Manager

                                      Areas of Expertise:
                                             Customer Service; Project Management; Public Relations




         It is my pleasure to introduce my self as the Chief Executive Officer (CEO) for Titian
Technologies Consulting. As the CEO of this company it is my responsibility to set the
direction for the company and encourage my employees to perform to the maximum of their
abilities.

        For each of our clients my staff and I continue to work towards holding true to the ideals
that the company was founded upon and ensure that the client is the number one priority. In
ensuring this I also have often taken part in the consulting process with maintaining my own
client role as a project manager.

        As a proud graduate of Embry Riddle Aeronautical University with both my Bachelor of
Science in Safety Science and Master of Business Administration, I continue to work toward
excelling to the highest potential that can be meet.




                                                                                                  5
6
7
EXECUTIVE TEAM MEMBERS




                                       Ian Myers

                                       Chief Operations Officer

                                       Areas of Expertise:
                                              Financing; Budgeting; Project Management




                As the Chief Operating Officer (COO) for Titan Technologies Consulting, I
oversee the day-to-day operations of the company as well as coordinate the strategic planning
for our future operations. In addition to the latter business functions, I aid in the implementation
of services to our customers by ensuring the delivery of our products/services meets the needs,
expectations, and wants of our clientele. I’ve been with the company since its incorporation
and, as a member of this company, have helped the company grow to its outstanding reputation
within the IT consulting industry.




                                                                                                   9
10
11
EXECUTIVE TEAM MEMBERS




                                     Jon Weisberg

                                     Chief Financial Officer

                                     Areas of Expertise::
                                            Customer Service; Project Management; Sales




        As the Chief Financial Officer (CFO) for Titan Technologies Consulting, I am
responsible for the company’s corporate finance, financial planning, tax, accounting, investor
relations, personal auditing, and risk management. My obligations as CFO is to provide your
company with the best possible financial plan to save you money as well as receive the best
possible service possible. To do this, we will meet constantly to develop a budget and plan that
meets your financial needs. With a staff including certified C.P.A’s as well as C.F.A’s, we
continually work towards supporting the mission of the company by maintaining balanced
budgets and find ways to save money.

        Personally, I am a graduate of Embry Riddle Aeronautical University with a Master of
Business Administration with a specialization in Finance. Through numerous jobs and
positions within the Financial aspect I have worked up the ranks to become CFO for Titan
Technologies Consulting.




                                                                                               13
14
EXECUTIVE TEAM MEMBERS




                                       Vishal Narayanaswamy

                                       Chief Information Officer

                                       Areas of Expertise::
                                              Project Management; Information Technology




        Information has always proven to serve as the backbone to a company and its success. It
is my job as the Chief Information Officer (CIO) for Titian Technologies Consulting to main-
tain the Information Technology Systems and its long-term requirements. As the company’s
CIO, it is my responsibility to oversee all uses on information technology and to ensure the stra-
tegic alignment of IT with our business goals and objectives.


        Together, with my team and fellow Executive Officers, we continually strive to have
both the most suitable technology and to have updated information at Titian Technologies Con-
sulting as well as the latter for our clientele base. Furthermore, it is my personal privilege to en-
sure that the delivery of all IT projects is on time and within budget.




                                                                                                   15
16
EXECUTIVE TEAM MEMBERS




                                     Priyesh Patel

                                     Chief Technology Officer

                                     Areas of Expertise::
                                            Financing; Budgeting; Information Technology




               It is my pleasure to serve as the Chief Technology Officer (CTO) for Titian
Technologies Consulting. In this position I work on using my knowledge of Information
Technology Systems to ensure that the throughput, speed, accuracy, availability, and reliability
of our organizations systems are working at their peak efficiency and effectiveness in order to
adequately provide customer service to each of our clients. Also, my department works on
continually updating our systems database on available technology for on-time, available
clientele use.




                                                                                               17
18
EXECUTIVE TEAM MEMBERS




                                     J. Sanjay Kiran Naidoo

                                     Chief Security Officer

                                     Areas of Expertise::
                                            Computer Software; Engineering




        In the world of Information Technology, one of the biggest threats to an organization is
the security of the IT system. It is my responsibility as the Chief Security Officer (CSO) to
ensure that all systems that are installed within our company and our clients have security
strategies and IT safeguards to protect the systems from hackers and viruses. Within my office,
we continually monitor the integrity of the system, develop policies to protect the systems, and
obtain the most up-to-date anti-viral and spyware software available in the marketplace.




                                                                                               19
20
21
HARDWARE SYSTEM SELECTION

   Basics


Hardware
                                                                           Price per
Category           Item Description                             Quantity                Total Price
                                                                             Item
Workstation        Precision T1500                                 28       1,548.00     43,344.00
Workstation        Optiplex 380MT                                 198       1,140.00    225,720.00
Laptop             Toughbook 52                                    16       2,241.99     35,871.84
Laptop             HP EliteBook 8440w Moblie Workstation           5        1,649.00      8,245.00
Printer            HP LaserJet P2055dn (B&W)                       18         399.00      7,182.00
Printer            HP LaserJet M1522 (multi-function)              18         349.99      6,299.82
Plotter            HP Designjet T620 Printer series                1        2,450.00      2,450.00
Server             Dell PowerEdge T710                             7        9,819.00     68,733.00
Storage Array      Power Vault                                     1       11,945.00     11,945.00
Tape Drive         Q1538A HP Storage Works Ultrium 960             1        2,666.53      2,666.53
Tape Media         C8014A HP LTO Ultrium x20-200GB                 30       1,061.66     31,849.80
48 port Switch     WS-C2960-48TT-L Cisco Caralyst 2960-48TT        7        1,372.25       9,605.75

24 port Switch     WS-C2960-24TC-L Cisco Caralyst 2960-24TC        4        1,372.25       5,489.00
UPS                HP UPS T1500 G3-UPS-95 Watt 1400VA              8          494.99       3,959.92
Network Cable Cables to Go network cable kit                       6          146.99        881.94
Cable Connec-
                   RJ-45 Belkin Network Connectors (100 pcs)      17           23.99        407.83
tors
Router          Cisco 1941 Intergrated Service Router              2        1,294.62       2,589.24
                D-Link Xtreme N Duo Wireless-N Bridge/
WIFI Access                                                        8           99.99        799.92
                Access Point
Barcode Scanner Datalogic Quickscan 6500BT Scanner                 4          437.90       1,751.60
Card Scanner       21088045 MagTek Stripe Reader Card Scanner      4          180.00        720.00
Switch             Cisco Catalyst 4900M                           1        10,080.00     10,080.00
Router             Cisco 3945 Integrated Service Router           1         7,953.33      7,953.33
Firewall           D-Link DFL 210 NetDeffend 4-Port               1           354.99        354.99
Surge Protectors   Model SS7619-15                                18           99.00      1,782.00
                                                                               Totals   490,682.51



                                                                                              23
By Department
Department               Hardware                 Quantity   Price Per Unit Total Costs
FAA Liasion              Workstations                4               1,548.00   6,192.00
                         24 Port Switch              1               1,372.25   1,372.25
                         Wireless Access Point       1                  99.99      99.99
                         Black & White Printer       1                 399.00     399.00
Engineering              Workstations               16               1,548.00 24,768.00
                         Black & White printer       2                 399.00     798.00
                         Multi-Function printer      1                 349.99     349.99
                         Plotters                    1               2,450.00   2,450.00
                         24 Port Switch              1               1,372.25   1,372.25
                         UPS                         1                 494.99     494.99
                         Server                      1               9,819.00   9,819.00
Maintenance Planning and Workstations               25               1,140.00 28,500.00
Control
                         Black & White printer       3                399.00    1,197.00
                         Wireless Access Point       1                 99.99       99.99
                         Multi-Function printer      1                349.99      349.99
                         48 Port Switch              1              1,372.25    1,372.25
Customer Liaison         Workstations                6              1,140.00    6,840.00
                         Black & White printer       1                399.00      399.00
                         Multi-Function printer      1                349.99      349.99
Accounting               Workstations               20              1,140.00   22,800.00
                         Black & White printer       2                399.00      798.00
                         Multi-Function printer      1                349.99      349.99
                         48 port switch              1              1,372.25    1,372.25
                         Server                      1              9,819.00     9,81900
                         UPS                         1                494.99      494.99
Information Technology   Workstations               12              1,140.00   13,680.00
                         Servers                     4              9,819.00   39,276.00
                         UPS                         5                494.99    2,474.95
                         Storage Array               1             11,744.00   11,744.00
                         Black & White printer       1                399.00      399.00
                         Wireless Router             1              1,294.62    1,294.62
                         Multi-Function printer      1                349.99      349.99
                         48 port switch              1              1,372.25    1,372.25
                         Storage Array               1             11,945.00   11,945.00
                         Tape Media                 30              1,061.66   31,849.80
                         Tape Drive                  1              2,666.53    2,666.53
                         Network Switch              1             10,080.00   10,080.00
                         Network Router              1              7,953.33    7,953.33
                                                                                   24
Department                  Hardware                 Quantity   Price Per Unit Total Costs
Publications & Regulatory   Workstations                8               1,140.00   9,120.00
Data
                            Multi-Function printer      1                349.99      349.99
                            Black & White Printer       1                399.00      399.00
                            24 Port Switch              1              1,372.25    1,372.25
Human Resources             Workstations               12              1,140.00   13,680.00
                            Black & White Printer       1                399.00      399.00
                            Multi-Function printer      1                349.99      349.99
                            48 port switch              1              1,372.25    1,372.25
Marketing                   Workstations               24              1,140.00   27,360.00
                            Black & White printer       3                399.00     1197.00
                            Multi-Function printer      1                349.99      349.99
                            48 port Switch              1              1,372.25    1,372.25
Sales & Contracts           Workstations               20              1,140.00   22,800.00
                            Black & White printer       3                399.00    1,197.00
                            Multi-Function printer      1                349.99      349.99
                            48 port Switch              1              1,372.25    1,372.25
Hangar 1                    Workstations               12              1,140.00   13,680.00
                            Laptops                     4              2,241.99    8,967.96
                            Wireless Access Point       1                 99.99       99.99
                            Multi-Function printer      1                349.99      349.99
                            Server                      1              9,819.00    9,819.00
                            UPS                         1                494.99      494.99
                            Wireless Access Point       1                 99.99       99.99
Hangar 2                    Workstations                8              1,140.00    9,120.00
                            Laptop                      4              2,241.99    8,967.96
                            Multi-Function printer      1                349.99      349.99
                            Wireless Access Point       1                 99.99       99.99
Hangar 3                    Workstations                8              1,140.00    9,120.00
                            Laptop                      4              2,241.99    8,967.96
                            Multi-Function printer      1                349.99      349.99
                            Wireless Access Point       1                 99.99       99.99
Hangar 4                    Workstations                8              1,140.00    9,120.00
                            Laptop                      4              2,241.99    8,967.96
                            Multi-Function printer      1                349.99      349.99
                            Wireless Router             1              1,294.62    1,294.62
V.P. Maintenance Operations Workstations                8              1,548.00   12,384.00
                            Multi-Function printer      1                349.99      349.99
                            Wireless Access Point       1                 99.99       99.99
                            Laptop                      1              1,649.00    1,649.00
                            48 Port Switch              1              1,372.25    1,372.25
                                                                                    25
Department                 Hardware                    Quantity   Price Per Unit Total Costs
V.P Human Resources        Workstations                   6               1,140.00   6,840.00
                           Laptop                         1               1,649.00   1,649.00
                           Multi-Function printer         1                 349.99     349.99
V.P Marketing              Workstations                   9               1,140.00 10,260.00
                           Multi-Function printer         1                 349.99     349.99
                           24 Port Switch                 1               1,372.25   1,372.25
                           Laptop                         1               1,649.00   1,649.00
V.P Accounting & Finance   Workstations                   8               1,140.00   9,120.00
                           Laptop                         1              1,649.00    1,649.00
                           Multi-Function printer         1                349.99      349.99
President                  Workstations                  12              1,140.00   13,680.00
                           Laptop                         1              1,649.00    1,649.00
                           Wireless Access Point          1                99.00        99.00
                           Multi-Function printer         1               349.99       349.99
MISC                       Network Cable Kit              6               146.99       881.94
                           RJ-45 Connectors (100pcs)     17                23.99       407.83
                           Surge Protectors              18                99.00     1,782.00
                           Barcode Scanner                4               437.90     1,751.60
                           Card Scanner                   4               180.00       720.00




                                                                                     26
SOFTWARE SYSTEM SELECTION




Software
Category            Item Description                                      Quantity     Total Price
Operating System    Windows 7 Professional                                  247       included
Office Applications Microsoft Office 2007 Small Business Edition            247       included
                       Outlook; PowerPoint Presentation; Excel;
                       Word; Publisher
Scheduling          Schedule Anywhere                                       500       monthly fee*
Project Management  ProjectManagement.com                                   500       monthly fee*
Internet Service    New Edge Network                                         1        monthly fee*
                        Enterprise T1 1.5 - Core Coverage 3YR
Maintenance         Corridor (minus the annual fee)                          45         138,769.00
                    Oracle Database Standard Edition
Database Management                                                          1           21,350.00
                    (plus first year support)
CAD                 Catia                                                    1            8,857.00
Computer Logon      Novell Secure Logon (total for 500 logons)                           38,568.15
                                                                                  Total 207,544.15



   * Note:

   All programs having a monthly fee have no set-up or purchase costs associated with them.




                                                                                              27
WARRANTY INFORMATION




Hardware                          Support                                           Manufacturer
Dell PowerEdge T710               3 Yr ProSupport for IT and Mission Critical 2hr      Dell
                                  7X24 Onsite Pack, 5Hr Repair
Dell Precision T1500              3 Yr ProSupport for end users and 3 Yr NBD            Dell
                                  On-site Service
Optiplex 380MT                    3 Yr ProSupport for end users and 3 Yr NBD            Dell
                                  On-site Service, 3 year Complete Care
                                  Accidental Damage Protection
HP Storage Works Ultrium 960      3 Years Warranty                                      HP
HP LTO Ultriumx 20- 200GB         Limited Life time Warranty                            HP
Storage Media
Cisco 48 Port Switch              Limited Life time Warranty                           Cisco
Cisco 24 Port Switch              Limited Life time Warranty                           Cisco
UPS                               3 Years Warranty                                      HP
PowerVault MD3000                 3 Yr ProSupport for end users and NBD On-site
                                  Service
Toughbook 52                      Protection Plus 3yr Accidental Damage
EliteBook 8440w Mobile            Limited 3-year standard parts and labor onsite,       HP
workstation                       7x24 hardware technical phone support, 1 yr
                                  limited warranty on battery
Tripp-Lite Surge Protectors       Life time warranty                                 Tripp-Lite
1941 Integrated service router    90 Day warranty, 10 Day replacement period           Cisco
Wifi Access Point                                                                     Best buy
Black & White Printer             1 Year warranty                                       HP
Multi-Function Printer            1 Year Warranty                                       HP




                                                                                             28
BASE PROJECT BUDGET

Category         Item Description                              Quantity      Rate     Total Price
Consultant Fee Titian Technology Consultation Team                1          200,000 $ 200,000.00
                 Installation/Test Employee (10 man team per
Installation Fee                                                  6             9,000       54,000
                 week)
Installation Fee Site Supervisor (1 individual)                   6            1,200         7,200
Training Fee     Microsoft Office 2007 Training (per employee)   500              50        25,000
Training Fee     Corridor Application (per employee)             500             100        50,000
Training Fee     Catia Application (per employee)                 16             100         1,600
Training Fee     IT System Solutions (per employee)               12             100         1,200
                                                                             Sub-total     339,000

Hardware         Total Product Price                                                     637,425.78
                    ($472,154.19 + 20% Markup)
Sofware          Total Product Price                                                     207,544.15
First Year of Annual Fees (minus the consultant and IT support
                                                                                          31,600.40
fees)
                                                                             Bid Price 1,183,969.93
                                                                               Budget 1,500,000.00
                                                                      Remaining Funds 316,030.07

                   COMPANUY FUTURE BUDGET INFORAMTION



                Item Description                           Monthly Rate Yearly Rate
                Internet Service (New Edge Network)             289.00    3,468.00
                Project Management                               1,865.00   22,380.00
                Scheduling (Schedule Anywhere)                    257.45     3,089.40
                Oracle Annual Support                                        1,100.00
                Catia Annual Service Fee                                     1,563.00
                Consulting Team & IT Support Fee                            30,000.00
                                                            Annual Totals   61,600.40




                                                                                             29
COST EXPLAINATION
Service Cost
        Titan Technologies Consulting provides a personal consulting team to CFAO. For the
full-time services of our team, we are charging a flat fee of $200,000. This price includes a full
-time lead or Project Manager, which is exclusive to the individual client. Also the price covers
the team of experts that are under the Project Manager which includes a Financial Consultant
and a Information Technology Consultant. Together they work to provide the best IT solution
for their client. Through our research this price is inline with the industry average range for this
consulting service and structure.
        The installation and testing of your enterprise architecture will take a total of 6 weeks;
we equate this installation to a cost of $61,200. The team is constructed of a 10 individual team
and a site supervisor to ensure quality control and task management. By taking the average
annual income for a single worker with this type of job description it works out to be $900.00
for each individual worker a week. For the site supervisor we included a $300.00 increase over
the workers, due to the added responsibilities that this individual holds in creating and testing
the IT systems.
        The total fees for your training amount to $77,800. For Microsoft Office training, the
cost was figured out by charging all 500 CFAO employees at a rate of $50 per employee. For
Corridor Applications, the cost was figured out by charging all 500 CFAO employees at a rate
of $100 employee. For Catia Applications, the cost for the 16 engineers is at a rate of $100
employee. For IT Systems Solutions, the cost for the 12 employees at a rate of $100 employee.
These rates are able to be accomplished through the concept that we do off-site training at a
location which is owned and operated by Titian Technologies. The reason for the price differ-
ence in the trainings is due to the difference in length of time and the technology systems that
are required for each training evolution.

Hardware Cost
We chose the hardware presented above because it fits into Titan Technologies Consulting’s
core philosophy. The following are the main reasons why we choose the hardware:
    Eco-friendly aspects of the hardware (including Energy Efficiency)
    Competitively priced
    High quality of the equipment that is purchased

Titian Technology Consulting Calculations

       When we were researching our opportunities for creating a profitable situation for our
company, it was discovered that in order to remain competitive that we should look at a 30
percent markup on products offered. The average for contractors (according to contractor-
talk.com) is to have a 30 to 40 percent markup on services offered. What we have decided on
doing to create out profit is to mark up the physical hardware product that is purchased with a
30 percent markup.




                                                                                                  30
Below are the markup calculations for the product which is proposed for purchase with this
   RFP.


Hardware                                                                                        130%
                                                                                          Markup
Category            Item Description                                       Total Price
                                                                                           Price
Workstation         Precision T1500                                         43,344.00     56,347.20
Workstation         Optiplex 380MT                                         225,720.00    293,436.00
Laptop              Toughbook 52                                            35,871.84     46,633.39
Laptop              HP EliteBook 8440w Moblie Workstation                     8,245.00     10,718.50
Printer             HP LaserJet P2055dn (B&W)                                 7,182.00      9,336.60
Printer             HP LaserJet M1522 (multi-function)                        6,299.82      8,189.77
Plotter             HP Designjet T620 Printer series                          2,450.00      3,185.00
Server              Dell PowerEdge T710                                      68,733.00     89,352.90
Storage Array       Power Vault                                              11,945.00     15,528.50
Tape Drive          Q1538A HP Storage Works Ultrium 960                       2,666.53      3,466.49
Tape Media          C8014A HP LTO Ultrium x20-200GB                          31,849.80     41,404.74
48 port Switch      WS-C2960-48TT-L Cisco Caralyst 2960-48TT                  9,605.75     12,487.48
24 port Switch      WS-C2960-24TC-L Cisco Caralyst 2960-24TC                  5,489.00      7,135.70
UPS                 HP UPS T1500 G3-UPS-95 Watt 1400VA                        3,959.92      5,147.90
Network Cable Kit   Cables to Go network cable kit                              881.94      1,146.52
Cable Connectors    RJ-45 Belkin Network Connectors (100 pcs)                   407.83        530.18
Router              Cisco 1941 Intergrated Service Router                     2,589.24      3,366.01
                    D-Link Xtreme N Duo Wireless-N Bridge/Access
WIFI Access                                                                     799.92      1,039.90
                    Point
Barcode Scanner     Datalogic Quickscan 6500BT Scanner                        1,751.60      2,277.08
Card Scanner        21088045 MagTek Stripe Reader Card Scanner                  720.00        936.00
Switch              Cisco Catalyst 4900M                                     10,080.00     13,104.00
Router              Cisco 3945 Integrated Service Router                      7,953.33     10,339.33
Surge Protectors    Model SS7619-15                                          1,782.00      2,316.60
                                                                  Totals   490,327.52    637,425.78


   Titian Technologies Consulting’s profit for this project would be $147,098.26.




                                                                                                31
PROJECT TIMELINE




                   33
GANTT CHART FOR PROJECT




                          34
35
36
37
38
39
40
41
NETWORK SET-UP OVERVIEW




                          43
INDIVIDUAL OFFICE/BUILDING NETWORKS

                                      Administrative Facility

         Zones for easy reference to office location




Zone 1




Zone 2




Zone 3




                                                                45
Zone 1
FAA Liaison/ Customer Liaison/ Engineering/ Maintenance




                                                          46
47
Zone 2
Accounting/ Human Resources/ IT/ Marketing/ Publications & Regulatory Data/
                            Sales & Contracts




                                                                              48
49
50
51
52
Zone 3
Vice President Office/ President Office




                                          53
Maintenance Facility




                       55
INFORMATION TECHNOLOGY POLICIES

Introduction


This section is a conglomerate of Information Management Policies that Titian Technologies
Consulting suggests for all clients to adopt into their information enterprise architecture. The
purposes of these policies are to ensure the appropriate usage of the systems and the
protection of the systems that Titan Technologies Consulting, Inc. provides its clients.

All policies should be reviewed by the Chief Information Officer (CIO) or another senior
executive to remain within compliance standards of each policy and to enact appropriate
changes where necessary. Furthermore, if necessary, it is suggested that the CIO partner with
executive peers in order to create changes to the policies.

The policies that Titian Technologies Consulting suggests are:

            Acceptable Use Policy
            Internet Usage Policy
            Anti-spam Policy
            Instant Message Policy
            Software Installation Policy

In order to effectively ensure that all policies are followed, it is best practice to guarantee that
every employee is aware of these policies. In addition, it is Titian Technologies Consulting
suggestion that the latter policies be placed in an employee handbook and stored for future
reference.




References:
http://www.sans.edu/resources/student_projects/200711_002.pdf
www.theiia.org/download.cfm?file=77275
                                                                                                       57
Acceptable Use Policy

Central Florida Aircraft Overhaul Inc. will provide access to the computer Network, Internet
and email. Your cooperation with all listed rules and recommendations and general etiquette
are required for this access to be continued. If you have any questions or concerns regarding
the provisions of this Policy in general or pertaining to you, please contact the Office of Human
Resources.
You are forbidden to provide any person details of your account information without prior ap-
proval on a per incident basis from your in house implementation officer.
If you violate this policy, your access may be limited or withdrawn. In addition, you may be
subject to disciplinary action, up to and including termination.
1. Your commitment to and responsibilities
By using or accepting your account password and related information, you agree to adhere to
this policy document. You also agree to report any Network, Internet or email misuse to the in
house implementation officer. Misuse includes Policy violations listed or unlisted which harm
any person or the company or which compromise data.
2. Intended period of Usage
Network, Internet and email access extends throughout the term of your contract and employ-
ment, provided you do not violate the Acceptable Usage Policy. Note: The company may sus-
pend access at any time without notice or reason.
3. Purpose of provison of computer privilege.
The company offers access to its Network Internet and email system for business purposes only.
If you are unsure consult the in house implementation officer.
4. Netiquette (Etiquette for the net)
All users are required to maintain the rule of Network etiquette, or Netiquette. You must be
considerate, comply with the acceptable ethics and code of conduct and use the Network, Inter-
net and email appropriately and legally. The company will determine what materials, files, in-
formation, software, communications, and other content and activity are permitted or prohib-
ited, as outlined below.
5. Banned/ Unacceptable Activities
The following activities violate the Company’s Computer Network, Internet and email Accept-
able Usage Policy.
5.1. Sending or receiving offensive, abusive, vulgar or defamatory content.
5.2. Sending or receiving ethnic, sexual-preference, or gender-related slurs or jokes.
5.3. Sending or receiving confidential information about clients or colleagues.
5.4. Conducting unauthorized business.
5.5. Viewing, transmitting, downloading, or searching for pornographic or illegal materials.
5.6. Accessing others’ folders, files, work, networks, or computers.
5.7. Using software that is not licensed or approved by the company.
It is understood that you could receive banned material through no fault of your own. It is ex-
pected that you report this on immediate receipt to the in house implementation officer. If the
in house implementation officer is not available then you should report it to the person of
                                                                                                  58
nearest authority available and leave word for the in house implementation officer to contact
you urgently on her/ his return.
6. Respect for all confidential information
Some employees may have access to confidential information pertaining to clients, the com-
pany, employees or management. This information should be shared with caution and on a
need to know basis. If in doubt please consult the in house implementation officer.
7. Email Exists for Business Purposes
The company allows email access primarily for business purposes. Employees are prohibited
from using personal email software (Hotmail, etc) for business or personal communications at
the office other than with permission on a per incident basis from the in house implementation
officer.
8. Authorized Personal Use of Email
Employees may use (if requested of and permitted by the in house implementation officer)
email to communicate with family members. Employees’ personal use of email is limited to
lunch breaks and work breaks only. Employees may not use email during otherwise productive
business hours. Employees are prohibited from using email to operate a business, conduct an
external job search, solicit money for personal gain, campaign for political causes or candidates,
or promote or solicit funds for a religious or other personal cause.
9. Privacy
Network, Internet access and email are provided as a tool for our organization’s business. The
computer system is the property of CFAO. CFAO has the legal right to monitor usage of the
Network, Internet and email. Employees have no reasonable expectation of privacy when using
CFAO’s computer system, Network, Internet or email.
10. Violations and consequences
These guidelines are intended to provide CFAO employees with general examples of acceptable
and unacceptable use of the Company’s computer system. A violation of this policy may result
in disciplinary action up to and including termination.
Acknowledgement
If you have any questions about the above policies and procedures, address them to the in house
implementation officer before signing the following agreement.
I have read the company’s Network, Internet and Email Acceptable Usage Policy and agree to
abide by it. I understand and accept that a violation of any of the above policies and procedures
may result in disciplinary action, up to and including my termination.


User Name


User Signature


Date
                                                                                                59
Internet Usage Policy

Introduction
Central Florida Aircraft Overhaul, Inc. aims to provide you with accessible, up-to-date and reli-
able information to support you in your work. This goal requires us to provide access to the vast
information resources of the Internet to help you do your job and be well-informed. The Inter-
net is a business tool for Central Florida Aircraft Overhaul, Inc., and is provided to you at a sig-
nificant cost. Users must understand that this access is for the purpose of increasing productiv-
ity and not for non-business activities. Users must also understand that any connection to the
Internet offers an opportunity for non-authorized users to view or access corporate information.
Therefore, it is important that all connections be secure, controlled, and monitored to provide
you with accessible, up-to-date and reliable information and learning technology to support you
in your work, research, and studies

Authorized use
Central Florida Aircraft Overhaul, Inc.'s Internet connection is intended primarily for business
use. That means we expect you to use your Internet access primarily for business-related pur-
poses, i.e., to communicate with customers and suppliers, to research relevant topics, and to ob-
tain useful business information. The following are specific provisions regarding authorized use
of Central Florida Aircraft Overhaul, Inc.'s internet connection:
     Internet use should be restricted to sites and materials such as news or information that
        might be considered reasonable if read as a text publication in an office environment.
     Occasional and reasonable personal use should not interfere with the performance of
        work duties and responsibilities.

Unauthorized use
Users shall not use this company's Internet or e-mail services to view, download, save, receive,
or send material related to the following:
     Offensive content of any kind, including pornographic material.
     Propagate a virus, worm, Trojan horse, or trap-door program code.
     Circumvent any system intended to protect the privacy or security of another user.
     Visiting Web sites that promote threatening or violent behavior.
     Using the Internet for Illegal activities.
The above list of prohibited actions is by way of an example only and is not intended to be ex-
haustive.

User accountability
Users are responsible for their Internet use and are accountable for the following:
     Honoring acceptable use policies of networks accessed through the organization’s
        Internet services.
     Abiding by existing federal, state, and local telecommunications and networking laws
        and regulations.
     Following copyright laws regarding protected commercial software or intellectual
        property.

Privacy and monitoring
Central Florida Aircraft Overhaul, Inc. has software and systems in place to monitor and record
                                                                                                  60
all Internet usage. Our security systems are capable of recording each Web site and e-mail mes-
sage into and out of our internal networks. We reserve the right to do so at anytime. No em-
ployee should have any expectation of privacy as to his or her Internet usage. Our managers
will review Internet activity and analyze usage patterns, and they may choose to publicize this
data to assure that Central Florida Aircraft Overhaul, Inc. Internet resources are devoted to
maintaining the highest levels of productivity. We reserve the right to inspect any and all files
stored in private areas of our network in order to assure compliance with this policy.

Accidental/unintended violations
Central Florida Aircraft Overhaul, Inc. uses independently-supplied software and data to iden-
tify inappropriate or sexually-explicit Internet sites. We may block access from within our net-
works to all such sites. If you find yourself connected accidentally to a site that contains sexu-
ally explicit or offensive material, you mush disconnect from that site immediately, regardless
of whether that site had been previously deemed acceptable by any screening or rating program.
A user who accidentally accesses a prohibited site is encourage to report the incident to the
company's IT Department without the threat of incurring a violation penalty.

Violation penalties
Violations will be reviewed on a case-by-case basis. If it is determined that a user has violated
one or more use regulations, that user will receive a reprimand from his or her supervisor and
his or her future Internet use will be closely monitored. If a gross violation has occurred, man-
agement will take immediate action. Such action may result in losing Internet privileges, severe
reprimand, or termination of employment.

Reporting
When clear violations of this Internet Usage Policy occur, appropriate IT department staff, the
offender’s managing supervisor, and a company's Human Resource representative will be for-
mally notified. First time offenders will be notified their Internet usage will be closely moni-
tored and IT staff may review the employee’s communications for a period of 3 months. If the
user's Internet usage is deemed appropriate during that time, then no further action will be
taken. If other abuses of this Internet Usage Policy occur during this probationary period, man-
agement and a Human Resources representative will be notified to take appropriate action as
indicated in the Violation Penalties section of this document.

Central Florida Aircraft Overhaul, Inc. intends to enforce this policy, but reserves the right to
change it at any time as circumstances may require. Chief Informational Officer is responsible
for administering this policy and should be contacted should you have any questions or com-
ments concerning this policy.

The employee may not access the Internet via the Central Florida Aircraft Overhaul, Inc.'s net-
work at any time, through any device, unless he/she has read this policy.




                                                                                                    61
Anti-Spam Policy

Central Florida Aviation Overhaul Inc. has a no tolerance spam policy. Central Florida Aviation
Overhaul Inc. customer support actively monitors large import lists and emails going to a large
number of contacts. Any customer found to be using Central Florida Aviation Overhaul Inc. for
spam will be immediately cut-off from use of the product. If you know of or suspect any viola-
tors, please notify us immediately at abuse@cfao.asset.protection.com
Every email contains a mandatory unsubscribe link - those individuals who try to remove this
link will be warned that they are doing so. If the link is removed or de-activated in any way,
Central Florida Aviation Overhaul Inc. will terminate the customer's account.

What is Spam?
Spam is unsolicited email also known as UCE (Unsolicited Commercial Email). By sending
email to only to those who have requested to receive it, you are following accepted permission-
based email guidelines.

What constitutes a Preexisting business relationship?
The recipient of your email has made a purchase, requested information, responded to a ques-
tionnaire or a survey, or had offline contact with you.

What constitutes consent?
The recipient of your email has been clearly and fully notified of the collection and use of his
email address and has consented prior to such collection and use. This is often called informed
consent.

Isn't there a law against sending Spam?
The federal anti-spam law went into effect on January 1st, 2004 and preempts all state laws.
While this new law will not stop spam, it does make most spam illegal and ultimately less at-
tractive to spammers. The law is specific about requirements to send commercial email and em-
powers the federal government to enforce the law. The penalties can include a fine and/or im-
prisonment for up to 5 years.

How to protect yourself from Spam: Take the Spam Test
  1.Are you importing a purchased list of ANY kind?
  2.Are you sending to non-specific addresses such as:
       sales@domain.com, business@domain.com, webmaster@domain.com,
        info@domain.com, or other general addresses.
       Are you sending to distribution lists or mailing lists which send indirectly to a variety
        of email addresses?
       Are you mailing to anyone who has not explicitly agreed to join your mailing list?
       Have you falsified your originating address or transmission path information?
       Have you used a third party email address or domain name without their permission?
       Does your email's subject line contain false or misleading information?
       Does your email fail to provide a working link to unsubscribe?
       Are you failing to process any unsubscribe requests that come to you via a reply to
        your email within 10 days or the request?
                                                                                                62
If you have answered YES to ANY of the above questions you will likely be labeled a SPAM-
MER. For more information visit The Coalition Against Unsolicited Email (www.xauce.org)
or contact Constant Contact Customer Support (support@cfao.asset.protection.com)


Instant Message Policy

The use of Instant Messaging technology is limited to the capabilities provided by Central Flor-
ida Aircraft Overhaul, Inc. on internal network services. Workforce members must use the In-
stant Messaging service provided in a manner that protects company assets and Confidential
Information and abide by the rules subject to the policy as outlined below.

Rules

   1. Employees are prohibited from downloading and using personal, consumer-grade IM
       software (e.g., AOL Instant Messenger, Yahoo!, or MSN) to transmit messages via the
       public Internet. Employees who violate this rule are subject to termination.
   2. All IM communications and information transmitted, received, or archived in the com-
       pany's IM system belong to the company.
   3. Employees have no reasonable expectation of privacy when using the company s IM
       system. The company reserves the right to monitor, access, and disclose all employee
       IM communications.
   4. The IM system is intended for business use only. Employees are prohibited from wast-
       ing computer resources, colleague’s time, or their own time sending personal instant
       messages or engaging in unnecessary chat related to business.
   5. Treat IM messages as business records that may be retained and used as evidence in liti-
       gation, audits, and investigations.
   6. Employees are required to retain all business-related instant messages and delete nones-
       sential messages in accordance with the company s written IM retention and deletion
       schedule. Please talk to Central Florida Aircraft Overhaul, Inc. compliance officer or
       chief information officer if you need a copy or have questions about Central Florida Air-
       craft Overhaul, Inc.’s IM retention and deletion policies, practices, and procedures.
   7. Always use professional and appropriate language in all instant messages. Employees
       are prohibited from sending abusive, harassing, threatening, menacing, discriminatory,
       pornographic, disrespectful, or otherwise offensive instant messages.
   8. Employees are prohibited from sending jokes, rumors, gossip, or unsubstantiated opin-
       ions via IM. These communications, which often contain objectionable material, are
       easily misconstrued when communicated electronically.
   9. Employees may not use IM to transmit confidential, proprietary, personal, or potentially
       embarrassing information about the company, employees, clients, business associates, or
       other third parties.
   10. Employees may not share confidential, proprietary, or potentially embarrassing business
       -related or personal IMs with the media, competitors, prospective employers, or other
       third parties.
   11. Employees are to share their IM usernames with colleagues strictly on a need-to-know
       basis. If you have any questions about the above policies, address them to the compli-

                                                                                              63
Software Installation Policy

Overview
Allowing employees to install software on company computing devices opens the
organization up to unnecessary exposure. Conflicting file versions or DLLs which can
prevent programs from running, the introduction of malware from infected installation
software, unlicensed software which could be discovered in an audit, and programs which
can be used to hack the organization’s network are examples of the problems that can be
introduced when employees install software on company equipment.

Purpose
To minimize the risk of loss of program functionality, the exposure of sensitive
information contained within Central Florida Aircraft Overhaul, Inc. computing network, the
risk of introducing malware, and the legal exposure of running unlicensed software.

Scope
This policy covers all computers, servers, PDAs, smartphones, and other computing
devices operating within Central Florida Aircraft Overhaul, Inc...

Policy
Employees may not install software on Central Florida Aircraft Overhaul, Inc. computing de-
vices operated within the Central Florida Aircraft Overhaul, Inc. network. Software requests
must first be approved by the requester’s manager and then be made to the Information Tech-
nology department or Help Desk in writing or via email. Software must be selected from an ap-
proved software list, maintained by the Information Technology department, unless no selection
on the list meets the requester’s need. The Information Technology Department will obtain and
track the licenses, test new software for conflict and compatibility, and perform the
installation.

Enforcement
Any employee found to have violated this policy may be subject to disciplinary action, up
to and including termination of employment.

Definitions
 DLL: Dynamically Linked Library. A shared program module used by one or more pro-
   grams, often installed as part of a program installation. If the current version of a
 DLL is overwritten by a newer or older version, existing programs that relied upon the
   original version may cease to function or may not function reliably.
 Malware: A wide variety of programs created with the explicit intention of performing mali-
   cious acts on systems they run on, such as stealing information, hijacking functionality, and
   attacking other systems.
 PDA: Personal Digital Assistant. A portable, hand held computing device capable of run-
   ning software programs. It may connect to host computers or to wired or wireless networks.
 Smartphone: A cellular phone with qualities of a computer or PDA. It is capable of running
   software programs and connecting to computer networks.


                                                                                              64
TRAINING PROGRAM
In House Training Program

Training for your new enterprise architecture will be conducted by one of our selected in-house
training teams. We choose not to outsource this important facet of your new endeavour because
we feel our services end not at providing your company tailored products but exist indefinitely
throughout the longevity of your needs. Furthermore, since our analysis of your company
guided us to provide you with the ultimate personalized architecture, we feel it is our duty to
ensure you know how to use it from the people who provided it to you.

Note from the graph below shows that 55% of companies use departments within themselves to
provide IT training. It is our belief that these companies are underutilizing the potential to ade-
quately train their employees through utilizing their own sources. Although this may provide
more comfort and perceived control for a company, the lack of know-how and lack of true com-
petitive advantage poorly transcends throughout the company and, ultimately, hurts the bottom
line. Therefore, we are proud to be a considered within the 13% of companies who utilize out-
side sources for their training.




           http://articles.techrepublic.com.com/5100-10878_11-1049089.html?tag=content;leftCol


Training will be held at an off cite training facility that we set up to provide classroom/
simulator training for your employee’s. We will supply the computers and training materials
(e.g. projectors, printers, and so on) and each class will consist of no more than a third of each
of the department’s workforce.



                                                                                                     65
Several benefits of training offsite:

      Improves focus on learning tasks instead of work
      Allows employees to absorb more information
      Promotes collaboration and interaction between employees
      Psychologically beneficial through an environmental change
      Creates less disruption of the operation at the primary location
      Allows “folks” to get out of the office and have fun

Our Training Program Goals:

      Provide real world training instead of just application training – task oriented
      Address specific skills relative to the employee’s specific job
      Administer continual training throughout the longevity of employee’s tenure

Identifying the Training Needs of the Company:

The following section outlines how we identified the training needs of your company. We feel
it is integral to understand the training needs of the company and tailor a training program that
fits those needs.

Executive input – We seek the input regarding the training requirements and goals from execu-
tives within the consultee organization. This enables our training program to be catered to the
goals and requirements of the company and remain in line with the strategy of the company.

Employee assessment – An employee assessment is important to understand the exact needs of
different departments within the company. We understand that each department has specific
needs and wants, therefore and employee analysis is conducted before the training program be-
gins to better understand our clients.

Indentify current help-desk trends – We consult with the current IT solutions or help-desk
within the company to further understand the recurring problem within in order to develop a
training plan resolves such problems.

Poll the students – As a post training evaluation, our trainers survey a sample of trainees to
evaluate the training program to ensure proper, real-world knowledge was absorbed during the
training program. This evaluation serves as a metric for your company and allows us to better
understand how our program can more effectively serve your needs in the future.

Specific training classes:

      Microsoft Office 2007 Class
      Corridor Operations Class
      Catia Operations Class
      New Hire Class
      Luncheon – ask the expert “continual” training classes (Held after initial training)

                                                                                                66
Training timeline:

Timeline - August 23, 2010 through November 19, 2010

Days and time – Training per employee will be anywhere between 6 to 20 hours. Classes will
be held Monday through Friday where employees will spend no more than 6 hours a day (not
including breaks).

Continual training – We understand the importance of time to your employees; therefore our
continual training program isn’t as dynamic as the initial training program. For the reason of
time, and an assumption that employees will have the proper knowledge after initial training,
our continual training program is very relaxed and more geared toward answering unique ques-
tions and problems not discussed in initial training. Our continual training program consists of
selected IT employee s that will hold a luncheon every two weeks.

Course Outline - Microsoft Office 2007 Training

*Note- All employees of CFAO will participate in Microsoft Office Training. They will be
split up into 3 evenly groups consisting of: Engineering, Maintenance Planning & Control, Ac-
counting, Information Technology, Human Resources, Marketing, Sales & Contracts

Objectives:
    To properly evaluate employees current knowledge of Microsoft Office Software
    To transition the employees of CFAO from Microsoft Office 2003 to Microsoft Office
       2007
    To train employees at a steady pace so that the information is not too overwhelming.

Training Schedule:

Group A Schedule:
   August 23rd - 6 hour session on fundamentals of Word, Excel, and PowerPoint
   August 24th - 6 hour practical case study

Group B Schedule:
   August 25th - 6 hour session on fundamentals of Word, Excel, and PowerPoint
   August 26th - 6 hour practical case study

Group C Schedule:
   August 30th - 6 hour session on fundamentals of Word, Excel, and PowerPoint
   August 31st - 6 hour practical case study




                                                                                               67
Course Outline - Corridor Application
*Note– All employees of the company will participate in the week long training.

Objectives:
     To properly evaluate the Maintenance Planning & Control department’s current knowl-
        edge of aviation service providers.
     To train engineers at a steady pace so that the information is not too overwhelming

Group A Schedule:
   September 6th - 6 hour session of Corridor services
   September 7th - 6 hour session of Corridor services
   September 6th - 6 hour session of Corridor services
   September 8th - 6 hour practical case study

Group B Schedule:
    September 13th - 6 hour session of Corridor services
    September 14th - 6 hour session of Corridor services
    September 15th - 6 hour session of Corridor services
    September 16th - 6 hour practical case study

Group C Schedule:
   September 20th- 6 hour session of Corridor services
   September 21st - 6 hour session of Corridor services
   September 22nd - 6 hour session of Corridor services
   September 23rd - 6 hour practical case study

Course Outline - Catia Application
*Note- Only the Engineering Department will participate in the week long training

Objectives:
    To properly evaluate the engineering department’s current knowledge of Catia.
    To train engineers at a steady pace so that the information is not too overwhelming.

Group A Schedule:
   October 4th - 6 hour session of Catia Fundamentals
   October 5th - 6 hour session of Catia Programming
   October 6th - 6 hour session of Catia Programming & Design
   October 7th - 6 hour session of Catia Design
   October 8th - 6 hour practical case study




                                                                                            68
Group B Schedule:
   October 11th - 6 hour session of Catia Fundamentals
   October 12th - 6 hour session of Catia Programming
   October 13th - 6 hour session of Catia Programming & Design
   October 15th - 6 hour session of Catia Design
   October 15th - 6 hour practical case study

Group C Schedule:
   October 18th - 6 hour session of Catia Fundamentals
   October 19th - 6 hour session of Catia Programming
   October 20th - 6 hour session of Catia Programming & Design
   October 21st - 6 hour session of Catia Design
   October 22nd - 6 hour practical case study
Course Outline - Informational Technology Support
*Note- Only the IT Department will participate in the week long training

Objectives:
    To properly evaluate the IT department’s current knowledge of IT solutions
    To train IT technicians at a steady pace so that the information is not too overwhelming.

Group A Schedule:
   November 1st - 6 hour session of Networking Solutions
   November 2nd - 6 hour session of Reviewing the Programs in Use at Company
   November 3rd - 6 hour session of Troubleshooting Solutions
   November 4th - 6 hour session of Troubleshooting Solutions/ System Administrator Training
   November 5th - 6 hour practical case study

Group B Schedule:
   November 8th - 6 hour session of Networking Solutions
   November 9th - 6 hour session of Reviewing the Programs in Use at Company
   November 10th - 6 hour session of Troubleshooting Solutions
   November 11th - 6 hour session of Troubleshooting Solutions/ System Administrator Training
   November 12th - 6 hour practical case study

Group C Schedule:
   November 15th - 6 hour session of Networking Solutions
   November 16th- 6 hour session of Reviewing the Programs in Use at Company
   November 17th - 6 hour session of Troubleshooting Solutions
   November 18th - 6 hour session of Troubleshooting Solutions/ System Administrator Training
   November 19th - 6 hour practical case study

References:
http://articles.techrepublic.com.com/5100-10878_11-1036375.html?tag=content;leftCol
http://articles.techrepublic.com.com/5100-10878_11-5032139.html?tag=content;leftCol
http://articles.techrepublic.com.com/5100-10878_11-1049089.html?tag=content;leftCol
                                                                                            69
APPENDIX A

             SYSTEM REQUIREMTS PROPOSAL WORKSHEET

Overall System Requirements:
4 The bidder's products must execute in a dynamic, secure environment and all company
   computers will use the Windows operating system.
   The operating system that will be used is Windows 7 Professional Edition. All workstations
   will be protected by Trend Micro Internet Security software for 15 months. SUSE Linux
   Enterprise server 10 will be used as operating software for all integrated servers.
4 All computers and associated peripherals will be networked.
   All elements of the network will be integrated using CAT5e cables and Wi-Fi.

Overall Software Requirements:
4 Network all company computers using a Windows-based operating system.
   All workstations and laptops are networked with each other using Windows 7 Professional
   Edition as an operating system
4 Establish a company-wide intranet.
   All networked elements will have access to company-wide intranet. Every employee will
   have their own username and password provided by the network administrator to allow se-
   cure access to the intranet.
4 Provide secure Internet access for all users.
   All the workstations will be connected to the internet. The internet service will be provided
   by New Edge Networks with a 1.5M T1 connection. New Edge Network guarantees net-
   work availability of 99.9% or better. Secured Wi-Fi access will be provided throughout both
   facilities.
4 Use technologies such as fiber, satellite, the Internet, etc., as appropriate.
   The network will utilize CAT5e cables, switches, Wi-Fi routers, Wi-Fi Access Points to
   connect all workstations and peripherals. A T1 router modem will be used to gain broad-
   band access to the internet.

Office and Productivity Software Requirements:
4 Word processing
   Microsoft Word 2007 will be used as the word processing software. This version enables
   communication more effectively with SmartArt diagrams and new charting tools. Word
   2007 helps information workers create professional looking content quickly. A host of new
   tools enable the user to construct documents from pre-defined parts and styles that allow
   workers to increase productivity efficiently.
4 Spreadsheets
   Microsoft Office Excel 2007 allow users to create and format spreadsheets. It is also used to
   analyze and share information to make more informed business decisions. Excel 2007 al-
   lows users to share sensitive business information more broadly with enhanced security
   among work groups.
4 Database management
   Oracle Database Standard Edition is a full featured database for servers with up-to 4 sock-
   ets. The software manages all data types and enables all the business applications to take
   advantage of the performance, reliability, security and scalability.

                                                                                              71
Office and Productivity Software Requirements:
4 Presentation graphics
   Microsoft Office PowerPoint 2007 enables users to quickly create high impact dynamic
   presentation by integrating workflow and ways to easily share information. Integration with
   Windows Media Player allows users to integrate audio and video into a slideshow.
4 Email
   Microsoft Outlook 2007 provides an integrated solution for managing time and information,
   connecting across boundaries, and remaining in control of the information that needs to be
   reached to the user. Key features include automatic grouping of messages, junk e-mail han-
   dling and improved reading views and also allows users to flag messages.
4 Scheduling
   In addition to e-mail abilities, Microsoft Office Outlook 2007 also provides solutions for
   scheduling. Outlook 2007 delivers innovations in order to manage daily priorities by using
   the "To-Do" bar. The "To-Do" bar provides a consolidated view of upcoming events, tasks,
   calendar, making it easy to act on information. ScheduleAnywhere is also going to be used.
   This is an internet based scheduling software that allows employees to access their schedule
   from anywhere.
4 Project management
   ProjectManager.com will be providing all the solutions for project management. They offer
   a wide range of services that include project planner, tracking, sharing, and reporting.
   Teams can be managed online from any geographic location.
4 CAD
   CATIA is a multi-platform CAD/CAM/CAE commercial software suite developed by Das-
   sault Systems. CATIA supports multiple stages of product development from conceptualiza-
   tion, design, manufacturing and engineering.
4 Internet browser
   Internet Explorer 8 is faster, safe and easier to use than the previous versions. With visual
   suggestions and accelerators, Internet Explorer 8 is easy to navigate and fast. The browser
   also protects users from Malware threats. Many new features such as an automatic crash
   recovery, content filtering and smart screens protect the user's internet experience.
4 Network operating system
   SUSE Linux Enterprise Server 10 is the network operating system of choice for applica-
   tions, web services and infrastructure delivering high reliability and performance and supe-
   rior business value. This software is highly reliable, scalable and secure server operating
   system, built to power both physical and virtual mission critical workloads. Linux Enter-
   prise Server is designed to work with Windows and other operating systems making it the
   ideal choice for a mixed environment.

Maintenance Software Requirements:
4 Provide maintenance software (from vendors) that allows for planning and control of air-
  craft maintenance on large (including wide-body) aircraft.
  Corridor Workgroup Edition was selected to satisfy the maintenance software requirements.
  corridor eliminates manual efforts, reduces redundancies, lowers costs, improve speed and
  empowers employees to perform higher levels of direct service. Corridor's module set al-
  lows for customization of software to suit company's specific needs


                                                                                              72
Maintenance Software Requirements:
4 Hardware proposed will support maintenance software.
  Datalogic QuickScan 6500 BT Scanner, a RS232 protocol compliant device, fully decoded
  and reads track 1 and 2 will be acquired to support the maintenance software. MagTek
  Stripe Reader Card Scanner, PS232 protocol with serial port will also be provided.
4 Use Continuum Corridor software per the quote provided by CFAO. You will need the nec-
  essary number of Work Group Edition applications, annual support, one Oracle license,
  Oracle support and installation & implementation.

             License                                              QTY
             Corridor Work Group Edition*                           45
             Annual Support**                                       45
             Oracle License (1 Processor)                            1
             Oracle Support (Annually – 1 Processor)                 1
             Installation & Implementation                           1
Maintenance Software Requirements (cont.)
4 Maintenance software will include work order, work order quote, line sales & management,
  inventory, rotable management, account integration, sales order quote, sales order, aircraft,
  regulatory compliance, company database, purchase request, purchase order, and shipping
  & receiving.
  Corridor Software includes all of the above mentioned modules
4 Provide regulatory software as appropriate to large aircraft (must include Airworthiness Di-
  rectives, Service Letters, Service Bulletins, etc.).
  "The aviation regulatory library system by Aviation DataSource, Inc will be used as the
  company's regulatory software. This system is an internet based single source electronic
  aviation regulatory library database that includes all airworthiness directives for large and
  small aircraft, type certification data sheets, FARS, CARS, and JARS. Over 350000 files
  are in the system and are available by request.

The system should include utilities for:
4 Installation
   SUSE Linux Enterprise Server 10 ships with a unique set of server administration, configu-
   ration and deployment tool called YaST. This allows administrators to easily install and up-
   grade software and operating systems from a central location.
4 Recovery
   All the servers are factory equipped with Symantec Backup Exec system Recovery 2010
   Server Edition. The software is a simple, cost effective back-up and recovery solution for
   businesses that help minimize down time and avoid disaster by easily recovering individual
   data, files, folders or complete windows system in minutes, even to different hardware, vir-
   tual environment or remote locations.
4 Back-up
   All the servers are factory equipped with Symantec Backup Exec system Recovery 2010
   Server Edition. The software is a simple, cost effective back-up and recovery solution for
   businesses that help minimize down time and avoid disaster by easily recovering individual
   data, files, folders or complete windows system in minutes, even to different hardware, vir-
   tual environment or remote locations.
                                                                                              73
The system should include utilities for:
4 Security
   All workstations come equipped with Trend Micro Internet Security. The software protects
   against viruses and defends personal information with a anti-spyware technology. A per-
   sonal firewall defends against attacks through the internet.
4 On-line help and documentation
   Titan Technologies will provide all the documentation and help on-line through its website.
   Titan Technology will acquire all necessary documents from different vendors and offer
   them at one website for our customers at www.titantech.com.

Workstation Components:
4 Make and model:
  Low End Workstations : Dell OptiPlex 380 MT
  High End Workstations : Dell Precision T1500
  Hangar Laptops : Panasonic Toughbook 52
  Executive Laptops : HP EliteBook 8440W Mobile Workstation
4 Processor, processor speed
  Dell OptiPlex 380 MT - Intel Core 2 Duo (2.93 GHz, 1066 MHz FSB)
  Dell Precision T1500 - Quad Core Processor CORE i5 (2.64 GHz, 8MB)
  Panasonic Toughbook 52 - Intel Core 2 Duo P8400 2.26GHz (Centrino)
  HP EliteBook 8440W Mobile Workstation - Intel Core i7-620M 2.66GHz, 4MB L3 Cache
4 Amount of RAM
  Dell OptiPlex 380 MT - 2GB DDR 3 Non-ECC SDRAM, 1066 MHz (2 DIMM)
  Dell Precision T1500 - 2GB DDR 3 Non-ECC SDRAM, 1066 MHz (2 DIMM)
  Panasonic Toughbook 52 - 2GB
  HP EliteBook 8440W Mobile Workstation - 4GB, 1333MHz DDR3 SDRAM
4 Hard drive size
  Dell OptiPlex 380 MT - 320 GB SATA 3.0 GB/s and 16MB DataBurst Cache
  Dell Precision T1500 - 320 GB SATA 3.0 GB/s 7200 RPM and 16MB DataBurst Cache
  Panasonic Toughbook 52- 160GB
  HP EliteBook 8440W Mobile Workstation - 320GB, 7200RPM SATA II
4 Other drives
  Dell OptiPlex 380 MT - 16x DVD-ROM, Cyberlink Power DVD
  Dell Precision T1500 - 16x DVD-ROM, Cyberlink Power DVD
  Panasonic Toughbook 52 - 8x DVD+/-R/RW with double layer support
  HP EliteBook 8440W Mobile Workstation - DVD+/-RW SuperMulti DL LightScribe
4 Printer make and model (networked and/or stand-alone)
  Black and White : HP LaserJet P2055dn
  Multifunction : HP LaserJet M1522
  Plotter : HP Designjet T620 printer
4 Monitor make, model and size
  Dell OptiPlex 380 MT - Dell E Series E1910H 18.5in wide monitor, VGA only
  Dell Precision T1500 - Dell Professional 1909W 19in wide monitor, VGA/DVI
  Panasonic Toughbook 52 - 15.4in wide screen display
  HP EliteBook 8440W Mobile Workstation - 14in diagonal backlit HD+ antiglare


                                                                                            74
Workstation Components:
4 Any network or telecommunication devices
  Dell OptiPlex 380 MT - PCIE 10/100/1000
  Dell Precision T1500 - PCIE 10/100/1000
  Panasonic Toughbook 52 - PCIE 10/100/1000.
      Wireless - 802.11 A/B/G/N
  HP EliteBook 8440W Mobile Workstation - PCIE 10/100/1000.
      Wireless - Intel Centrino Ultimate-N 6300, 802.11 A/B/G/N, Bluetooth 2.1
4 Any necessary audio hardware
  There are no necessary audio hardware required. However, the laptops come equipped with
  integrated speakers.

Other Hardware:
4 Servers
   Dell PowerEdge T710
   Processor : (x2) Intel Xeon E5630 2.53GHz, 12M Cache, Turbo HT, 1066MHz
   RAM : 12GB (6 x 2GB), 1333MHz Dual Ranked RDIMMs
   Hard drive : 300GB 10K RPM Serial-Attach SCSI 6GBPS
   Monitor : 17in LCD
   Networking: Broadcom 5709 Dual Port 1GBE NIC W/TOE iSCSI, PCIe-4
4 Storage array
   Dell PowerVault MD 3000
   Hard drive: 2X 2TB 7.2K RPM universal SATA 3.5in
4 Firewall
   Microsoft Windows 7 Professional edition already has inbuilt firewall capabilities. In addi-
   tion all the routers are integrated with inbuilt firewall. The Cisco Catalyst switch offers inte-
   grated security that includes network admission control, advance quality of service.
4 Connection (NIC or Modem)
   The connection between the network components and to the internet will be through the
   NIC port. This connection will enable the component to receive and exchange data and ap-
   plications. The network is connected to the internet via a T1 router provided by the ISP.
4 Cables (estimate an average of 10 yards per connection if used)
   CAT5e cables are going to be used to connect all the network components. It can support
   speeds up to 100Mbps. Cables to go network cable kit will be used to network the system.
   The kit includes 1000ft of CAT5e cable, 50 pack of RJ45 connectors, RJ45 crimp tool and
   cable continuity tester using an estimate of 30ft/connection we estimate that we require 10
   kits.
4 Hubs, repeaters, bridges, switches or routers
   Cisco Catalyst 2960-24TC- 24 port switch
   Cisco Catalyst 2960-48TT- 48 port switch
   Cisco 1941 integrated service router
   D-Link - Xtreme N Duo Wireless-N Bridge/Access point
4 Server racks
   Not required since the servers use tower chassis
4 UPS
   HP UPS T1500 G3-950WATT-1400VA. Only the servers, storage array and the database
   are connected to the UPS.
                                                                                                  75
Minimum Hardware Requirements:
4 2 GB of RAM per workstation
4 100 GB of hard drive space per workstation
4 2 GHz processor speed
4 4 TB storage capability for entire network (storage array, server, etc.)
4 Total back-up capability including all data and applications (preferably offsite)
  HP StorageWorks Ultrium 960-TapeDrive- LTO Ultrium - SCSI
  Storage Media - HP LTO Ultrium x 20 - 200GB

The system should allow for:
4 User ID and password protection.
   Novell SecureLogin simplifies the enterprise single Sign-on implementation. Novell Se-
   cureLogin effectively reduces the number of password reset calls to the helpdesk.
4 Security administration that is centrally controlled on-site.
   The YaST tools in SUSE Linux Enterprise Server 10 allows administrators to automatically
   and transparently configure, update and troubleshoot workstations from wherever they are
   without having to physically visit each device. Using policies, administrators can generate
   and maintain work environments with content and applications according to the personal
   needs of each user. As a result, users access their work environments and applications in a
   simple, consistent way from any device, at any location. Novell Identity Manager provides
   capabilities such as identity lifecycle management, Access Management, Enterprise Single
   Sign-on, Password Management.
4 Complete archival capability to meet FAA and other regulatory requirements.
   SUSE Linux Enterprise Server 10 enables IT administrators to simplify storage manage-
   ment. Without an effective storage-management solution, the risks could range from lost
   data to more serious threats like litigation or negative audit findings. SUSE Linux 10 helps
   minimize these risks with automated policy management, ensuring compliance with corpo-
   rate and government regulations for secure data storage.

The aircraft maintenance planning and tracking system should provide for:
4 Flexible reporting capacity.
   As many aircrafts as needed can be added to the reports
4 Easily modified standard reports.
   Standard reports can be easily modified by adding or excluding fields of information.
4 Ability to write special reports.
   Any report can be customized
4 Trend reporting.
   It is a part of "Reliability Report"
4 Linkage/download into other software (e.g. spreadsheets, word processing, database, etc.)
   Corridor integrates with all Microsoft Office Programs
4 Be menu-driven to lead inexperienced users through the system.
   Users inexperienced with the system can easily use the system by the menus provided
4 Allow an experienced user to by-pass menus.
   Shortcuts provide direct access to most commonly accessed information for an experienced
   user to by-pass the menus


                                                                                             76
Network Management and Administration:
4 Provide easy-to-read documentation, including both technical and user manuals.
   All documentation will be provided by the software and hardware vendors
4 Provide an IT policy manual which includes a recommended employee computer-use
   policy, security processes, sanctions for misuse, etc.
   All IT policies that Titian Technologies Consulting recommend to be adapted by a client for
   their system are available from the consulting team or through the client section of our web
   page.
4 Include network management policies such as maintenance rules, software installation, indi-
   vidual data back-up, etc.
   All IT policies that Titian Technologies Consulting recommend to be adapted by a client for
   their system are available from the consulting team or through the client section of our web
   page.

Installation:
4 Installation assistance.
    Installation of the system will be either taken care of by a team of Titian Technology Con-
    sulting employees, or is included in the price of the equipment. All outside installation is
    limited to specific software applications.
4 Implementation assistance.
    Implementation assistance will be part of Titian Technology Consulting’s services provided.
4 Is a qualified technical representative provided on-site to install the system? If not, describe
    installation alternatives and the level of technical knowledge required.
    Yes, there will be a team of Titian Technology Consulting employees who will be installing
    and testing the network. They workers will be supervised by a site supervisor who will be
    there when company employees are working.
4 Describe how the bidder ensures that newly installed systems are adequately tested.
    Titian Technologies has an intensive 3 week testing process that will be conducted along
    with a quality control measures inspection, that will be conducted by the site supervisor.

Training:
4 Technical training (IT support staff).
   During the training evolution part of this project there will be IT support training, the dates
   for this training will be November 1, 2010 though November 19, 2010
4 End-user training.
   There are three different elements of training for this project. There will be Microsoft Of-
   fice and Corridor Training for all employees. The dates for this training will be August 23,
   2010 through August 31, 2010 and September 6, 2010 through September 23, 2010 respec-
   tively.
4 Helpdesk counselor training.
   Titian Technologies Consulting believes that the Helpdesk should be a 365-7-24. With this
   thought in mind Titian Technology offers a outsourced helpdesk that can offer this service.
4 System administrator training.
   System administrator training is part of the IT Support Training. This is because we believe
   that the individuals who control the system is the IT Department.


                                                                                                77
Technical and Maintenance Support:
4 Telephone support.
   This is filled through the uses of a 1-800 hotline..
4 The command files required to run the system, with complete operator's documentation
   This will be held within the IT department and located on a section of Titian Technologies
   Consulting’s website that is dedicated to clients.
4 Custom modifications.
   Custom modifications was considered through out the project process. From the use of lap-
   tops in the hanger and for the Senior Executives of the company to the selection of training
   process.
4 Describe who will provide long-term support and system enhancements to the proposed
   system and the availability to provide such support.
   Through the use of the consultant team, clients will continually find that they are able to
   have one individual to turn to if up-grades and expansion is required by the client.
4 Describe the on-going level of support and procedure for "bug-fixes" provided by the bid-
   der.
   Through the use of the consultant team, clients will continually find that they are able to
   have one individual to turn to if up-grades and expansion is required by the client.
4 Warranties included with equipment purchased.
   All items that are within the project were considered because of the warranties that were
   available.
4 Provide three years of IT technical support.
   Most of the equipment and software includes this support, and where it is not included by
   the manufacture Titian Technologies Consulting services include through the use of the
   consultant team.
4 Provide three years of maintenance support.
   Most of the equipment and software includes this support, and where it is not included by
   the manufacture Titian Technologies Consulting services include through the use of the
   consultant team.

System Integration:
4 List integration services to be performed.
    Installation and Testing Team
    End User Training
    User section of the Titian Technologies Consulting website (www.titiantech.com)
    Username and Passwords
    365-7-24 Helpdesk
    Use of both wired and wireless systems




                                                                                             78
APPENDIX B

                       EQUIPMENT SCREENSHOTS

Computers:
     Precision T1500




                                               79
OptiPlex 380 MT




                  80
Laptops:
      Toughbook 52




                     81
Laptops:
      HP EliteBook 8440w Mobile Workstation




                                              82
Printers:
       HP LaserJet P2055dn




                             83
HP LaserJet M1522




                    84
Plotter:
       HP Designjet T620




                           85
Server:




          86
Storage Array:




                 87
Tape Dive:




             88
Tape Media:




              89
Switches:
      48 Port Switch




                       90
24 Port Switch




                 91
Switches:
      Network Switch




                       92
Router:
      Integrated Router




                          93
UPS:




       94
Network Cable Kit:




                     95
Internet Connection Equipment:
       CAT 5E Cable: Belkin Bulk Cable - 1000 ft




                                                   96
RJ-45 Connector




                  97
Router:




          98
WIFI Access Points:




                      99
Surge Protectors:




                    100
Barcode Reader:




Card Reader:




                  101
Scheduling Program:
      500 Employee Price per month




                                     102
Database Management:




                       103
Project Management:




                      # users at price    Cost      Cost breakdown
                                     1     $25.00              $25.00
                                    24     $10.00             $240.00
                                    25      $8.00             $200.00
                                    50      $6.00             $300.00
                                   150      $4.00             $600.00
                                   250      $2.00             $500.00
                             Total cost per month           $1,865.00
                                                                        104
Corridor




           105
Rfp Response Proof 8
Rfp Response Proof 8
Rfp Response Proof 8

More Related Content

Viewers also liked

Rugby with K.S.C.
Rugby with K.S.C.Rugby with K.S.C.
Rugby with K.S.C.MPS
 
Boo's visit to Brodie's house
Boo's visit to Brodie's houseBoo's visit to Brodie's house
Boo's visit to Brodie's houseMPS
 
Con on can
Con on canCon on can
Con on canMPS
 
Boo the bear
Boo the bearBoo the bear
Boo the bearMPS
 
Owen leaves in a bag
Owen leaves in a bagOwen leaves in a bag
Owen leaves in a bagMPS
 
Clouds
CloudsClouds
CloudsMPS
 
Water on a pan
Water on a panWater on a pan
Water on a panMPS
 
French Day 2012
French Day 2012French Day 2012
French Day 2012MPS
 
Service Gear April 27, 2010
Service Gear April 27, 2010Service Gear April 27, 2010
Service Gear April 27, 2010guest2a01db
 
Gas forced into a liquid
Gas forced into a liquidGas forced into a liquid
Gas forced into a liquidMPS
 
Condensation on a can no name
Condensation on a can no nameCondensation on a can no name
Condensation on a can no nameMPS
 
Heat to via pan
Heat to via panHeat to via pan
Heat to via panMPS
 
Le marketing adapté à une clientèle branchée
Le marketing adapté à une clientèle branchéeLe marketing adapté à une clientèle branchée
Le marketing adapté à une clientèle branchéefrancoquebecetourisme
 
Du marketing d'hier au marketing de demain - Définition de la cible
Du marketing d'hier au marketing de demain - Définition de la cible Du marketing d'hier au marketing de demain - Définition de la cible
Du marketing d'hier au marketing de demain - Définition de la cible Pim-Bim - The Inbound Suite
 
Dynamiser l’emploi des personnes handicapees en milieu ordinaire
 Dynamiser l’emploi des personnes handicapees en milieu ordinaire Dynamiser l’emploi des personnes handicapees en milieu ordinaire
Dynamiser l’emploi des personnes handicapees en milieu ordinaireAVIE
 
Sociologie des réseaux sociaux, 5, EHESS/ENS/ENSAE
Sociologie des réseaux sociaux, 5, EHESS/ENS/ENSAESociologie des réseaux sociaux, 5, EHESS/ENS/ENSAE
Sociologie des réseaux sociaux, 5, EHESS/ENS/ENSAEPaola Tubaro
 

Viewers also liked (16)

Rugby with K.S.C.
Rugby with K.S.C.Rugby with K.S.C.
Rugby with K.S.C.
 
Boo's visit to Brodie's house
Boo's visit to Brodie's houseBoo's visit to Brodie's house
Boo's visit to Brodie's house
 
Con on can
Con on canCon on can
Con on can
 
Boo the bear
Boo the bearBoo the bear
Boo the bear
 
Owen leaves in a bag
Owen leaves in a bagOwen leaves in a bag
Owen leaves in a bag
 
Clouds
CloudsClouds
Clouds
 
Water on a pan
Water on a panWater on a pan
Water on a pan
 
French Day 2012
French Day 2012French Day 2012
French Day 2012
 
Service Gear April 27, 2010
Service Gear April 27, 2010Service Gear April 27, 2010
Service Gear April 27, 2010
 
Gas forced into a liquid
Gas forced into a liquidGas forced into a liquid
Gas forced into a liquid
 
Condensation on a can no name
Condensation on a can no nameCondensation on a can no name
Condensation on a can no name
 
Heat to via pan
Heat to via panHeat to via pan
Heat to via pan
 
Le marketing adapté à une clientèle branchée
Le marketing adapté à une clientèle branchéeLe marketing adapté à une clientèle branchée
Le marketing adapté à une clientèle branchée
 
Du marketing d'hier au marketing de demain - Définition de la cible
Du marketing d'hier au marketing de demain - Définition de la cible Du marketing d'hier au marketing de demain - Définition de la cible
Du marketing d'hier au marketing de demain - Définition de la cible
 
Dynamiser l’emploi des personnes handicapees en milieu ordinaire
 Dynamiser l’emploi des personnes handicapees en milieu ordinaire Dynamiser l’emploi des personnes handicapees en milieu ordinaire
Dynamiser l’emploi des personnes handicapees en milieu ordinaire
 
Sociologie des réseaux sociaux, 5, EHESS/ENS/ENSAE
Sociologie des réseaux sociaux, 5, EHESS/ENS/ENSAESociologie des réseaux sociaux, 5, EHESS/ENS/ENSAE
Sociologie des réseaux sociaux, 5, EHESS/ENS/ENSAE
 

Similar to Rfp Response Proof 8

Using Security Metrics to Drive Action
Using Security Metrics to Drive ActionUsing Security Metrics to Drive Action
Using Security Metrics to Drive ActionMighty Guides, Inc.
 
BPI Request for Information Response
BPI Request for Information ResponseBPI Request for Information Response
BPI Request for Information ResponseJosh Nutter
 
Agile Business Intelligence - course notes
Agile Business Intelligence - course notesAgile Business Intelligence - course notes
Agile Business Intelligence - course notesEvan Leybourn
 
Megs Creations Ltd
Megs Creations LtdMegs Creations Ltd
Megs Creations Ltdeawitta
 
Callcopy qa-guide
Callcopy qa-guideCallcopy qa-guide
Callcopy qa-guideunndine
 
Aiim Industry Watch: Content Analytics: automating processes and extracting ...
Aiim Industry Watch:  Content Analytics: automating processes and extracting ...Aiim Industry Watch:  Content Analytics: automating processes and extracting ...
Aiim Industry Watch: Content Analytics: automating processes and extracting ...Swiss Post Solutions
 
Workforce Staffing_Company Profile_Oct 2014
Workforce Staffing_Company Profile_Oct 2014Workforce Staffing_Company Profile_Oct 2014
Workforce Staffing_Company Profile_Oct 2014Kim Coetzee
 
Whitepaper - Effective Business Analysis
Whitepaper - Effective Business AnalysisWhitepaper - Effective Business Analysis
Whitepaper - Effective Business AnalysisPeter Bricknell
 
Fortinet: The New CISO – From Technology to Business Focused Leadership
Fortinet: The New CISO – From Technology to Business Focused LeadershipFortinet: The New CISO – From Technology to Business Focused Leadership
Fortinet: The New CISO – From Technology to Business Focused LeadershipMighty Guides, Inc.
 
Microsoft Dynamics RoleTailored Business Productivity
Microsoft Dynamics RoleTailored Business ProductivityMicrosoft Dynamics RoleTailored Business Productivity
Microsoft Dynamics RoleTailored Business ProductivityCRMreviews
 
Connecting erp and ecm measuring the benefits
Connecting erp and ecm   measuring the benefitsConnecting erp and ecm   measuring the benefits
Connecting erp and ecm measuring the benefitsVander Loto
 
IPIX Solutions Profile
IPIX Solutions Profile IPIX Solutions Profile
IPIX Solutions Profile mrdawn
 
01 content analytics-iw2015
01 content analytics-iw201501 content analytics-iw2015
01 content analytics-iw2015Kaizenlogcom
 

Similar to Rfp Response Proof 8 (20)

Using Security Metrics to Drive Action
Using Security Metrics to Drive ActionUsing Security Metrics to Drive Action
Using Security Metrics to Drive Action
 
Welcome to snmc book
Welcome to snmc bookWelcome to snmc book
Welcome to snmc book
 
Welcome to snmc book
Welcome to snmc bookWelcome to snmc book
Welcome to snmc book
 
BPI Request for Information Response
BPI Request for Information ResponseBPI Request for Information Response
BPI Request for Information Response
 
Agile Business Intelligence - course notes
Agile Business Intelligence - course notesAgile Business Intelligence - course notes
Agile Business Intelligence - course notes
 
Megs Creations Ltd
Megs Creations LtdMegs Creations Ltd
Megs Creations Ltd
 
Callcopy qa-guide
Callcopy qa-guideCallcopy qa-guide
Callcopy qa-guide
 
Aiim Industry Watch: Content Analytics: automating processes and extracting ...
Aiim Industry Watch:  Content Analytics: automating processes and extracting ...Aiim Industry Watch:  Content Analytics: automating processes and extracting ...
Aiim Industry Watch: Content Analytics: automating processes and extracting ...
 
CIO and the Board
CIO and the BoardCIO and the Board
CIO and the Board
 
Blockchain in HCM
Blockchain in HCM Blockchain in HCM
Blockchain in HCM
 
Workforce Staffing_Company Profile_Oct 2014
Workforce Staffing_Company Profile_Oct 2014Workforce Staffing_Company Profile_Oct 2014
Workforce Staffing_Company Profile_Oct 2014
 
ISO_6
ISO_6ISO_6
ISO_6
 
ZAP_Dynamics_EBook
ZAP_Dynamics_EBookZAP_Dynamics_EBook
ZAP_Dynamics_EBook
 
Whitepaper - Effective Business Analysis
Whitepaper - Effective Business AnalysisWhitepaper - Effective Business Analysis
Whitepaper - Effective Business Analysis
 
Fortinet: The New CISO – From Technology to Business Focused Leadership
Fortinet: The New CISO – From Technology to Business Focused LeadershipFortinet: The New CISO – From Technology to Business Focused Leadership
Fortinet: The New CISO – From Technology to Business Focused Leadership
 
Microsoft Dynamics RoleTailored Business Productivity
Microsoft Dynamics RoleTailored Business ProductivityMicrosoft Dynamics RoleTailored Business Productivity
Microsoft Dynamics RoleTailored Business Productivity
 
Capstone
CapstoneCapstone
Capstone
 
Connecting erp and ecm measuring the benefits
Connecting erp and ecm   measuring the benefitsConnecting erp and ecm   measuring the benefits
Connecting erp and ecm measuring the benefits
 
IPIX Solutions Profile
IPIX Solutions Profile IPIX Solutions Profile
IPIX Solutions Profile
 
01 content analytics-iw2015
01 content analytics-iw201501 content analytics-iw2015
01 content analytics-iw2015
 

Rfp Response Proof 8

  • 1.
  • 2.
  • 3. TABLE OF CONTENTS Company Background …………………………………………………………………… 1 Company Mission Statement …………………………………………………………….. 2 Company Objectives …………………………………………………………………….. 2 Company Value Statements ……………………………………………………………… 3 Executive Profiles Ainsley Robson, Chief Executive Officer ………………………………………. 5 Ian Myers, Chief Operations Officer …………………………………………….. 9 Jon Wiesberg, Chief Financial Officer ………………………………………….. 13 Vishal Narayan, Chief Information Officer ……………………………………… 15 Priyesh Patel, Chief Technology Officer ……………………………………….. 17 Sanjay Naidoo, Chief Security Officer ………………………………………….. 18 System Selection Basic Hardware Selection ……………………………………………………….. 23 Selection By Department ………………………………………………………… 24 Basic Software Selection ……………………………………………………...… 27 Warranty Information …………………………………………………………… 28 Budgeting Information Base Project Budget ……………………………………………………………… 29 Continuing Future Budget Information ………………………………………….. 29 Cost Explanation ………………………………………………………………… 30 Project Timeline ………………………………………………………………………….. 33 Network Set-up Overview ……………………………………………………………….. 43 Individual Office/Building Networks Administration ………………………………………………………………….. 45 Zone 1 (FAA Liaison/ Customer Liaison/ Engineering/ Maintenance)…. 46 Zone 2 (Accounting/ Human Resources/ IT/ Marketing/ Publications & Regulatory Data/ Sales & Contracts) ……………………………………. 48 Zone 3 (Vice Presidents Offices/ President Office)………………………. 53 Maintenance Facility …………………………………………………………….. 55 Information Technology Policies Introduction ……………………………………………………………………... 57 Acceptable Use Policy ...…………………………………………………………. 58 Internet Usage Policy …………………………………………………………….. 60 Anti-Spam Policy ………………………...………………………………………. 62 Instant Message Policy …………………………..………………………………. 63 Software Installation Policy …………………………..………………………….. 64 Training Program Introduction …………………………………………..………………………….. 65 Training Outline - Microsoft Office 2007 ………………………………………. 67 Training Outline - Corridor Application ………………………………………... 68 Training Outline - Catea Application ……………………………………...……. 68 Training Outline - Information Technology Support ……………………………. 69 Appendix RFP Checklist …………………………………………………………………… 71 Equipment Screenshots …………………………………………………………. 79
  • 4.
  • 5. COMPANY BACKGRAOUND AND WHO WE ARE Titian Technologies Consulting began 5 years ago through providing small “mom and pop” businesses with Information Technology Systems in order to facilitate their growth. Since our beginning, we have always felt that it is important to provide personalized IT services that mold perfectly to the desired business model and needs of our clients. Today, our company has grown in size from its initial offering of services to small “mom and pop” business to serving mid-size companies in a similar manner. Our company growth has sparked excitement throughout the company and further boosts our confidence in what we do for the people we love. It is our profound dedication to serving clients exceptionally well that has continually set us above our competitors. In our commitment to stay true to our past, we have provided each of our clients with a personal consultant who is designated to finding, serving, and sustaining the needs of our clients. Furthermore, our personal consultants act as the gatekeeper of information between clientele needs during the project’s beginning and throughout its longevity. The personal consultant is an experienced and highly qualified individual in customer service and project management. Like out dedication to serving our clients, it is our well qualified consultants that set us aside from our competitors. Under this personal consultant (project manager), we provide a team of individuals who specialize in technologies and sales and marketing who further facilitate the business needs of our clientele. As a part of our commitment to the client, we analyze the individual needs of the overall client and, for example, provide catered services such as offering a department who needs mobile technology, mobile technology. It is a simple methodology that works well and makes you, the customer, feel good about your decision to use us as your consultant. We also strive to provide for the economic and social responsibilities that are important in today’s society. For instance, each piece of hardware that we equip within a building is energy-efficient which benefits the customer two-fold: reduces expenses and protects the environment. Also, we participate in the “Build-a-Forest” program where we plant a tree for each computer we install for our clients. Now that you know a little about our history and who we are, feel free to contact us for more information via email or on one of our toll-free lines. 1
  • 6. MISSION STATEMENT To provide personalized, quality IT consultation for organizations that need to advance their IT solutions. OBJECTIVE Provide each of our customers with an in-house consultant specific to each client. In addition, to provide 365-7-24 technical support. Offer quality consulting based IT services personalized to each department/division of the department To return an annual investment of 12% profit To interact in local community volunteer programs, such as the Special Olympics and “Build-a-Forest” Program. Provide our customers with energy-efficient “green” products. 2
  • 7. VALUES STATEMENT Winning Attitudes One-on-One Service Integrity Loyalty Socially Responsible Teamwork 3
  • 8.
  • 9. EXECUTIVE TEAM MEMBERS Ainsley Robson Chief Executive Officer Project Manager Areas of Expertise: Customer Service; Project Management; Public Relations It is my pleasure to introduce my self as the Chief Executive Officer (CEO) for Titian Technologies Consulting. As the CEO of this company it is my responsibility to set the direction for the company and encourage my employees to perform to the maximum of their abilities. For each of our clients my staff and I continue to work towards holding true to the ideals that the company was founded upon and ensure that the client is the number one priority. In ensuring this I also have often taken part in the consulting process with maintaining my own client role as a project manager. As a proud graduate of Embry Riddle Aeronautical University with both my Bachelor of Science in Safety Science and Master of Business Administration, I continue to work toward excelling to the highest potential that can be meet. 5
  • 10. 6
  • 11. 7
  • 12.
  • 13. EXECUTIVE TEAM MEMBERS Ian Myers Chief Operations Officer Areas of Expertise: Financing; Budgeting; Project Management As the Chief Operating Officer (COO) for Titan Technologies Consulting, I oversee the day-to-day operations of the company as well as coordinate the strategic planning for our future operations. In addition to the latter business functions, I aid in the implementation of services to our customers by ensuring the delivery of our products/services meets the needs, expectations, and wants of our clientele. I’ve been with the company since its incorporation and, as a member of this company, have helped the company grow to its outstanding reputation within the IT consulting industry. 9
  • 14. 10
  • 15. 11
  • 16.
  • 17. EXECUTIVE TEAM MEMBERS Jon Weisberg Chief Financial Officer Areas of Expertise:: Customer Service; Project Management; Sales As the Chief Financial Officer (CFO) for Titan Technologies Consulting, I am responsible for the company’s corporate finance, financial planning, tax, accounting, investor relations, personal auditing, and risk management. My obligations as CFO is to provide your company with the best possible financial plan to save you money as well as receive the best possible service possible. To do this, we will meet constantly to develop a budget and plan that meets your financial needs. With a staff including certified C.P.A’s as well as C.F.A’s, we continually work towards supporting the mission of the company by maintaining balanced budgets and find ways to save money. Personally, I am a graduate of Embry Riddle Aeronautical University with a Master of Business Administration with a specialization in Finance. Through numerous jobs and positions within the Financial aspect I have worked up the ranks to become CFO for Titan Technologies Consulting. 13
  • 18. 14
  • 19. EXECUTIVE TEAM MEMBERS Vishal Narayanaswamy Chief Information Officer Areas of Expertise:: Project Management; Information Technology Information has always proven to serve as the backbone to a company and its success. It is my job as the Chief Information Officer (CIO) for Titian Technologies Consulting to main- tain the Information Technology Systems and its long-term requirements. As the company’s CIO, it is my responsibility to oversee all uses on information technology and to ensure the stra- tegic alignment of IT with our business goals and objectives. Together, with my team and fellow Executive Officers, we continually strive to have both the most suitable technology and to have updated information at Titian Technologies Con- sulting as well as the latter for our clientele base. Furthermore, it is my personal privilege to en- sure that the delivery of all IT projects is on time and within budget. 15
  • 20. 16
  • 21. EXECUTIVE TEAM MEMBERS Priyesh Patel Chief Technology Officer Areas of Expertise:: Financing; Budgeting; Information Technology It is my pleasure to serve as the Chief Technology Officer (CTO) for Titian Technologies Consulting. In this position I work on using my knowledge of Information Technology Systems to ensure that the throughput, speed, accuracy, availability, and reliability of our organizations systems are working at their peak efficiency and effectiveness in order to adequately provide customer service to each of our clients. Also, my department works on continually updating our systems database on available technology for on-time, available clientele use. 17
  • 22. 18
  • 23. EXECUTIVE TEAM MEMBERS J. Sanjay Kiran Naidoo Chief Security Officer Areas of Expertise:: Computer Software; Engineering In the world of Information Technology, one of the biggest threats to an organization is the security of the IT system. It is my responsibility as the Chief Security Officer (CSO) to ensure that all systems that are installed within our company and our clients have security strategies and IT safeguards to protect the systems from hackers and viruses. Within my office, we continually monitor the integrity of the system, develop policies to protect the systems, and obtain the most up-to-date anti-viral and spyware software available in the marketplace. 19
  • 24. 20
  • 25. 21
  • 26.
  • 27. HARDWARE SYSTEM SELECTION Basics Hardware Price per Category Item Description Quantity Total Price Item Workstation Precision T1500 28 1,548.00 43,344.00 Workstation Optiplex 380MT 198 1,140.00 225,720.00 Laptop Toughbook 52 16 2,241.99 35,871.84 Laptop HP EliteBook 8440w Moblie Workstation 5 1,649.00 8,245.00 Printer HP LaserJet P2055dn (B&W) 18 399.00 7,182.00 Printer HP LaserJet M1522 (multi-function) 18 349.99 6,299.82 Plotter HP Designjet T620 Printer series 1 2,450.00 2,450.00 Server Dell PowerEdge T710 7 9,819.00 68,733.00 Storage Array Power Vault 1 11,945.00 11,945.00 Tape Drive Q1538A HP Storage Works Ultrium 960 1 2,666.53 2,666.53 Tape Media C8014A HP LTO Ultrium x20-200GB 30 1,061.66 31,849.80 48 port Switch WS-C2960-48TT-L Cisco Caralyst 2960-48TT 7 1,372.25 9,605.75 24 port Switch WS-C2960-24TC-L Cisco Caralyst 2960-24TC 4 1,372.25 5,489.00 UPS HP UPS T1500 G3-UPS-95 Watt 1400VA 8 494.99 3,959.92 Network Cable Cables to Go network cable kit 6 146.99 881.94 Cable Connec- RJ-45 Belkin Network Connectors (100 pcs) 17 23.99 407.83 tors Router Cisco 1941 Intergrated Service Router 2 1,294.62 2,589.24 D-Link Xtreme N Duo Wireless-N Bridge/ WIFI Access 8 99.99 799.92 Access Point Barcode Scanner Datalogic Quickscan 6500BT Scanner 4 437.90 1,751.60 Card Scanner 21088045 MagTek Stripe Reader Card Scanner 4 180.00 720.00 Switch Cisco Catalyst 4900M 1 10,080.00 10,080.00 Router Cisco 3945 Integrated Service Router 1 7,953.33 7,953.33 Firewall D-Link DFL 210 NetDeffend 4-Port 1 354.99 354.99 Surge Protectors Model SS7619-15 18 99.00 1,782.00 Totals 490,682.51 23
  • 28. By Department Department Hardware Quantity Price Per Unit Total Costs FAA Liasion Workstations 4 1,548.00 6,192.00 24 Port Switch 1 1,372.25 1,372.25 Wireless Access Point 1 99.99 99.99 Black & White Printer 1 399.00 399.00 Engineering Workstations 16 1,548.00 24,768.00 Black & White printer 2 399.00 798.00 Multi-Function printer 1 349.99 349.99 Plotters 1 2,450.00 2,450.00 24 Port Switch 1 1,372.25 1,372.25 UPS 1 494.99 494.99 Server 1 9,819.00 9,819.00 Maintenance Planning and Workstations 25 1,140.00 28,500.00 Control Black & White printer 3 399.00 1,197.00 Wireless Access Point 1 99.99 99.99 Multi-Function printer 1 349.99 349.99 48 Port Switch 1 1,372.25 1,372.25 Customer Liaison Workstations 6 1,140.00 6,840.00 Black & White printer 1 399.00 399.00 Multi-Function printer 1 349.99 349.99 Accounting Workstations 20 1,140.00 22,800.00 Black & White printer 2 399.00 798.00 Multi-Function printer 1 349.99 349.99 48 port switch 1 1,372.25 1,372.25 Server 1 9,819.00 9,81900 UPS 1 494.99 494.99 Information Technology Workstations 12 1,140.00 13,680.00 Servers 4 9,819.00 39,276.00 UPS 5 494.99 2,474.95 Storage Array 1 11,744.00 11,744.00 Black & White printer 1 399.00 399.00 Wireless Router 1 1,294.62 1,294.62 Multi-Function printer 1 349.99 349.99 48 port switch 1 1,372.25 1,372.25 Storage Array 1 11,945.00 11,945.00 Tape Media 30 1,061.66 31,849.80 Tape Drive 1 2,666.53 2,666.53 Network Switch 1 10,080.00 10,080.00 Network Router 1 7,953.33 7,953.33 24
  • 29. Department Hardware Quantity Price Per Unit Total Costs Publications & Regulatory Workstations 8 1,140.00 9,120.00 Data Multi-Function printer 1 349.99 349.99 Black & White Printer 1 399.00 399.00 24 Port Switch 1 1,372.25 1,372.25 Human Resources Workstations 12 1,140.00 13,680.00 Black & White Printer 1 399.00 399.00 Multi-Function printer 1 349.99 349.99 48 port switch 1 1,372.25 1,372.25 Marketing Workstations 24 1,140.00 27,360.00 Black & White printer 3 399.00 1197.00 Multi-Function printer 1 349.99 349.99 48 port Switch 1 1,372.25 1,372.25 Sales & Contracts Workstations 20 1,140.00 22,800.00 Black & White printer 3 399.00 1,197.00 Multi-Function printer 1 349.99 349.99 48 port Switch 1 1,372.25 1,372.25 Hangar 1 Workstations 12 1,140.00 13,680.00 Laptops 4 2,241.99 8,967.96 Wireless Access Point 1 99.99 99.99 Multi-Function printer 1 349.99 349.99 Server 1 9,819.00 9,819.00 UPS 1 494.99 494.99 Wireless Access Point 1 99.99 99.99 Hangar 2 Workstations 8 1,140.00 9,120.00 Laptop 4 2,241.99 8,967.96 Multi-Function printer 1 349.99 349.99 Wireless Access Point 1 99.99 99.99 Hangar 3 Workstations 8 1,140.00 9,120.00 Laptop 4 2,241.99 8,967.96 Multi-Function printer 1 349.99 349.99 Wireless Access Point 1 99.99 99.99 Hangar 4 Workstations 8 1,140.00 9,120.00 Laptop 4 2,241.99 8,967.96 Multi-Function printer 1 349.99 349.99 Wireless Router 1 1,294.62 1,294.62 V.P. Maintenance Operations Workstations 8 1,548.00 12,384.00 Multi-Function printer 1 349.99 349.99 Wireless Access Point 1 99.99 99.99 Laptop 1 1,649.00 1,649.00 48 Port Switch 1 1,372.25 1,372.25 25
  • 30. Department Hardware Quantity Price Per Unit Total Costs V.P Human Resources Workstations 6 1,140.00 6,840.00 Laptop 1 1,649.00 1,649.00 Multi-Function printer 1 349.99 349.99 V.P Marketing Workstations 9 1,140.00 10,260.00 Multi-Function printer 1 349.99 349.99 24 Port Switch 1 1,372.25 1,372.25 Laptop 1 1,649.00 1,649.00 V.P Accounting & Finance Workstations 8 1,140.00 9,120.00 Laptop 1 1,649.00 1,649.00 Multi-Function printer 1 349.99 349.99 President Workstations 12 1,140.00 13,680.00 Laptop 1 1,649.00 1,649.00 Wireless Access Point 1 99.00 99.00 Multi-Function printer 1 349.99 349.99 MISC Network Cable Kit 6 146.99 881.94 RJ-45 Connectors (100pcs) 17 23.99 407.83 Surge Protectors 18 99.00 1,782.00 Barcode Scanner 4 437.90 1,751.60 Card Scanner 4 180.00 720.00 26
  • 31. SOFTWARE SYSTEM SELECTION Software Category Item Description Quantity Total Price Operating System Windows 7 Professional 247 included Office Applications Microsoft Office 2007 Small Business Edition 247 included Outlook; PowerPoint Presentation; Excel; Word; Publisher Scheduling Schedule Anywhere 500 monthly fee* Project Management ProjectManagement.com 500 monthly fee* Internet Service New Edge Network 1 monthly fee* Enterprise T1 1.5 - Core Coverage 3YR Maintenance Corridor (minus the annual fee) 45 138,769.00 Oracle Database Standard Edition Database Management 1 21,350.00 (plus first year support) CAD Catia 1 8,857.00 Computer Logon Novell Secure Logon (total for 500 logons) 38,568.15 Total 207,544.15 * Note: All programs having a monthly fee have no set-up or purchase costs associated with them. 27
  • 32. WARRANTY INFORMATION Hardware Support Manufacturer Dell PowerEdge T710 3 Yr ProSupport for IT and Mission Critical 2hr Dell 7X24 Onsite Pack, 5Hr Repair Dell Precision T1500 3 Yr ProSupport for end users and 3 Yr NBD Dell On-site Service Optiplex 380MT 3 Yr ProSupport for end users and 3 Yr NBD Dell On-site Service, 3 year Complete Care Accidental Damage Protection HP Storage Works Ultrium 960 3 Years Warranty HP HP LTO Ultriumx 20- 200GB Limited Life time Warranty HP Storage Media Cisco 48 Port Switch Limited Life time Warranty Cisco Cisco 24 Port Switch Limited Life time Warranty Cisco UPS 3 Years Warranty HP PowerVault MD3000 3 Yr ProSupport for end users and NBD On-site Service Toughbook 52 Protection Plus 3yr Accidental Damage EliteBook 8440w Mobile Limited 3-year standard parts and labor onsite, HP workstation 7x24 hardware technical phone support, 1 yr limited warranty on battery Tripp-Lite Surge Protectors Life time warranty Tripp-Lite 1941 Integrated service router 90 Day warranty, 10 Day replacement period Cisco Wifi Access Point Best buy Black & White Printer 1 Year warranty HP Multi-Function Printer 1 Year Warranty HP 28
  • 33. BASE PROJECT BUDGET Category Item Description Quantity Rate Total Price Consultant Fee Titian Technology Consultation Team 1 200,000 $ 200,000.00 Installation/Test Employee (10 man team per Installation Fee 6 9,000 54,000 week) Installation Fee Site Supervisor (1 individual) 6 1,200 7,200 Training Fee Microsoft Office 2007 Training (per employee) 500 50 25,000 Training Fee Corridor Application (per employee) 500 100 50,000 Training Fee Catia Application (per employee) 16 100 1,600 Training Fee IT System Solutions (per employee) 12 100 1,200 Sub-total 339,000 Hardware Total Product Price 637,425.78 ($472,154.19 + 20% Markup) Sofware Total Product Price 207,544.15 First Year of Annual Fees (minus the consultant and IT support 31,600.40 fees) Bid Price 1,183,969.93 Budget 1,500,000.00 Remaining Funds 316,030.07 COMPANUY FUTURE BUDGET INFORAMTION Item Description Monthly Rate Yearly Rate Internet Service (New Edge Network) 289.00 3,468.00 Project Management 1,865.00 22,380.00 Scheduling (Schedule Anywhere) 257.45 3,089.40 Oracle Annual Support 1,100.00 Catia Annual Service Fee 1,563.00 Consulting Team & IT Support Fee 30,000.00 Annual Totals 61,600.40 29
  • 34. COST EXPLAINATION Service Cost Titan Technologies Consulting provides a personal consulting team to CFAO. For the full-time services of our team, we are charging a flat fee of $200,000. This price includes a full -time lead or Project Manager, which is exclusive to the individual client. Also the price covers the team of experts that are under the Project Manager which includes a Financial Consultant and a Information Technology Consultant. Together they work to provide the best IT solution for their client. Through our research this price is inline with the industry average range for this consulting service and structure. The installation and testing of your enterprise architecture will take a total of 6 weeks; we equate this installation to a cost of $61,200. The team is constructed of a 10 individual team and a site supervisor to ensure quality control and task management. By taking the average annual income for a single worker with this type of job description it works out to be $900.00 for each individual worker a week. For the site supervisor we included a $300.00 increase over the workers, due to the added responsibilities that this individual holds in creating and testing the IT systems. The total fees for your training amount to $77,800. For Microsoft Office training, the cost was figured out by charging all 500 CFAO employees at a rate of $50 per employee. For Corridor Applications, the cost was figured out by charging all 500 CFAO employees at a rate of $100 employee. For Catia Applications, the cost for the 16 engineers is at a rate of $100 employee. For IT Systems Solutions, the cost for the 12 employees at a rate of $100 employee. These rates are able to be accomplished through the concept that we do off-site training at a location which is owned and operated by Titian Technologies. The reason for the price differ- ence in the trainings is due to the difference in length of time and the technology systems that are required for each training evolution. Hardware Cost We chose the hardware presented above because it fits into Titan Technologies Consulting’s core philosophy. The following are the main reasons why we choose the hardware:  Eco-friendly aspects of the hardware (including Energy Efficiency)  Competitively priced  High quality of the equipment that is purchased Titian Technology Consulting Calculations When we were researching our opportunities for creating a profitable situation for our company, it was discovered that in order to remain competitive that we should look at a 30 percent markup on products offered. The average for contractors (according to contractor- talk.com) is to have a 30 to 40 percent markup on services offered. What we have decided on doing to create out profit is to mark up the physical hardware product that is purchased with a 30 percent markup. 30
  • 35. Below are the markup calculations for the product which is proposed for purchase with this RFP. Hardware 130% Markup Category Item Description Total Price Price Workstation Precision T1500 43,344.00 56,347.20 Workstation Optiplex 380MT 225,720.00 293,436.00 Laptop Toughbook 52 35,871.84 46,633.39 Laptop HP EliteBook 8440w Moblie Workstation 8,245.00 10,718.50 Printer HP LaserJet P2055dn (B&W) 7,182.00 9,336.60 Printer HP LaserJet M1522 (multi-function) 6,299.82 8,189.77 Plotter HP Designjet T620 Printer series 2,450.00 3,185.00 Server Dell PowerEdge T710 68,733.00 89,352.90 Storage Array Power Vault 11,945.00 15,528.50 Tape Drive Q1538A HP Storage Works Ultrium 960 2,666.53 3,466.49 Tape Media C8014A HP LTO Ultrium x20-200GB 31,849.80 41,404.74 48 port Switch WS-C2960-48TT-L Cisco Caralyst 2960-48TT 9,605.75 12,487.48 24 port Switch WS-C2960-24TC-L Cisco Caralyst 2960-24TC 5,489.00 7,135.70 UPS HP UPS T1500 G3-UPS-95 Watt 1400VA 3,959.92 5,147.90 Network Cable Kit Cables to Go network cable kit 881.94 1,146.52 Cable Connectors RJ-45 Belkin Network Connectors (100 pcs) 407.83 530.18 Router Cisco 1941 Intergrated Service Router 2,589.24 3,366.01 D-Link Xtreme N Duo Wireless-N Bridge/Access WIFI Access 799.92 1,039.90 Point Barcode Scanner Datalogic Quickscan 6500BT Scanner 1,751.60 2,277.08 Card Scanner 21088045 MagTek Stripe Reader Card Scanner 720.00 936.00 Switch Cisco Catalyst 4900M 10,080.00 13,104.00 Router Cisco 3945 Integrated Service Router 7,953.33 10,339.33 Surge Protectors Model SS7619-15 1,782.00 2,316.60 Totals 490,327.52 637,425.78 Titian Technologies Consulting’s profit for this project would be $147,098.26. 31
  • 36.
  • 38. GANTT CHART FOR PROJECT 34
  • 39. 35
  • 40. 36
  • 41. 37
  • 42. 38
  • 43. 39
  • 44. 40
  • 45. 41
  • 46.
  • 48.
  • 49. INDIVIDUAL OFFICE/BUILDING NETWORKS Administrative Facility Zones for easy reference to office location Zone 1 Zone 2 Zone 3 45
  • 50. Zone 1 FAA Liaison/ Customer Liaison/ Engineering/ Maintenance 46
  • 51. 47
  • 52. Zone 2 Accounting/ Human Resources/ IT/ Marketing/ Publications & Regulatory Data/ Sales & Contracts 48
  • 53. 49
  • 54. 50
  • 55. 51
  • 56. 52
  • 57. Zone 3 Vice President Office/ President Office 53
  • 58.
  • 60.
  • 61. INFORMATION TECHNOLOGY POLICIES Introduction This section is a conglomerate of Information Management Policies that Titian Technologies Consulting suggests for all clients to adopt into their information enterprise architecture. The purposes of these policies are to ensure the appropriate usage of the systems and the protection of the systems that Titan Technologies Consulting, Inc. provides its clients. All policies should be reviewed by the Chief Information Officer (CIO) or another senior executive to remain within compliance standards of each policy and to enact appropriate changes where necessary. Furthermore, if necessary, it is suggested that the CIO partner with executive peers in order to create changes to the policies. The policies that Titian Technologies Consulting suggests are:  Acceptable Use Policy  Internet Usage Policy  Anti-spam Policy  Instant Message Policy  Software Installation Policy In order to effectively ensure that all policies are followed, it is best practice to guarantee that every employee is aware of these policies. In addition, it is Titian Technologies Consulting suggestion that the latter policies be placed in an employee handbook and stored for future reference. References: http://www.sans.edu/resources/student_projects/200711_002.pdf www.theiia.org/download.cfm?file=77275 57
  • 62. Acceptable Use Policy Central Florida Aircraft Overhaul Inc. will provide access to the computer Network, Internet and email. Your cooperation with all listed rules and recommendations and general etiquette are required for this access to be continued. If you have any questions or concerns regarding the provisions of this Policy in general or pertaining to you, please contact the Office of Human Resources. You are forbidden to provide any person details of your account information without prior ap- proval on a per incident basis from your in house implementation officer. If you violate this policy, your access may be limited or withdrawn. In addition, you may be subject to disciplinary action, up to and including termination. 1. Your commitment to and responsibilities By using or accepting your account password and related information, you agree to adhere to this policy document. You also agree to report any Network, Internet or email misuse to the in house implementation officer. Misuse includes Policy violations listed or unlisted which harm any person or the company or which compromise data. 2. Intended period of Usage Network, Internet and email access extends throughout the term of your contract and employ- ment, provided you do not violate the Acceptable Usage Policy. Note: The company may sus- pend access at any time without notice or reason. 3. Purpose of provison of computer privilege. The company offers access to its Network Internet and email system for business purposes only. If you are unsure consult the in house implementation officer. 4. Netiquette (Etiquette for the net) All users are required to maintain the rule of Network etiquette, or Netiquette. You must be considerate, comply with the acceptable ethics and code of conduct and use the Network, Inter- net and email appropriately and legally. The company will determine what materials, files, in- formation, software, communications, and other content and activity are permitted or prohib- ited, as outlined below. 5. Banned/ Unacceptable Activities The following activities violate the Company’s Computer Network, Internet and email Accept- able Usage Policy. 5.1. Sending or receiving offensive, abusive, vulgar or defamatory content. 5.2. Sending or receiving ethnic, sexual-preference, or gender-related slurs or jokes. 5.3. Sending or receiving confidential information about clients or colleagues. 5.4. Conducting unauthorized business. 5.5. Viewing, transmitting, downloading, or searching for pornographic or illegal materials. 5.6. Accessing others’ folders, files, work, networks, or computers. 5.7. Using software that is not licensed or approved by the company. It is understood that you could receive banned material through no fault of your own. It is ex- pected that you report this on immediate receipt to the in house implementation officer. If the in house implementation officer is not available then you should report it to the person of 58
  • 63. nearest authority available and leave word for the in house implementation officer to contact you urgently on her/ his return. 6. Respect for all confidential information Some employees may have access to confidential information pertaining to clients, the com- pany, employees or management. This information should be shared with caution and on a need to know basis. If in doubt please consult the in house implementation officer. 7. Email Exists for Business Purposes The company allows email access primarily for business purposes. Employees are prohibited from using personal email software (Hotmail, etc) for business or personal communications at the office other than with permission on a per incident basis from the in house implementation officer. 8. Authorized Personal Use of Email Employees may use (if requested of and permitted by the in house implementation officer) email to communicate with family members. Employees’ personal use of email is limited to lunch breaks and work breaks only. Employees may not use email during otherwise productive business hours. Employees are prohibited from using email to operate a business, conduct an external job search, solicit money for personal gain, campaign for political causes or candidates, or promote or solicit funds for a religious or other personal cause. 9. Privacy Network, Internet access and email are provided as a tool for our organization’s business. The computer system is the property of CFAO. CFAO has the legal right to monitor usage of the Network, Internet and email. Employees have no reasonable expectation of privacy when using CFAO’s computer system, Network, Internet or email. 10. Violations and consequences These guidelines are intended to provide CFAO employees with general examples of acceptable and unacceptable use of the Company’s computer system. A violation of this policy may result in disciplinary action up to and including termination. Acknowledgement If you have any questions about the above policies and procedures, address them to the in house implementation officer before signing the following agreement. I have read the company’s Network, Internet and Email Acceptable Usage Policy and agree to abide by it. I understand and accept that a violation of any of the above policies and procedures may result in disciplinary action, up to and including my termination. User Name User Signature Date 59
  • 64. Internet Usage Policy Introduction Central Florida Aircraft Overhaul, Inc. aims to provide you with accessible, up-to-date and reli- able information to support you in your work. This goal requires us to provide access to the vast information resources of the Internet to help you do your job and be well-informed. The Inter- net is a business tool for Central Florida Aircraft Overhaul, Inc., and is provided to you at a sig- nificant cost. Users must understand that this access is for the purpose of increasing productiv- ity and not for non-business activities. Users must also understand that any connection to the Internet offers an opportunity for non-authorized users to view or access corporate information. Therefore, it is important that all connections be secure, controlled, and monitored to provide you with accessible, up-to-date and reliable information and learning technology to support you in your work, research, and studies Authorized use Central Florida Aircraft Overhaul, Inc.'s Internet connection is intended primarily for business use. That means we expect you to use your Internet access primarily for business-related pur- poses, i.e., to communicate with customers and suppliers, to research relevant topics, and to ob- tain useful business information. The following are specific provisions regarding authorized use of Central Florida Aircraft Overhaul, Inc.'s internet connection:  Internet use should be restricted to sites and materials such as news or information that might be considered reasonable if read as a text publication in an office environment.  Occasional and reasonable personal use should not interfere with the performance of work duties and responsibilities. Unauthorized use Users shall not use this company's Internet or e-mail services to view, download, save, receive, or send material related to the following:  Offensive content of any kind, including pornographic material.  Propagate a virus, worm, Trojan horse, or trap-door program code.  Circumvent any system intended to protect the privacy or security of another user.  Visiting Web sites that promote threatening or violent behavior.  Using the Internet for Illegal activities. The above list of prohibited actions is by way of an example only and is not intended to be ex- haustive. User accountability Users are responsible for their Internet use and are accountable for the following:  Honoring acceptable use policies of networks accessed through the organization’s Internet services.  Abiding by existing federal, state, and local telecommunications and networking laws and regulations.  Following copyright laws regarding protected commercial software or intellectual property. Privacy and monitoring Central Florida Aircraft Overhaul, Inc. has software and systems in place to monitor and record 60
  • 65. all Internet usage. Our security systems are capable of recording each Web site and e-mail mes- sage into and out of our internal networks. We reserve the right to do so at anytime. No em- ployee should have any expectation of privacy as to his or her Internet usage. Our managers will review Internet activity and analyze usage patterns, and they may choose to publicize this data to assure that Central Florida Aircraft Overhaul, Inc. Internet resources are devoted to maintaining the highest levels of productivity. We reserve the right to inspect any and all files stored in private areas of our network in order to assure compliance with this policy. Accidental/unintended violations Central Florida Aircraft Overhaul, Inc. uses independently-supplied software and data to iden- tify inappropriate or sexually-explicit Internet sites. We may block access from within our net- works to all such sites. If you find yourself connected accidentally to a site that contains sexu- ally explicit or offensive material, you mush disconnect from that site immediately, regardless of whether that site had been previously deemed acceptable by any screening or rating program. A user who accidentally accesses a prohibited site is encourage to report the incident to the company's IT Department without the threat of incurring a violation penalty. Violation penalties Violations will be reviewed on a case-by-case basis. If it is determined that a user has violated one or more use regulations, that user will receive a reprimand from his or her supervisor and his or her future Internet use will be closely monitored. If a gross violation has occurred, man- agement will take immediate action. Such action may result in losing Internet privileges, severe reprimand, or termination of employment. Reporting When clear violations of this Internet Usage Policy occur, appropriate IT department staff, the offender’s managing supervisor, and a company's Human Resource representative will be for- mally notified. First time offenders will be notified their Internet usage will be closely moni- tored and IT staff may review the employee’s communications for a period of 3 months. If the user's Internet usage is deemed appropriate during that time, then no further action will be taken. If other abuses of this Internet Usage Policy occur during this probationary period, man- agement and a Human Resources representative will be notified to take appropriate action as indicated in the Violation Penalties section of this document. Central Florida Aircraft Overhaul, Inc. intends to enforce this policy, but reserves the right to change it at any time as circumstances may require. Chief Informational Officer is responsible for administering this policy and should be contacted should you have any questions or com- ments concerning this policy. The employee may not access the Internet via the Central Florida Aircraft Overhaul, Inc.'s net- work at any time, through any device, unless he/she has read this policy. 61
  • 66. Anti-Spam Policy Central Florida Aviation Overhaul Inc. has a no tolerance spam policy. Central Florida Aviation Overhaul Inc. customer support actively monitors large import lists and emails going to a large number of contacts. Any customer found to be using Central Florida Aviation Overhaul Inc. for spam will be immediately cut-off from use of the product. If you know of or suspect any viola- tors, please notify us immediately at abuse@cfao.asset.protection.com Every email contains a mandatory unsubscribe link - those individuals who try to remove this link will be warned that they are doing so. If the link is removed or de-activated in any way, Central Florida Aviation Overhaul Inc. will terminate the customer's account. What is Spam? Spam is unsolicited email also known as UCE (Unsolicited Commercial Email). By sending email to only to those who have requested to receive it, you are following accepted permission- based email guidelines. What constitutes a Preexisting business relationship? The recipient of your email has made a purchase, requested information, responded to a ques- tionnaire or a survey, or had offline contact with you. What constitutes consent? The recipient of your email has been clearly and fully notified of the collection and use of his email address and has consented prior to such collection and use. This is often called informed consent. Isn't there a law against sending Spam? The federal anti-spam law went into effect on January 1st, 2004 and preempts all state laws. While this new law will not stop spam, it does make most spam illegal and ultimately less at- tractive to spammers. The law is specific about requirements to send commercial email and em- powers the federal government to enforce the law. The penalties can include a fine and/or im- prisonment for up to 5 years. How to protect yourself from Spam: Take the Spam Test 1.Are you importing a purchased list of ANY kind? 2.Are you sending to non-specific addresses such as:  sales@domain.com, business@domain.com, webmaster@domain.com, info@domain.com, or other general addresses.  Are you sending to distribution lists or mailing lists which send indirectly to a variety of email addresses?  Are you mailing to anyone who has not explicitly agreed to join your mailing list?  Have you falsified your originating address or transmission path information?  Have you used a third party email address or domain name without their permission?  Does your email's subject line contain false or misleading information?  Does your email fail to provide a working link to unsubscribe?  Are you failing to process any unsubscribe requests that come to you via a reply to your email within 10 days or the request? 62
  • 67. If you have answered YES to ANY of the above questions you will likely be labeled a SPAM- MER. For more information visit The Coalition Against Unsolicited Email (www.xauce.org) or contact Constant Contact Customer Support (support@cfao.asset.protection.com) Instant Message Policy The use of Instant Messaging technology is limited to the capabilities provided by Central Flor- ida Aircraft Overhaul, Inc. on internal network services. Workforce members must use the In- stant Messaging service provided in a manner that protects company assets and Confidential Information and abide by the rules subject to the policy as outlined below. Rules 1. Employees are prohibited from downloading and using personal, consumer-grade IM software (e.g., AOL Instant Messenger, Yahoo!, or MSN) to transmit messages via the public Internet. Employees who violate this rule are subject to termination. 2. All IM communications and information transmitted, received, or archived in the com- pany's IM system belong to the company. 3. Employees have no reasonable expectation of privacy when using the company s IM system. The company reserves the right to monitor, access, and disclose all employee IM communications. 4. The IM system is intended for business use only. Employees are prohibited from wast- ing computer resources, colleague’s time, or their own time sending personal instant messages or engaging in unnecessary chat related to business. 5. Treat IM messages as business records that may be retained and used as evidence in liti- gation, audits, and investigations. 6. Employees are required to retain all business-related instant messages and delete nones- sential messages in accordance with the company s written IM retention and deletion schedule. Please talk to Central Florida Aircraft Overhaul, Inc. compliance officer or chief information officer if you need a copy or have questions about Central Florida Air- craft Overhaul, Inc.’s IM retention and deletion policies, practices, and procedures. 7. Always use professional and appropriate language in all instant messages. Employees are prohibited from sending abusive, harassing, threatening, menacing, discriminatory, pornographic, disrespectful, or otherwise offensive instant messages. 8. Employees are prohibited from sending jokes, rumors, gossip, or unsubstantiated opin- ions via IM. These communications, which often contain objectionable material, are easily misconstrued when communicated electronically. 9. Employees may not use IM to transmit confidential, proprietary, personal, or potentially embarrassing information about the company, employees, clients, business associates, or other third parties. 10. Employees may not share confidential, proprietary, or potentially embarrassing business -related or personal IMs with the media, competitors, prospective employers, or other third parties. 11. Employees are to share their IM usernames with colleagues strictly on a need-to-know basis. If you have any questions about the above policies, address them to the compli- 63
  • 68. Software Installation Policy Overview Allowing employees to install software on company computing devices opens the organization up to unnecessary exposure. Conflicting file versions or DLLs which can prevent programs from running, the introduction of malware from infected installation software, unlicensed software which could be discovered in an audit, and programs which can be used to hack the organization’s network are examples of the problems that can be introduced when employees install software on company equipment. Purpose To minimize the risk of loss of program functionality, the exposure of sensitive information contained within Central Florida Aircraft Overhaul, Inc. computing network, the risk of introducing malware, and the legal exposure of running unlicensed software. Scope This policy covers all computers, servers, PDAs, smartphones, and other computing devices operating within Central Florida Aircraft Overhaul, Inc... Policy Employees may not install software on Central Florida Aircraft Overhaul, Inc. computing de- vices operated within the Central Florida Aircraft Overhaul, Inc. network. Software requests must first be approved by the requester’s manager and then be made to the Information Tech- nology department or Help Desk in writing or via email. Software must be selected from an ap- proved software list, maintained by the Information Technology department, unless no selection on the list meets the requester’s need. The Information Technology Department will obtain and track the licenses, test new software for conflict and compatibility, and perform the installation. Enforcement Any employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment. Definitions  DLL: Dynamically Linked Library. A shared program module used by one or more pro- grams, often installed as part of a program installation. If the current version of a  DLL is overwritten by a newer or older version, existing programs that relied upon the original version may cease to function or may not function reliably.  Malware: A wide variety of programs created with the explicit intention of performing mali- cious acts on systems they run on, such as stealing information, hijacking functionality, and attacking other systems.  PDA: Personal Digital Assistant. A portable, hand held computing device capable of run- ning software programs. It may connect to host computers or to wired or wireless networks.  Smartphone: A cellular phone with qualities of a computer or PDA. It is capable of running software programs and connecting to computer networks. 64
  • 69. TRAINING PROGRAM In House Training Program Training for your new enterprise architecture will be conducted by one of our selected in-house training teams. We choose not to outsource this important facet of your new endeavour because we feel our services end not at providing your company tailored products but exist indefinitely throughout the longevity of your needs. Furthermore, since our analysis of your company guided us to provide you with the ultimate personalized architecture, we feel it is our duty to ensure you know how to use it from the people who provided it to you. Note from the graph below shows that 55% of companies use departments within themselves to provide IT training. It is our belief that these companies are underutilizing the potential to ade- quately train their employees through utilizing their own sources. Although this may provide more comfort and perceived control for a company, the lack of know-how and lack of true com- petitive advantage poorly transcends throughout the company and, ultimately, hurts the bottom line. Therefore, we are proud to be a considered within the 13% of companies who utilize out- side sources for their training. http://articles.techrepublic.com.com/5100-10878_11-1049089.html?tag=content;leftCol Training will be held at an off cite training facility that we set up to provide classroom/ simulator training for your employee’s. We will supply the computers and training materials (e.g. projectors, printers, and so on) and each class will consist of no more than a third of each of the department’s workforce. 65
  • 70. Several benefits of training offsite:  Improves focus on learning tasks instead of work  Allows employees to absorb more information  Promotes collaboration and interaction between employees  Psychologically beneficial through an environmental change  Creates less disruption of the operation at the primary location  Allows “folks” to get out of the office and have fun Our Training Program Goals:  Provide real world training instead of just application training – task oriented  Address specific skills relative to the employee’s specific job  Administer continual training throughout the longevity of employee’s tenure Identifying the Training Needs of the Company: The following section outlines how we identified the training needs of your company. We feel it is integral to understand the training needs of the company and tailor a training program that fits those needs. Executive input – We seek the input regarding the training requirements and goals from execu- tives within the consultee organization. This enables our training program to be catered to the goals and requirements of the company and remain in line with the strategy of the company. Employee assessment – An employee assessment is important to understand the exact needs of different departments within the company. We understand that each department has specific needs and wants, therefore and employee analysis is conducted before the training program be- gins to better understand our clients. Indentify current help-desk trends – We consult with the current IT solutions or help-desk within the company to further understand the recurring problem within in order to develop a training plan resolves such problems. Poll the students – As a post training evaluation, our trainers survey a sample of trainees to evaluate the training program to ensure proper, real-world knowledge was absorbed during the training program. This evaluation serves as a metric for your company and allows us to better understand how our program can more effectively serve your needs in the future. Specific training classes:  Microsoft Office 2007 Class  Corridor Operations Class  Catia Operations Class  New Hire Class  Luncheon – ask the expert “continual” training classes (Held after initial training) 66
  • 71. Training timeline: Timeline - August 23, 2010 through November 19, 2010 Days and time – Training per employee will be anywhere between 6 to 20 hours. Classes will be held Monday through Friday where employees will spend no more than 6 hours a day (not including breaks). Continual training – We understand the importance of time to your employees; therefore our continual training program isn’t as dynamic as the initial training program. For the reason of time, and an assumption that employees will have the proper knowledge after initial training, our continual training program is very relaxed and more geared toward answering unique ques- tions and problems not discussed in initial training. Our continual training program consists of selected IT employee s that will hold a luncheon every two weeks. Course Outline - Microsoft Office 2007 Training *Note- All employees of CFAO will participate in Microsoft Office Training. They will be split up into 3 evenly groups consisting of: Engineering, Maintenance Planning & Control, Ac- counting, Information Technology, Human Resources, Marketing, Sales & Contracts Objectives:  To properly evaluate employees current knowledge of Microsoft Office Software  To transition the employees of CFAO from Microsoft Office 2003 to Microsoft Office 2007  To train employees at a steady pace so that the information is not too overwhelming. Training Schedule: Group A Schedule: August 23rd - 6 hour session on fundamentals of Word, Excel, and PowerPoint August 24th - 6 hour practical case study Group B Schedule: August 25th - 6 hour session on fundamentals of Word, Excel, and PowerPoint August 26th - 6 hour practical case study Group C Schedule: August 30th - 6 hour session on fundamentals of Word, Excel, and PowerPoint August 31st - 6 hour practical case study 67
  • 72. Course Outline - Corridor Application *Note– All employees of the company will participate in the week long training. Objectives:  To properly evaluate the Maintenance Planning & Control department’s current knowl- edge of aviation service providers.  To train engineers at a steady pace so that the information is not too overwhelming Group A Schedule: September 6th - 6 hour session of Corridor services September 7th - 6 hour session of Corridor services September 6th - 6 hour session of Corridor services September 8th - 6 hour practical case study Group B Schedule: September 13th - 6 hour session of Corridor services September 14th - 6 hour session of Corridor services September 15th - 6 hour session of Corridor services September 16th - 6 hour practical case study Group C Schedule: September 20th- 6 hour session of Corridor services September 21st - 6 hour session of Corridor services September 22nd - 6 hour session of Corridor services September 23rd - 6 hour practical case study Course Outline - Catia Application *Note- Only the Engineering Department will participate in the week long training Objectives:  To properly evaluate the engineering department’s current knowledge of Catia.  To train engineers at a steady pace so that the information is not too overwhelming. Group A Schedule: October 4th - 6 hour session of Catia Fundamentals October 5th - 6 hour session of Catia Programming October 6th - 6 hour session of Catia Programming & Design October 7th - 6 hour session of Catia Design October 8th - 6 hour practical case study 68
  • 73. Group B Schedule: October 11th - 6 hour session of Catia Fundamentals October 12th - 6 hour session of Catia Programming October 13th - 6 hour session of Catia Programming & Design October 15th - 6 hour session of Catia Design October 15th - 6 hour practical case study Group C Schedule: October 18th - 6 hour session of Catia Fundamentals October 19th - 6 hour session of Catia Programming October 20th - 6 hour session of Catia Programming & Design October 21st - 6 hour session of Catia Design October 22nd - 6 hour practical case study Course Outline - Informational Technology Support *Note- Only the IT Department will participate in the week long training Objectives:  To properly evaluate the IT department’s current knowledge of IT solutions  To train IT technicians at a steady pace so that the information is not too overwhelming. Group A Schedule: November 1st - 6 hour session of Networking Solutions November 2nd - 6 hour session of Reviewing the Programs in Use at Company November 3rd - 6 hour session of Troubleshooting Solutions November 4th - 6 hour session of Troubleshooting Solutions/ System Administrator Training November 5th - 6 hour practical case study Group B Schedule: November 8th - 6 hour session of Networking Solutions November 9th - 6 hour session of Reviewing the Programs in Use at Company November 10th - 6 hour session of Troubleshooting Solutions November 11th - 6 hour session of Troubleshooting Solutions/ System Administrator Training November 12th - 6 hour practical case study Group C Schedule: November 15th - 6 hour session of Networking Solutions November 16th- 6 hour session of Reviewing the Programs in Use at Company November 17th - 6 hour session of Troubleshooting Solutions November 18th - 6 hour session of Troubleshooting Solutions/ System Administrator Training November 19th - 6 hour practical case study References: http://articles.techrepublic.com.com/5100-10878_11-1036375.html?tag=content;leftCol http://articles.techrepublic.com.com/5100-10878_11-5032139.html?tag=content;leftCol http://articles.techrepublic.com.com/5100-10878_11-1049089.html?tag=content;leftCol 69
  • 74.
  • 75. APPENDIX A SYSTEM REQUIREMTS PROPOSAL WORKSHEET Overall System Requirements: 4 The bidder's products must execute in a dynamic, secure environment and all company computers will use the Windows operating system. The operating system that will be used is Windows 7 Professional Edition. All workstations will be protected by Trend Micro Internet Security software for 15 months. SUSE Linux Enterprise server 10 will be used as operating software for all integrated servers. 4 All computers and associated peripherals will be networked. All elements of the network will be integrated using CAT5e cables and Wi-Fi. Overall Software Requirements: 4 Network all company computers using a Windows-based operating system. All workstations and laptops are networked with each other using Windows 7 Professional Edition as an operating system 4 Establish a company-wide intranet. All networked elements will have access to company-wide intranet. Every employee will have their own username and password provided by the network administrator to allow se- cure access to the intranet. 4 Provide secure Internet access for all users. All the workstations will be connected to the internet. The internet service will be provided by New Edge Networks with a 1.5M T1 connection. New Edge Network guarantees net- work availability of 99.9% or better. Secured Wi-Fi access will be provided throughout both facilities. 4 Use technologies such as fiber, satellite, the Internet, etc., as appropriate. The network will utilize CAT5e cables, switches, Wi-Fi routers, Wi-Fi Access Points to connect all workstations and peripherals. A T1 router modem will be used to gain broad- band access to the internet. Office and Productivity Software Requirements: 4 Word processing Microsoft Word 2007 will be used as the word processing software. This version enables communication more effectively with SmartArt diagrams and new charting tools. Word 2007 helps information workers create professional looking content quickly. A host of new tools enable the user to construct documents from pre-defined parts and styles that allow workers to increase productivity efficiently. 4 Spreadsheets Microsoft Office Excel 2007 allow users to create and format spreadsheets. It is also used to analyze and share information to make more informed business decisions. Excel 2007 al- lows users to share sensitive business information more broadly with enhanced security among work groups. 4 Database management Oracle Database Standard Edition is a full featured database for servers with up-to 4 sock- ets. The software manages all data types and enables all the business applications to take advantage of the performance, reliability, security and scalability. 71
  • 76. Office and Productivity Software Requirements: 4 Presentation graphics Microsoft Office PowerPoint 2007 enables users to quickly create high impact dynamic presentation by integrating workflow and ways to easily share information. Integration with Windows Media Player allows users to integrate audio and video into a slideshow. 4 Email Microsoft Outlook 2007 provides an integrated solution for managing time and information, connecting across boundaries, and remaining in control of the information that needs to be reached to the user. Key features include automatic grouping of messages, junk e-mail han- dling and improved reading views and also allows users to flag messages. 4 Scheduling In addition to e-mail abilities, Microsoft Office Outlook 2007 also provides solutions for scheduling. Outlook 2007 delivers innovations in order to manage daily priorities by using the "To-Do" bar. The "To-Do" bar provides a consolidated view of upcoming events, tasks, calendar, making it easy to act on information. ScheduleAnywhere is also going to be used. This is an internet based scheduling software that allows employees to access their schedule from anywhere. 4 Project management ProjectManager.com will be providing all the solutions for project management. They offer a wide range of services that include project planner, tracking, sharing, and reporting. Teams can be managed online from any geographic location. 4 CAD CATIA is a multi-platform CAD/CAM/CAE commercial software suite developed by Das- sault Systems. CATIA supports multiple stages of product development from conceptualiza- tion, design, manufacturing and engineering. 4 Internet browser Internet Explorer 8 is faster, safe and easier to use than the previous versions. With visual suggestions and accelerators, Internet Explorer 8 is easy to navigate and fast. The browser also protects users from Malware threats. Many new features such as an automatic crash recovery, content filtering and smart screens protect the user's internet experience. 4 Network operating system SUSE Linux Enterprise Server 10 is the network operating system of choice for applica- tions, web services and infrastructure delivering high reliability and performance and supe- rior business value. This software is highly reliable, scalable and secure server operating system, built to power both physical and virtual mission critical workloads. Linux Enter- prise Server is designed to work with Windows and other operating systems making it the ideal choice for a mixed environment. Maintenance Software Requirements: 4 Provide maintenance software (from vendors) that allows for planning and control of air- craft maintenance on large (including wide-body) aircraft. Corridor Workgroup Edition was selected to satisfy the maintenance software requirements. corridor eliminates manual efforts, reduces redundancies, lowers costs, improve speed and empowers employees to perform higher levels of direct service. Corridor's module set al- lows for customization of software to suit company's specific needs 72
  • 77. Maintenance Software Requirements: 4 Hardware proposed will support maintenance software. Datalogic QuickScan 6500 BT Scanner, a RS232 protocol compliant device, fully decoded and reads track 1 and 2 will be acquired to support the maintenance software. MagTek Stripe Reader Card Scanner, PS232 protocol with serial port will also be provided. 4 Use Continuum Corridor software per the quote provided by CFAO. You will need the nec- essary number of Work Group Edition applications, annual support, one Oracle license, Oracle support and installation & implementation. License QTY Corridor Work Group Edition* 45 Annual Support** 45 Oracle License (1 Processor) 1 Oracle Support (Annually – 1 Processor) 1 Installation & Implementation 1 Maintenance Software Requirements (cont.) 4 Maintenance software will include work order, work order quote, line sales & management, inventory, rotable management, account integration, sales order quote, sales order, aircraft, regulatory compliance, company database, purchase request, purchase order, and shipping & receiving. Corridor Software includes all of the above mentioned modules 4 Provide regulatory software as appropriate to large aircraft (must include Airworthiness Di- rectives, Service Letters, Service Bulletins, etc.). "The aviation regulatory library system by Aviation DataSource, Inc will be used as the company's regulatory software. This system is an internet based single source electronic aviation regulatory library database that includes all airworthiness directives for large and small aircraft, type certification data sheets, FARS, CARS, and JARS. Over 350000 files are in the system and are available by request. The system should include utilities for: 4 Installation SUSE Linux Enterprise Server 10 ships with a unique set of server administration, configu- ration and deployment tool called YaST. This allows administrators to easily install and up- grade software and operating systems from a central location. 4 Recovery All the servers are factory equipped with Symantec Backup Exec system Recovery 2010 Server Edition. The software is a simple, cost effective back-up and recovery solution for businesses that help minimize down time and avoid disaster by easily recovering individual data, files, folders or complete windows system in minutes, even to different hardware, vir- tual environment or remote locations. 4 Back-up All the servers are factory equipped with Symantec Backup Exec system Recovery 2010 Server Edition. The software is a simple, cost effective back-up and recovery solution for businesses that help minimize down time and avoid disaster by easily recovering individual data, files, folders or complete windows system in minutes, even to different hardware, vir- tual environment or remote locations. 73
  • 78. The system should include utilities for: 4 Security All workstations come equipped with Trend Micro Internet Security. The software protects against viruses and defends personal information with a anti-spyware technology. A per- sonal firewall defends against attacks through the internet. 4 On-line help and documentation Titan Technologies will provide all the documentation and help on-line through its website. Titan Technology will acquire all necessary documents from different vendors and offer them at one website for our customers at www.titantech.com. Workstation Components: 4 Make and model: Low End Workstations : Dell OptiPlex 380 MT High End Workstations : Dell Precision T1500 Hangar Laptops : Panasonic Toughbook 52 Executive Laptops : HP EliteBook 8440W Mobile Workstation 4 Processor, processor speed Dell OptiPlex 380 MT - Intel Core 2 Duo (2.93 GHz, 1066 MHz FSB) Dell Precision T1500 - Quad Core Processor CORE i5 (2.64 GHz, 8MB) Panasonic Toughbook 52 - Intel Core 2 Duo P8400 2.26GHz (Centrino) HP EliteBook 8440W Mobile Workstation - Intel Core i7-620M 2.66GHz, 4MB L3 Cache 4 Amount of RAM Dell OptiPlex 380 MT - 2GB DDR 3 Non-ECC SDRAM, 1066 MHz (2 DIMM) Dell Precision T1500 - 2GB DDR 3 Non-ECC SDRAM, 1066 MHz (2 DIMM) Panasonic Toughbook 52 - 2GB HP EliteBook 8440W Mobile Workstation - 4GB, 1333MHz DDR3 SDRAM 4 Hard drive size Dell OptiPlex 380 MT - 320 GB SATA 3.0 GB/s and 16MB DataBurst Cache Dell Precision T1500 - 320 GB SATA 3.0 GB/s 7200 RPM and 16MB DataBurst Cache Panasonic Toughbook 52- 160GB HP EliteBook 8440W Mobile Workstation - 320GB, 7200RPM SATA II 4 Other drives Dell OptiPlex 380 MT - 16x DVD-ROM, Cyberlink Power DVD Dell Precision T1500 - 16x DVD-ROM, Cyberlink Power DVD Panasonic Toughbook 52 - 8x DVD+/-R/RW with double layer support HP EliteBook 8440W Mobile Workstation - DVD+/-RW SuperMulti DL LightScribe 4 Printer make and model (networked and/or stand-alone) Black and White : HP LaserJet P2055dn Multifunction : HP LaserJet M1522 Plotter : HP Designjet T620 printer 4 Monitor make, model and size Dell OptiPlex 380 MT - Dell E Series E1910H 18.5in wide monitor, VGA only Dell Precision T1500 - Dell Professional 1909W 19in wide monitor, VGA/DVI Panasonic Toughbook 52 - 15.4in wide screen display HP EliteBook 8440W Mobile Workstation - 14in diagonal backlit HD+ antiglare 74
  • 79. Workstation Components: 4 Any network or telecommunication devices Dell OptiPlex 380 MT - PCIE 10/100/1000 Dell Precision T1500 - PCIE 10/100/1000 Panasonic Toughbook 52 - PCIE 10/100/1000. Wireless - 802.11 A/B/G/N HP EliteBook 8440W Mobile Workstation - PCIE 10/100/1000. Wireless - Intel Centrino Ultimate-N 6300, 802.11 A/B/G/N, Bluetooth 2.1 4 Any necessary audio hardware There are no necessary audio hardware required. However, the laptops come equipped with integrated speakers. Other Hardware: 4 Servers Dell PowerEdge T710 Processor : (x2) Intel Xeon E5630 2.53GHz, 12M Cache, Turbo HT, 1066MHz RAM : 12GB (6 x 2GB), 1333MHz Dual Ranked RDIMMs Hard drive : 300GB 10K RPM Serial-Attach SCSI 6GBPS Monitor : 17in LCD Networking: Broadcom 5709 Dual Port 1GBE NIC W/TOE iSCSI, PCIe-4 4 Storage array Dell PowerVault MD 3000 Hard drive: 2X 2TB 7.2K RPM universal SATA 3.5in 4 Firewall Microsoft Windows 7 Professional edition already has inbuilt firewall capabilities. In addi- tion all the routers are integrated with inbuilt firewall. The Cisco Catalyst switch offers inte- grated security that includes network admission control, advance quality of service. 4 Connection (NIC or Modem) The connection between the network components and to the internet will be through the NIC port. This connection will enable the component to receive and exchange data and ap- plications. The network is connected to the internet via a T1 router provided by the ISP. 4 Cables (estimate an average of 10 yards per connection if used) CAT5e cables are going to be used to connect all the network components. It can support speeds up to 100Mbps. Cables to go network cable kit will be used to network the system. The kit includes 1000ft of CAT5e cable, 50 pack of RJ45 connectors, RJ45 crimp tool and cable continuity tester using an estimate of 30ft/connection we estimate that we require 10 kits. 4 Hubs, repeaters, bridges, switches or routers Cisco Catalyst 2960-24TC- 24 port switch Cisco Catalyst 2960-48TT- 48 port switch Cisco 1941 integrated service router D-Link - Xtreme N Duo Wireless-N Bridge/Access point 4 Server racks Not required since the servers use tower chassis 4 UPS HP UPS T1500 G3-950WATT-1400VA. Only the servers, storage array and the database are connected to the UPS. 75
  • 80. Minimum Hardware Requirements: 4 2 GB of RAM per workstation 4 100 GB of hard drive space per workstation 4 2 GHz processor speed 4 4 TB storage capability for entire network (storage array, server, etc.) 4 Total back-up capability including all data and applications (preferably offsite) HP StorageWorks Ultrium 960-TapeDrive- LTO Ultrium - SCSI Storage Media - HP LTO Ultrium x 20 - 200GB The system should allow for: 4 User ID and password protection. Novell SecureLogin simplifies the enterprise single Sign-on implementation. Novell Se- cureLogin effectively reduces the number of password reset calls to the helpdesk. 4 Security administration that is centrally controlled on-site. The YaST tools in SUSE Linux Enterprise Server 10 allows administrators to automatically and transparently configure, update and troubleshoot workstations from wherever they are without having to physically visit each device. Using policies, administrators can generate and maintain work environments with content and applications according to the personal needs of each user. As a result, users access their work environments and applications in a simple, consistent way from any device, at any location. Novell Identity Manager provides capabilities such as identity lifecycle management, Access Management, Enterprise Single Sign-on, Password Management. 4 Complete archival capability to meet FAA and other regulatory requirements. SUSE Linux Enterprise Server 10 enables IT administrators to simplify storage manage- ment. Without an effective storage-management solution, the risks could range from lost data to more serious threats like litigation or negative audit findings. SUSE Linux 10 helps minimize these risks with automated policy management, ensuring compliance with corpo- rate and government regulations for secure data storage. The aircraft maintenance planning and tracking system should provide for: 4 Flexible reporting capacity. As many aircrafts as needed can be added to the reports 4 Easily modified standard reports. Standard reports can be easily modified by adding or excluding fields of information. 4 Ability to write special reports. Any report can be customized 4 Trend reporting. It is a part of "Reliability Report" 4 Linkage/download into other software (e.g. spreadsheets, word processing, database, etc.) Corridor integrates with all Microsoft Office Programs 4 Be menu-driven to lead inexperienced users through the system. Users inexperienced with the system can easily use the system by the menus provided 4 Allow an experienced user to by-pass menus. Shortcuts provide direct access to most commonly accessed information for an experienced user to by-pass the menus 76
  • 81. Network Management and Administration: 4 Provide easy-to-read documentation, including both technical and user manuals. All documentation will be provided by the software and hardware vendors 4 Provide an IT policy manual which includes a recommended employee computer-use policy, security processes, sanctions for misuse, etc. All IT policies that Titian Technologies Consulting recommend to be adapted by a client for their system are available from the consulting team or through the client section of our web page. 4 Include network management policies such as maintenance rules, software installation, indi- vidual data back-up, etc. All IT policies that Titian Technologies Consulting recommend to be adapted by a client for their system are available from the consulting team or through the client section of our web page. Installation: 4 Installation assistance. Installation of the system will be either taken care of by a team of Titian Technology Con- sulting employees, or is included in the price of the equipment. All outside installation is limited to specific software applications. 4 Implementation assistance. Implementation assistance will be part of Titian Technology Consulting’s services provided. 4 Is a qualified technical representative provided on-site to install the system? If not, describe installation alternatives and the level of technical knowledge required. Yes, there will be a team of Titian Technology Consulting employees who will be installing and testing the network. They workers will be supervised by a site supervisor who will be there when company employees are working. 4 Describe how the bidder ensures that newly installed systems are adequately tested. Titian Technologies has an intensive 3 week testing process that will be conducted along with a quality control measures inspection, that will be conducted by the site supervisor. Training: 4 Technical training (IT support staff). During the training evolution part of this project there will be IT support training, the dates for this training will be November 1, 2010 though November 19, 2010 4 End-user training. There are three different elements of training for this project. There will be Microsoft Of- fice and Corridor Training for all employees. The dates for this training will be August 23, 2010 through August 31, 2010 and September 6, 2010 through September 23, 2010 respec- tively. 4 Helpdesk counselor training. Titian Technologies Consulting believes that the Helpdesk should be a 365-7-24. With this thought in mind Titian Technology offers a outsourced helpdesk that can offer this service. 4 System administrator training. System administrator training is part of the IT Support Training. This is because we believe that the individuals who control the system is the IT Department. 77
  • 82. Technical and Maintenance Support: 4 Telephone support. This is filled through the uses of a 1-800 hotline.. 4 The command files required to run the system, with complete operator's documentation This will be held within the IT department and located on a section of Titian Technologies Consulting’s website that is dedicated to clients. 4 Custom modifications. Custom modifications was considered through out the project process. From the use of lap- tops in the hanger and for the Senior Executives of the company to the selection of training process. 4 Describe who will provide long-term support and system enhancements to the proposed system and the availability to provide such support. Through the use of the consultant team, clients will continually find that they are able to have one individual to turn to if up-grades and expansion is required by the client. 4 Describe the on-going level of support and procedure for "bug-fixes" provided by the bid- der. Through the use of the consultant team, clients will continually find that they are able to have one individual to turn to if up-grades and expansion is required by the client. 4 Warranties included with equipment purchased. All items that are within the project were considered because of the warranties that were available. 4 Provide three years of IT technical support. Most of the equipment and software includes this support, and where it is not included by the manufacture Titian Technologies Consulting services include through the use of the consultant team. 4 Provide three years of maintenance support. Most of the equipment and software includes this support, and where it is not included by the manufacture Titian Technologies Consulting services include through the use of the consultant team. System Integration: 4 List integration services to be performed.  Installation and Testing Team  End User Training  User section of the Titian Technologies Consulting website (www.titiantech.com)  Username and Passwords  365-7-24 Helpdesk  Use of both wired and wireless systems 78
  • 83. APPENDIX B EQUIPMENT SCREENSHOTS Computers: Precision T1500 79
  • 85. Laptops: Toughbook 52 81
  • 86. Laptops: HP EliteBook 8440w Mobile Workstation 82
  • 87. Printers: HP LaserJet P2055dn 83
  • 89. Plotter: HP Designjet T620 85
  • 90. Server: 86
  • 94. Switches: 48 Port Switch 90
  • 96. Switches: Network Switch 92
  • 97. Router: Integrated Router 93
  • 98. UPS: 94
  • 100. Internet Connection Equipment: CAT 5E Cable: Belkin Bulk Cable - 1000 ft 96
  • 102. Router: 98
  • 106. Scheduling Program: 500 Employee Price per month 102
  • 108. Project Management: # users at price Cost Cost breakdown 1 $25.00 $25.00 24 $10.00 $240.00 25 $8.00 $200.00 50 $6.00 $300.00 150 $4.00 $600.00 250 $2.00 $500.00 Total cost per month $1,865.00 104
  • 109. Corridor 105