BUSINESS CASE CAPSTONE 2
BUSINESS CASE CAPSTONE 3
Business Case Capstone
Connie Farris
Raphael Brown
Jim Chambers
Shaun Cummings
Deandre Kralevic
Colorado Technical University
IT Capstone II
(IT488-1904B-01)
Henrietta Okora
Running head: BUSINESS CASE CAPSTONE 1
Business Case Capstone
Table of Contents
(Week 1) Section 1: Overview of the project (from IT487)3
Overview3
I75 Corridor4
Section 2: Requirements (from IT487)5
Section 3: Design (from IT487)7
Section 4: System development methodology9
Section 5: Work breakdown structure11
Section 6: Communication Plan13
(WEEK 2) Section 7: Quality Assurance Plan TBD15
(WEEK 3) Section 8: Documentation Plan TBD16
(Week 4) Section 9: Quality Assurance and results of test-case execution TBD17
Section 10: Project Closure18
References:19
(Week 1) Section 1: Overview of the project (from IT487)Overview
The Galactic Customer IT Services is IT Support Company with over 250,000 employees with companies in over 50 states with the main headquarters located in Gainesville, FL. The location chosen for the headquarters is based on a Telco Gateway Infrastructure that the main fiber-optic truck line runs along the I75 corridor, from Miami Lakes FL to the northern part of Michigan. This I75 corridor plays an important part of the Networking ability for the organization. The Galactic Customer IT Services is an IT support company, which provides IT support to various small to large companies both within the Unites States and support to various military bases overseas. This large customer service company has installed application software to its large Help Desk ticketing system. The next phase being implemented is the upgrading of its Networking Infrastructure, which also includes cloud-based networking. This Organization has several new updated Servers ready to install on the network. With the previous project being accepted the organization has decided to move forward to improving its networking infrastructure, however the organization has request the project team to draft a plan that requires the following in the plan: Requirements, Design, System Development Methodology, WBS (Work Breakdown Structure), Communications Plan, Quality Assurance Plan, Documentation Plan, and Quality Assurance and results of test-case execution be the project can be closed. I75 Corridor
http://gregkantner.com/blog/wp-content/uploads/2012/05/interstate-75-map.gif
Section 2: Requirements (from IT487)
The project requirements here are derived from the software requirements for the Galactic customer services. The project was to create new ticketing software that the customer wanted upgraded and to completely replace the previous product. The requirements are the following:
• Ticket system
• Ticke ...
Business Case Capstone IIConnie FarrisColorado T.docxjasoninnes20
Business Case Capstone II
Connie Farris
Colorado Technical University
IT Capstone II
(IT488-1904B-01)
Henrietta Okora
Running head: BUSINESS CASE CAPSTONE II 1
BUSINESS CASE CAPSTONE II 4
Abstract
BUSINESS CASE CAPSTONE II 3
Business Case Capstone II
Table of Contents
Table of Contents
Abstract2
(Week 1) Section 1: Overview of the project (from IT487)4
Overview4
I75 Corridor5
(Week 1) Section 2: Requirements (from IT487)6
(Week 1) Section 3: Design (from IT487)8
(Week 1) Section 4: System development methodology10
(Week 1) Section 5: Work breakdown structure12
Work Break down Structure13
(Week 1) Section 6: Communication plan14
Communication Matrix15
(Week 2) Section 7: Quality Assurance Plan16
(Week 3) Section 8: Documentation plan17
(Week-4) Section 9: Quality Assurance and results of test-case execution18
Section 10 – Project closure19
QUALITY MANAGEMENT REPORT20
Introduction20
Requirements21
Resources22
Design24
System Development Methodology25
Communication Plan27
References28
(Week 1) Section 1: Overview of the project (from IT487)Overview
The Galactic Customer IT Services is an IT support company with over 250,000 employees with companies in 50 States with the main headquarters located in Gainesville, FL. The location chosen for the headquarters is based on a Telco Gateway Infrastructure that the main fiber-optic trunk line, which runs along the I-75 corridor, from Miami Lakes FL to the northern most part of Michigan. This I-75 corridor plays an important part of the Networking ability for the organization. The Galactic Customer IT Services is an IT support company, which provides IT support to various small to large companies both within the Unites States and support to various military bases overseas. This large customer service company has installed application software to its large Help Desk ticketing system. The next phase being implemented is the upgrading of its Networking Infrastructure, which also includes cloud-based networking. This Organization has several new updated Servers ready to install on the network. With the previous project being accepted the organization has decided to move forward to improving its networking infrastructure, however the organization has requested the project team to draft a plan that requires the following in the plan: Requirements, Design, System Development Methodology, WBS (Work Breakdown Structure), Communications Plan, Quality Assurance Plan, Documentation Plan, and Quality Assurance and results of test-case execution before the project can be closed. Additionally, this organization is upgrading it phone systems to Voice Over Internet Protocol, which will eliminate all Intra-Ladder costs from Telco Companies and the cloud-based networking will also be added to the VoIP system. Using the Waterfall method, the plan below will detail the necessary requirements and resources that will be taken by Galactic IT to provide the most comprehensive plan possible reg ...
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docxmonicafrancis71118
CLASS NAME:MIS600
PROFESSORS NAME:
STUDENTS NAME:
PROJECT NAME: NETWORK DESIGN
Content
Topic Page No.
Cover Page 1
Content 2
Executive summary 3
Project Charter 3
Earn Value Statement 11
Executive Summary
Network under a set of confined region is known as Intranet. It uses an IP protocol and IP-based tools like the file transfer application and web browsers that is provided by the server to only assigned IP address. Computer network communication is an important installation in a contemporary organization organisation. As the organization's service provision is improved through the reliable communication, its competition with related firms is enhanced and, therefore, valued competence. Ultimate network design as a mode of flow of information among employees and stakeholders in promotes coordination in the management, team work and services the business offer. This automatically improves the performance of the organisation at the good will of all workers.
It should be noted that an organisation's communication systems alone holds a large percentage in its performance that it should not be compromised, even on the slightest default. This would mean that the organisation would require an Information System that when a default occurs at any single point in the connection system, it would be easier to detect and reach that point as soon as possible. The design should be design with backbone network so temporally technical problem with not upset the performance of network communication. This is more appropriate in big organisations to maintain their data and communication confidentiality, integrity and accessibility. In networking design approach, the choice of device should be intelligently selected for the desired function, this will enhance performance in terms of managing security, traffic, errors in storage and transmitting information.
Documents and programs that are sensitive are run through LAN security domain system to create passwords for their protection against cybercrimes. The protected file would then be accessed by authorised personnel only. This would be an important idea where security of flowing information is paramount. Each set of the employee has got a privilege to prevent the access of any restricted file in the company.
Project Charter
Project Name
Network Design
Project Number
DW2
Project Team
Sponsor: Robert Elson
Author : Jacobs Adam
Manager: Joyce Rob.
1- How does the transport layer use stop and wait to control flow .docxdorishigh
1- How does the transport layer use stop and wait to control flow of data?
2-How does Exponential backoff work?
3- What is DES, and what is its purpose?
4- Discuss TCP's congestion control mechanism?
5- What are the differences between CSMA/CD and CSMA/CA?
Graded Scoring Rubric
Attribute
Comments
Possible Points
Points Earned
Requirements analysis Analysis covers five requirements, defining them and providing explanations of each; and demonstrates understanding of course concepts, analysis, and critical thinking.
Excellent summary of FEI and its environment. Not totally clear on which 5 requirements you planned to address; perhaps bullets or explicitly identifying them would help.
3
2.5
Technology solution An appropriate technology solution is provided and thoroughly explained. It addresses all identified requirements.
Cloud storage, VoIP, videoconferencing, network management tools are all excellent components of a converged solution, but how do you plan to implement it. What network technology is required? Will FEI build the network themselves or lease it? I see the network in the diagram, but not explained in the text.
3
2
Converged solution An effective converged network is proposed; work demonstrates understanding of course concepts, analysis, and critical thinking.
Very good.
2
2
Cost-benefit analysis The benefits of the converged solution are fully discussed in terms of relative cost of implementing multiple solutions.
You mentioned a low cost solution that will lower the cost of operations, but without understanding the network infrastructure I’m not clear how this will be achieved. Again is FEI building a network or leasing it?
2
1.5
External research At least two sources other than the textbook (and other course material) are incorporated and used effectively
You must provide in-text citations so that the reader knows how you used the sources. Also, to avoid plagiarism be careful to use quotation marks appropriately when quoting directly.
1
.25
Document format The document reflects effective organization and correct sentence structure, grammar, and spelling; it is presented in a professional format; it incorporates illustrations or diagrams; and references are appropriately incorporated and cited, using APA style.
Section headers may help to organize the paper to ensure that all of the required topics are addressed.
1
1
Total Points
12
9.25
Page 1 of 2
Architectural Diagram Instructions
Introduction
This is an individual project. This project is related to the Case Study project. Each student must complete an Architectural Diagram that illustrates the placement of security and other technologies within the converged network solution. The foundation for this project is the requirements analysis and proposal document that you completed for the Case Study project. The target audience will be the organization’s Chief Information Officer (CIO). The Architectural Diagram deliverable is an MS Word document.
The comple ...
The proposed project “Online Movie Ticket Booking System” is the process whereby consumers directly buy movie tickets online from a multiplex website interactively in real-time without an intermediary service over the Internet. The Given System provides the detailed working of the Online Movie Ticket Booking Processing and what all happens whenever we or any one of us goes to book movie tickets online.
Get This project here: http://mcabcaprojects.com
Business Case Capstone IIConnie FarrisColorado T.docxjasoninnes20
Business Case Capstone II
Connie Farris
Colorado Technical University
IT Capstone II
(IT488-1904B-01)
Henrietta Okora
Running head: BUSINESS CASE CAPSTONE II 1
BUSINESS CASE CAPSTONE II 4
Abstract
BUSINESS CASE CAPSTONE II 3
Business Case Capstone II
Table of Contents
Table of Contents
Abstract2
(Week 1) Section 1: Overview of the project (from IT487)4
Overview4
I75 Corridor5
(Week 1) Section 2: Requirements (from IT487)6
(Week 1) Section 3: Design (from IT487)8
(Week 1) Section 4: System development methodology10
(Week 1) Section 5: Work breakdown structure12
Work Break down Structure13
(Week 1) Section 6: Communication plan14
Communication Matrix15
(Week 2) Section 7: Quality Assurance Plan16
(Week 3) Section 8: Documentation plan17
(Week-4) Section 9: Quality Assurance and results of test-case execution18
Section 10 – Project closure19
QUALITY MANAGEMENT REPORT20
Introduction20
Requirements21
Resources22
Design24
System Development Methodology25
Communication Plan27
References28
(Week 1) Section 1: Overview of the project (from IT487)Overview
The Galactic Customer IT Services is an IT support company with over 250,000 employees with companies in 50 States with the main headquarters located in Gainesville, FL. The location chosen for the headquarters is based on a Telco Gateway Infrastructure that the main fiber-optic trunk line, which runs along the I-75 corridor, from Miami Lakes FL to the northern most part of Michigan. This I-75 corridor plays an important part of the Networking ability for the organization. The Galactic Customer IT Services is an IT support company, which provides IT support to various small to large companies both within the Unites States and support to various military bases overseas. This large customer service company has installed application software to its large Help Desk ticketing system. The next phase being implemented is the upgrading of its Networking Infrastructure, which also includes cloud-based networking. This Organization has several new updated Servers ready to install on the network. With the previous project being accepted the organization has decided to move forward to improving its networking infrastructure, however the organization has requested the project team to draft a plan that requires the following in the plan: Requirements, Design, System Development Methodology, WBS (Work Breakdown Structure), Communications Plan, Quality Assurance Plan, Documentation Plan, and Quality Assurance and results of test-case execution before the project can be closed. Additionally, this organization is upgrading it phone systems to Voice Over Internet Protocol, which will eliminate all Intra-Ladder costs from Telco Companies and the cloud-based networking will also be added to the VoIP system. Using the Waterfall method, the plan below will detail the necessary requirements and resources that will be taken by Galactic IT to provide the most comprehensive plan possible reg ...
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docxmonicafrancis71118
CLASS NAME:MIS600
PROFESSORS NAME:
STUDENTS NAME:
PROJECT NAME: NETWORK DESIGN
Content
Topic Page No.
Cover Page 1
Content 2
Executive summary 3
Project Charter 3
Earn Value Statement 11
Executive Summary
Network under a set of confined region is known as Intranet. It uses an IP protocol and IP-based tools like the file transfer application and web browsers that is provided by the server to only assigned IP address. Computer network communication is an important installation in a contemporary organization organisation. As the organization's service provision is improved through the reliable communication, its competition with related firms is enhanced and, therefore, valued competence. Ultimate network design as a mode of flow of information among employees and stakeholders in promotes coordination in the management, team work and services the business offer. This automatically improves the performance of the organisation at the good will of all workers.
It should be noted that an organisation's communication systems alone holds a large percentage in its performance that it should not be compromised, even on the slightest default. This would mean that the organisation would require an Information System that when a default occurs at any single point in the connection system, it would be easier to detect and reach that point as soon as possible. The design should be design with backbone network so temporally technical problem with not upset the performance of network communication. This is more appropriate in big organisations to maintain their data and communication confidentiality, integrity and accessibility. In networking design approach, the choice of device should be intelligently selected for the desired function, this will enhance performance in terms of managing security, traffic, errors in storage and transmitting information.
Documents and programs that are sensitive are run through LAN security domain system to create passwords for their protection against cybercrimes. The protected file would then be accessed by authorised personnel only. This would be an important idea where security of flowing information is paramount. Each set of the employee has got a privilege to prevent the access of any restricted file in the company.
Project Charter
Project Name
Network Design
Project Number
DW2
Project Team
Sponsor: Robert Elson
Author : Jacobs Adam
Manager: Joyce Rob.
1- How does the transport layer use stop and wait to control flow .docxdorishigh
1- How does the transport layer use stop and wait to control flow of data?
2-How does Exponential backoff work?
3- What is DES, and what is its purpose?
4- Discuss TCP's congestion control mechanism?
5- What are the differences between CSMA/CD and CSMA/CA?
Graded Scoring Rubric
Attribute
Comments
Possible Points
Points Earned
Requirements analysis Analysis covers five requirements, defining them and providing explanations of each; and demonstrates understanding of course concepts, analysis, and critical thinking.
Excellent summary of FEI and its environment. Not totally clear on which 5 requirements you planned to address; perhaps bullets or explicitly identifying them would help.
3
2.5
Technology solution An appropriate technology solution is provided and thoroughly explained. It addresses all identified requirements.
Cloud storage, VoIP, videoconferencing, network management tools are all excellent components of a converged solution, but how do you plan to implement it. What network technology is required? Will FEI build the network themselves or lease it? I see the network in the diagram, but not explained in the text.
3
2
Converged solution An effective converged network is proposed; work demonstrates understanding of course concepts, analysis, and critical thinking.
Very good.
2
2
Cost-benefit analysis The benefits of the converged solution are fully discussed in terms of relative cost of implementing multiple solutions.
You mentioned a low cost solution that will lower the cost of operations, but without understanding the network infrastructure I’m not clear how this will be achieved. Again is FEI building a network or leasing it?
2
1.5
External research At least two sources other than the textbook (and other course material) are incorporated and used effectively
You must provide in-text citations so that the reader knows how you used the sources. Also, to avoid plagiarism be careful to use quotation marks appropriately when quoting directly.
1
.25
Document format The document reflects effective organization and correct sentence structure, grammar, and spelling; it is presented in a professional format; it incorporates illustrations or diagrams; and references are appropriately incorporated and cited, using APA style.
Section headers may help to organize the paper to ensure that all of the required topics are addressed.
1
1
Total Points
12
9.25
Page 1 of 2
Architectural Diagram Instructions
Introduction
This is an individual project. This project is related to the Case Study project. Each student must complete an Architectural Diagram that illustrates the placement of security and other technologies within the converged network solution. The foundation for this project is the requirements analysis and proposal document that you completed for the Case Study project. The target audience will be the organization’s Chief Information Officer (CIO). The Architectural Diagram deliverable is an MS Word document.
The comple ...
The proposed project “Online Movie Ticket Booking System” is the process whereby consumers directly buy movie tickets online from a multiplex website interactively in real-time without an intermediary service over the Internet. The Given System provides the detailed working of the Online Movie Ticket Booking Processing and what all happens whenever we or any one of us goes to book movie tickets online.
Get This project here: http://mcabcaprojects.com
Information Systems Capstone
Contents
1.0 Introduction
Singh, Shirah, and Barber Financial Holdings LLC. continues to grow its business, increasing their dependency on information technogy. The firm has reached a point where a more flexible, scalable, straightforward infrastructure, and easily managed applications are required for sucessful business practices. A solution like Amazon Web Services (AWS) can provide the computer power, storage, and other resources needed as the firm expands.
Solution
s of this magnitude do require a considerable amount of upfront investment, but will provide minimal cost for subsequential years reducing overall capital expenses. This solution will also enable minimal effort when moving applications to the cloud, minimizing support, to include administrative cost while retaining performance, security, reliability, and data integrity. 1.1 Company at a Glance
Singh, Shirah, and Barber Financial Holdings LLC., has drastically increased the number of clients and accounts over the past couple of years. This growth prompted the need for more qualified staff, additional offices and space, and newer communication technologies to facilitate services and improved management. The firm has acquired several buildings in various cities which are ready to be outfitted with network infrastructure, user workstations, peripherals and software applications. 1.2 Challenges
With just one present location in XYZ city growth in its industry is challenging, therefore the opening of several branch locations in various cities coupled with the data migration to a cloud service has become its number one project. The firm’s current infrastructure is limited, it does not currently have a full scale WAN and remote access (VPN), only a local LAN through the major local ISP is employed. All backups are stored onsite with tape copies sent to a cold off site location. Databases with all financial information are stored in the local server and there are no true access control restrictions. Additionally, there is only one system administrator performing all major database tasks and network functions.
Financial health is one of the most protected types of digital content. Finding ways to store, secure, and manage such data in this ever changing world of computing is a challenge. In order for the firm to grow and blossom, a large and fast LAN/WAN network is needed. Such network must provide access to internal resources via secure methods of authentication and also from the outside by a secure web interface client. VPN capabilities for traveling and visiting staff should provide a secure connection to internal resources. Access to the network and network shares must be tightly secured based on departmental roles. All databases will be kept in separate servers and backups will be conducted routinely (Weekly, Monthly; incremental/full). Access to database tables will be based on individual approval; single sign on authenti.
This paper contains the details of the study
of Insurance Management system. The developed system
will manage all the information regarding Insured and
policies offered by the Life Insurance companies. It also
contains an integrated tool of voice enabled appointment
scheduler that alerts an agent for his daily activities. It also
contains features like Smart Data backup system,
Provisioning System, Policies Record, Commission Reports
The application created Proposal/ Policy Entries and then
was helpful for agents. It will be designed to offer east
accessible to all records to provide better maintainability
and to enable the user to make the required modification
as and when necessary. Execution of this project would
enable the user to seek, use and manipulate the records
pertaining to every client.
Project Charter and Management Plan Project ClientOr.docxbriancrawford30935
Project Charter and Management Plan
Project Client
Organization: Globex Corporation
Contact: @globex.com.au
System Name
Globex Network
Date of Charter
12/08/2016
Document Status
Draft / Approved
Document Reference
Charter.doc
Version Number
Version 1
Prepared by
ITC306 Networking Group
Team Members
Milinda Samaraweera
Upul Athapaththu
Yasitha Rohana
Supun Palipana
1. Change History
All changes to the Project Charter must be recorded in the Change History, and a new version of the charter must be approved by the client.
Date
Description of Change
Reason for Change
Author of Change
Version No.
dd/mm/06
Initial draft
N/A
Version 1
Version 2
Version 3
2. Authorized by:
Name: ________________________
Signature: ________________________
Date: ________________________
Table of Contents
1. CHANGE HISTORY
2. AUTHORISED BY:
3. PART 1. PROJECT CHARTER
3.1. PURPOSE OF THE CHARTER
3.2. PURPOSE OF THE PROJECT
3.3. BUSINESS OBJECTIVES OF THE PROJECT
3.4. SCOPE OF THE PROJECT
3.5. BUDGET AND TIMEFRAME
3.6. PROJECT MILESTONES AND DELIVERABLES
3.7. PROJECT RESOURCES
3.8. CLIENT RESOURCES
3.9. PROJECT TEAM RESOURCES
3.10. TECHNICAL ENVIRONMENT
4. PART 2. PROJECT MANAGEMENT PLAN (AN BRIEF VERSION)
4.1. RISK MANAGEMENT
4.1.1. Assumptions
4.1.2. Dependencies
4.2. CONSTRAINTS
4.3. RISK ASSESSMENT
4.3.1 Risk Rating
4.3.2 Risk Mitigation
4.4. SCHEDULE AND BUDGET
4.4.1 Schedule ( Microsoft Project software compulsory)
4.4.2 Budget
4.5. MONITORING & CONTROLLING MECHANISMS
5. REFERENCES
3.PART 1 - Project Charter 3.1. Purpose of the Charter
This project charter outlines the scope, goals and the general approach needed to design and build a new corporate network for Globex Corporation. This document is a vital component for starting, preparing, executing, supervising and evaluating the project. It is the only reference for this project’s goals and aims, scope, corporation, financial estimates and financial plans. Additionally, the project chatter acts a contract between Globex Corporation and Virtucon Pty Ltd, declaring all the deliverables in terms of budget, time scope, threats, assets and standards agreed upon for the project. Finally, this document keeps track of all the necessary data needed by the decision maker(s) to allow the funding of the project as well as authorize the project team to begin the project.
3.2. Purpose of the Project
The current network structure of Globex Corporation is earnestly in need of a secure VPN in a full mesh topology and a direct HTTPS connection over the intranet. The need for a reliable and secure network structure is fueled by the rising number of people depending on this company’s agricultural services. The aim of this project is to address Globex’s need for a reliable network structure by designing and building a new corporate network that is not only efficient and user-friendly but also secure.
3.3. Business Objectives of the Pro.
Appendix AProof of effectiveness of some of the agile methods us.docxarmitageclaire49
Appendix A
Proof of effectiveness of some of the agile methods used to develop systems requirements
In all software development methodologies, the process of collecting, understanding and managing all requirements for a system is a crucial process in software development. Similar to all this other methods, agile methods are not exceptional. Most agile method handle requirements in order to implement them as much accurately as possible to satisfy all the customer demands. This is usually achieved by maintaining a continuous interaction with the customers to address their needs according to priority and functionalities. In this appendix, we shall be focusing on continuous process of improving the development process.
Some agile methods include the following
1. eXtreme Programming (XP) – it improves a software project in communication, simplicity, feedback and courage.
2. scrum- this is an agile, iterative and incremental method which takes care of all changes that may come across in the life-cycle of the project. Basically, it adds energy, focus and clarity to development teams. Its major aim is ot see the whole system being a successful product.
3. Dynamic system, development method (DSDM)
4. Adaptive software development (ASD)- this is a development process that is a product of rapid application development. It has four phases of communication and planning, analysis, testing & deployment and design and deployment.
5. the crystal family
Due to availability of these various methods, the potential adopters may experience a challenge of determining what to apply on its own and therefore there was need to define a document containing all the necessary values and common qualities to be used across all agile methods. This document is the Agile Manifesto and focuses mainly on human interactivity and processes management.
1. Individual and interaction over various processes and tasks. Usually the agile process will focus more on people and their interactivity but not on the structural processes and tools.
2. Working software and documentation. Main objective of the developers is actually delivering a functional code which will always add value to our users. Well documented code is always self-documented.
3. Responding to change over planning. Here developers are required to respond very fast to the requirements variations. Time used in planning is minimal compared to what our users actually requires.
4. Customer collaboration over contracts. The mutual relationship of the developers and susers of our system is monitored and regulated through engaging the customer in the development process.
The figure below shows the steps in agile methodologies which focus on an iteration and adaptable change.
5.
Tools needed for requirement management in agile methods of system development.
1. The most popular tools in agile methods include paper, pencil a drawing pin board. If we consider eXtreme programming requirements are obtained from user stories which ar.
ITP-1 – Project Charter
Group 3 - The Project Management Masters (PMM)
Noah’s Ark Animal Clinic
PROJECT CHARTER
Group 3 ITP-1 – Project Charter
IFSM 438: Project Management
Project Management Masters
Crystal Wyland
Project Manager
Angela Farella
Documentation Manager
Kevin Smith
Editor
Jamie Cole
Procurement Manager
Kim Delahay
Deputy Project Manager
Shane Thideman
Researcher
Michelle Smith
Researcher
Contents
Contents 2
Executive Summary 3
Version History 4
Introduction 4
Purpose of Project Charter 4
Project and Product Overview 4
Justification 4
Business Need 4
Business Impact 4
Scope 5
Objectives 5
High-Level Requirements 5
Major Deliverables 5
Boundaries 5
Duration 5
Budget Estimate 6
Funding Source 6
Estimate 6
Assumptions, Constraints and Risks 7
Assumptions 7
Constraints 7
Risks 8
Project Organization 8
Roles and Responsibilities 8
Internal and External Stakeholders 9
Project Charter Approval 9
References 10
Executive Summary
The Project Management Masters (PMM) are very pleased to have been selected to implement an Information Technology (IT) solution at Noah’s Ark Animal Clinic. This document provides a summary and a forecast of the project that will take place.
Studies have shown that, when done correctly, the implementation of an IT infrastructure in a small business can lead to improved quality of information, increased individual productivity, and increased organizational productivity (Narkhede, Raut, Patil, & Mahajan, 2013). While there are no regulatory requirements for safeguarding a veterinary patient’s medical history, the clinic houses Personally Identifiable Information (PII) belonging to their customers.
PII is “information that can be used to distinguish or trace an individual’s identity, either alone or when combined with other personal or identifying information that is linked or linkable to a specific individual” (Office of Management and Budget, 2014). Implementation of an IT solution will also offer increased security of such information.
The Noah’s Ark Animal Clinic automation project is projected to take a maximum of six months to complete. There are little risks associated with the project, and recommendations for mitigation are included in this Project Charter.
Upon completion of the project, PMM will offer a ninety day warranty period. Should any issues arise during this ninety day warranty period, whether they be hardware, software, or user related, PMM will be responsible for timely correction of the issue.
Approval of the Project Charter authorizes PMM to commence work on the Noah’s Ark Animal Clinic Automation Project.
Version History
Version #
Implemented
By
Revision
Date
Approved
By
Approval
Date
Reason
1.0
Project Management Masters
01/25/2015
PMM Team
01/25/2015
Initial Charter Document
Introduction
Purpose of Project Charter
The Noah’s Ark Animal Clinic Automation Project Charter is intended to be an informational tool utilized by the project sponsor and senior lea ...
Effective performance engineering is a critical factor in delivering meaningful results. The implementation must be built into every aspect of the business, from IT and business management to internal and external customers and all other stakeholders. Convetit brought together ten experts in the field of performance engineering to delve into the trends and drivers that are defining the space. This Foresights discussion will directly influence Business and Technology Leaders that are looking to stay ahead of the challenges they face with delivering high performing systems to their end users, today and in the next 2-5 years.
Task Mode Task Name DurationStart Time Finish1Set .docxjosies1
Task Mode
Task Name
Duration
Start Time
Finish
1
Set up project organization
3 days
Mon. 1/7/2020
Thu 4/7/2020
2
Create project plan draft
1 day
Fri 5/7/2020
Sat 6/7/2020
Nominate in house relocation coordinator
4 days
Sun 7/7/2020
Thu 11/7/2020
3
Planning
8 days
Fri 12/7/2020
Sat 20/7/2020
4
Requirements
5 days
Sun 25/7/2020
Fri 30/7/2020
5
Design and Prototype
10 days
Sat 31/7/2020
Wed 10/8/2020
6
Information system Development
22 days
Thu 11/8/2020
Mon 2/8/2020
7
Testing
5 days
Tue 3/8/2020
Sun 8/8/2020
8
Deployment
6 days
Mon 9/8/2020
Sun 15/8/2020
9
Operation and Maintenance
20 days
Mon 16/8/2020
Sun 6/9/2020
10
Project Summary/ System Hanover
7 days
Tue 8/9/2020
Tue 15/9/2020
1
Running Head: Information System Project Plan
2
Information System Project Plan
Project Plan
With only two years of operation, LiniolMR company has experienced tremendous growth and a growing client base. The company is expected to grow by sixty percent in the eighteen months. With such growth, the company ought to increase the capacity of data collection and analysis. An advanced information system is to be developed in leveraging data collection. The anticipated information will support the business of the company.
The first task is to assess the current information technology in the company, i.e., the hardware and software that support the company’s operation. This will be done in the first two days of the project. The hardware and software are redesigned to meet the needs outlined by the organization. The team leader of the project will consult several companies to allow the team to integrate their technologies and IT solutions in connection with the development of a technological system.
The on-site solution shall be leveraged in the development of the information system. It is a great resource for the project as it helps in delivering efficient, measurable, and engaging on-site experiences without the limitation of complexity and size of the events (Cha & Maytorena-Sanchez 2019). Reporting and analytics will be done towards the end of the project. Cloud computing technologies and software as-a-Service is of interest in the project.
The cloud computing technology, i.e., the hardware, software, and infrastructure will be incorporated in the system to enable the delivery of cloud computing services like infrastructure as service (IaaS), platform as a service(PaaS), and software as a service(SaaS) through a chosen network like the internet. The project will be pursued in different phases according to the system development life cycle. These phases will mark the project timelines for each event.
System planning is the first phase of the information system development project. It is the most crucial stage in developing an effective system. It will entail defining the objectives, problem, and outlining the relevant resources, i.e., costs and personnel. A study is conducted to identify how the product can be developed better th.
1-2paragraphsapa formatWelcome to Module 6. Divers.docxjasoninnes20
1-2
paragraphs
apa format
Welcome to Module 6. Diversity can help ensure that a team has the skills and knowledge necessary for the successful completion of tasks. Diverse teams, as long as they are well managed, tend to be more creative and achieve goals more efficiently. Leaders must understand and appreciate the diversity that exists in their team. Answer the following question as you think about the diversity that exists within your own organization.
How does this diversity help your team achieve its goals?
Have you noticed any barriers to team unity that may be attributed to the diversity of team members' backgrounds?
How has your background and experience prepared you to be an effective leader in an organization that holds diversity and inclusion as core to its mission and values?
.
1-Post a two-paragraph summary of the lecture; 2- Review the li.docxjasoninnes20
1-Post a two-paragraph summary of the lecture;
2- Review the links and select one. Briefly explain how they support our curse.
http://www.fldoe.org/
http://www.eric.ed.gov/ERICWebPortal/Home.portal
http://firn.edu/doe/sas/ftce/ftcecomp.htm
Use APA 7.
each work separately.
.
More Related Content
Similar to BUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docx
Information Systems Capstone
Contents
1.0 Introduction
Singh, Shirah, and Barber Financial Holdings LLC. continues to grow its business, increasing their dependency on information technogy. The firm has reached a point where a more flexible, scalable, straightforward infrastructure, and easily managed applications are required for sucessful business practices. A solution like Amazon Web Services (AWS) can provide the computer power, storage, and other resources needed as the firm expands.
Solution
s of this magnitude do require a considerable amount of upfront investment, but will provide minimal cost for subsequential years reducing overall capital expenses. This solution will also enable minimal effort when moving applications to the cloud, minimizing support, to include administrative cost while retaining performance, security, reliability, and data integrity. 1.1 Company at a Glance
Singh, Shirah, and Barber Financial Holdings LLC., has drastically increased the number of clients and accounts over the past couple of years. This growth prompted the need for more qualified staff, additional offices and space, and newer communication technologies to facilitate services and improved management. The firm has acquired several buildings in various cities which are ready to be outfitted with network infrastructure, user workstations, peripherals and software applications. 1.2 Challenges
With just one present location in XYZ city growth in its industry is challenging, therefore the opening of several branch locations in various cities coupled with the data migration to a cloud service has become its number one project. The firm’s current infrastructure is limited, it does not currently have a full scale WAN and remote access (VPN), only a local LAN through the major local ISP is employed. All backups are stored onsite with tape copies sent to a cold off site location. Databases with all financial information are stored in the local server and there are no true access control restrictions. Additionally, there is only one system administrator performing all major database tasks and network functions.
Financial health is one of the most protected types of digital content. Finding ways to store, secure, and manage such data in this ever changing world of computing is a challenge. In order for the firm to grow and blossom, a large and fast LAN/WAN network is needed. Such network must provide access to internal resources via secure methods of authentication and also from the outside by a secure web interface client. VPN capabilities for traveling and visiting staff should provide a secure connection to internal resources. Access to the network and network shares must be tightly secured based on departmental roles. All databases will be kept in separate servers and backups will be conducted routinely (Weekly, Monthly; incremental/full). Access to database tables will be based on individual approval; single sign on authenti.
This paper contains the details of the study
of Insurance Management system. The developed system
will manage all the information regarding Insured and
policies offered by the Life Insurance companies. It also
contains an integrated tool of voice enabled appointment
scheduler that alerts an agent for his daily activities. It also
contains features like Smart Data backup system,
Provisioning System, Policies Record, Commission Reports
The application created Proposal/ Policy Entries and then
was helpful for agents. It will be designed to offer east
accessible to all records to provide better maintainability
and to enable the user to make the required modification
as and when necessary. Execution of this project would
enable the user to seek, use and manipulate the records
pertaining to every client.
Project Charter and Management Plan Project ClientOr.docxbriancrawford30935
Project Charter and Management Plan
Project Client
Organization: Globex Corporation
Contact: @globex.com.au
System Name
Globex Network
Date of Charter
12/08/2016
Document Status
Draft / Approved
Document Reference
Charter.doc
Version Number
Version 1
Prepared by
ITC306 Networking Group
Team Members
Milinda Samaraweera
Upul Athapaththu
Yasitha Rohana
Supun Palipana
1. Change History
All changes to the Project Charter must be recorded in the Change History, and a new version of the charter must be approved by the client.
Date
Description of Change
Reason for Change
Author of Change
Version No.
dd/mm/06
Initial draft
N/A
Version 1
Version 2
Version 3
2. Authorized by:
Name: ________________________
Signature: ________________________
Date: ________________________
Table of Contents
1. CHANGE HISTORY
2. AUTHORISED BY:
3. PART 1. PROJECT CHARTER
3.1. PURPOSE OF THE CHARTER
3.2. PURPOSE OF THE PROJECT
3.3. BUSINESS OBJECTIVES OF THE PROJECT
3.4. SCOPE OF THE PROJECT
3.5. BUDGET AND TIMEFRAME
3.6. PROJECT MILESTONES AND DELIVERABLES
3.7. PROJECT RESOURCES
3.8. CLIENT RESOURCES
3.9. PROJECT TEAM RESOURCES
3.10. TECHNICAL ENVIRONMENT
4. PART 2. PROJECT MANAGEMENT PLAN (AN BRIEF VERSION)
4.1. RISK MANAGEMENT
4.1.1. Assumptions
4.1.2. Dependencies
4.2. CONSTRAINTS
4.3. RISK ASSESSMENT
4.3.1 Risk Rating
4.3.2 Risk Mitigation
4.4. SCHEDULE AND BUDGET
4.4.1 Schedule ( Microsoft Project software compulsory)
4.4.2 Budget
4.5. MONITORING & CONTROLLING MECHANISMS
5. REFERENCES
3.PART 1 - Project Charter 3.1. Purpose of the Charter
This project charter outlines the scope, goals and the general approach needed to design and build a new corporate network for Globex Corporation. This document is a vital component for starting, preparing, executing, supervising and evaluating the project. It is the only reference for this project’s goals and aims, scope, corporation, financial estimates and financial plans. Additionally, the project chatter acts a contract between Globex Corporation and Virtucon Pty Ltd, declaring all the deliverables in terms of budget, time scope, threats, assets and standards agreed upon for the project. Finally, this document keeps track of all the necessary data needed by the decision maker(s) to allow the funding of the project as well as authorize the project team to begin the project.
3.2. Purpose of the Project
The current network structure of Globex Corporation is earnestly in need of a secure VPN in a full mesh topology and a direct HTTPS connection over the intranet. The need for a reliable and secure network structure is fueled by the rising number of people depending on this company’s agricultural services. The aim of this project is to address Globex’s need for a reliable network structure by designing and building a new corporate network that is not only efficient and user-friendly but also secure.
3.3. Business Objectives of the Pro.
Appendix AProof of effectiveness of some of the agile methods us.docxarmitageclaire49
Appendix A
Proof of effectiveness of some of the agile methods used to develop systems requirements
In all software development methodologies, the process of collecting, understanding and managing all requirements for a system is a crucial process in software development. Similar to all this other methods, agile methods are not exceptional. Most agile method handle requirements in order to implement them as much accurately as possible to satisfy all the customer demands. This is usually achieved by maintaining a continuous interaction with the customers to address their needs according to priority and functionalities. In this appendix, we shall be focusing on continuous process of improving the development process.
Some agile methods include the following
1. eXtreme Programming (XP) – it improves a software project in communication, simplicity, feedback and courage.
2. scrum- this is an agile, iterative and incremental method which takes care of all changes that may come across in the life-cycle of the project. Basically, it adds energy, focus and clarity to development teams. Its major aim is ot see the whole system being a successful product.
3. Dynamic system, development method (DSDM)
4. Adaptive software development (ASD)- this is a development process that is a product of rapid application development. It has four phases of communication and planning, analysis, testing & deployment and design and deployment.
5. the crystal family
Due to availability of these various methods, the potential adopters may experience a challenge of determining what to apply on its own and therefore there was need to define a document containing all the necessary values and common qualities to be used across all agile methods. This document is the Agile Manifesto and focuses mainly on human interactivity and processes management.
1. Individual and interaction over various processes and tasks. Usually the agile process will focus more on people and their interactivity but not on the structural processes and tools.
2. Working software and documentation. Main objective of the developers is actually delivering a functional code which will always add value to our users. Well documented code is always self-documented.
3. Responding to change over planning. Here developers are required to respond very fast to the requirements variations. Time used in planning is minimal compared to what our users actually requires.
4. Customer collaboration over contracts. The mutual relationship of the developers and susers of our system is monitored and regulated through engaging the customer in the development process.
The figure below shows the steps in agile methodologies which focus on an iteration and adaptable change.
5.
Tools needed for requirement management in agile methods of system development.
1. The most popular tools in agile methods include paper, pencil a drawing pin board. If we consider eXtreme programming requirements are obtained from user stories which ar.
ITP-1 – Project Charter
Group 3 - The Project Management Masters (PMM)
Noah’s Ark Animal Clinic
PROJECT CHARTER
Group 3 ITP-1 – Project Charter
IFSM 438: Project Management
Project Management Masters
Crystal Wyland
Project Manager
Angela Farella
Documentation Manager
Kevin Smith
Editor
Jamie Cole
Procurement Manager
Kim Delahay
Deputy Project Manager
Shane Thideman
Researcher
Michelle Smith
Researcher
Contents
Contents 2
Executive Summary 3
Version History 4
Introduction 4
Purpose of Project Charter 4
Project and Product Overview 4
Justification 4
Business Need 4
Business Impact 4
Scope 5
Objectives 5
High-Level Requirements 5
Major Deliverables 5
Boundaries 5
Duration 5
Budget Estimate 6
Funding Source 6
Estimate 6
Assumptions, Constraints and Risks 7
Assumptions 7
Constraints 7
Risks 8
Project Organization 8
Roles and Responsibilities 8
Internal and External Stakeholders 9
Project Charter Approval 9
References 10
Executive Summary
The Project Management Masters (PMM) are very pleased to have been selected to implement an Information Technology (IT) solution at Noah’s Ark Animal Clinic. This document provides a summary and a forecast of the project that will take place.
Studies have shown that, when done correctly, the implementation of an IT infrastructure in a small business can lead to improved quality of information, increased individual productivity, and increased organizational productivity (Narkhede, Raut, Patil, & Mahajan, 2013). While there are no regulatory requirements for safeguarding a veterinary patient’s medical history, the clinic houses Personally Identifiable Information (PII) belonging to their customers.
PII is “information that can be used to distinguish or trace an individual’s identity, either alone or when combined with other personal or identifying information that is linked or linkable to a specific individual” (Office of Management and Budget, 2014). Implementation of an IT solution will also offer increased security of such information.
The Noah’s Ark Animal Clinic automation project is projected to take a maximum of six months to complete. There are little risks associated with the project, and recommendations for mitigation are included in this Project Charter.
Upon completion of the project, PMM will offer a ninety day warranty period. Should any issues arise during this ninety day warranty period, whether they be hardware, software, or user related, PMM will be responsible for timely correction of the issue.
Approval of the Project Charter authorizes PMM to commence work on the Noah’s Ark Animal Clinic Automation Project.
Version History
Version #
Implemented
By
Revision
Date
Approved
By
Approval
Date
Reason
1.0
Project Management Masters
01/25/2015
PMM Team
01/25/2015
Initial Charter Document
Introduction
Purpose of Project Charter
The Noah’s Ark Animal Clinic Automation Project Charter is intended to be an informational tool utilized by the project sponsor and senior lea ...
Effective performance engineering is a critical factor in delivering meaningful results. The implementation must be built into every aspect of the business, from IT and business management to internal and external customers and all other stakeholders. Convetit brought together ten experts in the field of performance engineering to delve into the trends and drivers that are defining the space. This Foresights discussion will directly influence Business and Technology Leaders that are looking to stay ahead of the challenges they face with delivering high performing systems to their end users, today and in the next 2-5 years.
Task Mode Task Name DurationStart Time Finish1Set .docxjosies1
Task Mode
Task Name
Duration
Start Time
Finish
1
Set up project organization
3 days
Mon. 1/7/2020
Thu 4/7/2020
2
Create project plan draft
1 day
Fri 5/7/2020
Sat 6/7/2020
Nominate in house relocation coordinator
4 days
Sun 7/7/2020
Thu 11/7/2020
3
Planning
8 days
Fri 12/7/2020
Sat 20/7/2020
4
Requirements
5 days
Sun 25/7/2020
Fri 30/7/2020
5
Design and Prototype
10 days
Sat 31/7/2020
Wed 10/8/2020
6
Information system Development
22 days
Thu 11/8/2020
Mon 2/8/2020
7
Testing
5 days
Tue 3/8/2020
Sun 8/8/2020
8
Deployment
6 days
Mon 9/8/2020
Sun 15/8/2020
9
Operation and Maintenance
20 days
Mon 16/8/2020
Sun 6/9/2020
10
Project Summary/ System Hanover
7 days
Tue 8/9/2020
Tue 15/9/2020
1
Running Head: Information System Project Plan
2
Information System Project Plan
Project Plan
With only two years of operation, LiniolMR company has experienced tremendous growth and a growing client base. The company is expected to grow by sixty percent in the eighteen months. With such growth, the company ought to increase the capacity of data collection and analysis. An advanced information system is to be developed in leveraging data collection. The anticipated information will support the business of the company.
The first task is to assess the current information technology in the company, i.e., the hardware and software that support the company’s operation. This will be done in the first two days of the project. The hardware and software are redesigned to meet the needs outlined by the organization. The team leader of the project will consult several companies to allow the team to integrate their technologies and IT solutions in connection with the development of a technological system.
The on-site solution shall be leveraged in the development of the information system. It is a great resource for the project as it helps in delivering efficient, measurable, and engaging on-site experiences without the limitation of complexity and size of the events (Cha & Maytorena-Sanchez 2019). Reporting and analytics will be done towards the end of the project. Cloud computing technologies and software as-a-Service is of interest in the project.
The cloud computing technology, i.e., the hardware, software, and infrastructure will be incorporated in the system to enable the delivery of cloud computing services like infrastructure as service (IaaS), platform as a service(PaaS), and software as a service(SaaS) through a chosen network like the internet. The project will be pursued in different phases according to the system development life cycle. These phases will mark the project timelines for each event.
System planning is the first phase of the information system development project. It is the most crucial stage in developing an effective system. It will entail defining the objectives, problem, and outlining the relevant resources, i.e., costs and personnel. A study is conducted to identify how the product can be developed better th.
1-2paragraphsapa formatWelcome to Module 6. Divers.docxjasoninnes20
1-2
paragraphs
apa format
Welcome to Module 6. Diversity can help ensure that a team has the skills and knowledge necessary for the successful completion of tasks. Diverse teams, as long as they are well managed, tend to be more creative and achieve goals more efficiently. Leaders must understand and appreciate the diversity that exists in their team. Answer the following question as you think about the diversity that exists within your own organization.
How does this diversity help your team achieve its goals?
Have you noticed any barriers to team unity that may be attributed to the diversity of team members' backgrounds?
How has your background and experience prepared you to be an effective leader in an organization that holds diversity and inclusion as core to its mission and values?
.
1-Post a two-paragraph summary of the lecture; 2- Review the li.docxjasoninnes20
1-Post a two-paragraph summary of the lecture;
2- Review the links and select one. Briefly explain how they support our curse.
http://www.fldoe.org/
http://www.eric.ed.gov/ERICWebPortal/Home.portal
http://firn.edu/doe/sas/ftce/ftcecomp.htm
Use APA 7.
each work separately.
.
1-What are the pros and cons of parole. Discuss!2-Discuss ways t.docxjasoninnes20
1-What are the pros and cons of parole. Discuss!
2-Discuss ways to improve parole so that offenders have a better chance of being successful in the community
3-What are the barriers that parolees face when they return to the community that contribute to them failing. Give a relative example!
Submit in 3 paragraphs
.
1-page (max) proposal including a Title, Executive Summary, Outline,.docxjasoninnes20
1-page (max) proposal including a Title, Executive Summary, Outline, Team members, Task Assignment and Duration (who is doing what part). Include your anticipated dataset(s) and techniques/software. Please provide a list of the main references you want to use for your project in any appropriate format, e.g. Vancouver or APA style.
proposal is due by october 7th 2020 at 12pm est
project by 25th october
instructions for project are in the folder
.
1-Identify the benefits of sharing your action research with oth.docxjasoninnes20
1-Identify the benefits of sharing your action research with others.
-How does sharing your action research assist you in achieving your goal to improve the lives of your students?
2-Describe the criteria used to judge action research.
-What determines if your action research study gets published?
3-Identify one Web site resource (ERIC)and describe how it assisted you in designing, implementing, evaluating, writing and/or sharing your action research. Choose any one of the Web site sources listed in chapter 10(last page of attachment)
4-Why does Mills suggest in the last chapter of his book that this is really the beginning of your work?( start page 291)
Source:
Mills, G. E. (2000). Action research: A guide for the teacher researcher. Prentice-Hall, Inc., One Lake Street, Upper Saddle River, New Jersey 07458.
.
1-page APA 7 the edition No referenceDescription of Personal a.docxjasoninnes20
1-page APA 7 the edition / No reference
Description of Personal and Professional Goals My personal goal within the health care field is to become a successful and exceptional
nurse.
1-page APA 7 the edition / No reference
Reflection of the program Discussions about the program has helped my growth as a capable nurse. And talk about how good the program.
.
1-Pretend that you are a new teacher. You see that one of your st.docxjasoninnes20
1-Pretend that you are a new teacher. You see that one of your students likes to tease and joke on the other students. This student targets some students more than others and is meaner to them. The students who are targeted most often are those who appear to be less socially adept than some of the others. They may be younger, seem to have a more obvious disability or be overweight, wear glasses or not dress in trendy clothes. The student's behavior goes well beyond "friendly banter" and often leaves the other students feeling hurt and ashamed. How do you stop the student from bullying his or her peers and work to build the self-esteem of the students who have been picked on? What could be some of the causes of the student's bullying behavior and how might you work to address the root of the behavior?
2-Tiered Behavior Management and Response to Intervention (RtI
Please share a situation where you have worked with a challenging or difficult student. Was a tiered program or RtI a part of the program used to work with the student? How does a tiered program encourage student success? What are some of the challenges you have experienced while working with a tiered program? How have your students responded to the program or programs?
3-Special education teachers may work at different education levels at various points in their careers. Inclusion will be different in the lower grades than it would be in a high school classroom. How do you think that inclusion may look different for students at the elementary level as opposed to the high school level? What are some of the methods used to include students at all educational levels? What are some of the benefits and challenges you can see of the different inclusion models used with the different age students?
4-As a teacher of students with mild disabilities your class may be a diverse mix of students with various abilities and disabilities. How might inclusion and classroom management change when working with students with Autism and Autism Spectrum Disorders or other specific disabilities such as Down Syndrome? What would you need to take into account when developing behavior intervention plans (BIPs) and Individual Education Plans (IEPs)? How do you think these would change as the student grew and progressed through school?
5- This week you have a special task for the discussion. You will need to read about a disability category or specific disability that is of interest to you. Many of you may have a student, friend or family member with a specific disability we have not talked about so far in class. Use what you learn in the materials you read, the professional organization's website you visit or the videos you watch to talk about the specific inclusion and behavior management needs of students with that disability.
Example: My niece has ADHD and Asperger's Syndrome. She has been receiving services part time since she was in kindergarten. She also sees a counselor a.
1- What is the difference between a multi-valued attribute and a.docxjasoninnes20
1- What is the difference between a multi-valued attribute and a composite attribute? Give examples.
2- Create an ERD for the following requirements (You can use Dia diagramming tool to create your ERD):
Some Tiny College staff employees are information technology (IT) personnel. Some IT personnel provide technology support for academic programs, some provide technology infrastructure support, and some provide support for both. IT personnel are not professors; they are required to take periodic training to retain their technical expertise. Tiny College tracks all IT personnel training by date, type, and results (completed vs. not completed).
.
1- What is a Relational Algebra What are the operators. Explain.docxjasoninnes20
1- What is a Relational Algebra? What are the operators. Explain each.
2- What is the
INNER JOIN
operation between the following two relations (data sets or tables of data).
Hint: Use OWNER_ID column as common column between the two tables and list all columns of the two tables that have common OWNER_ID.
.
1- Watch the movie Don Quixote, which is an adaptation of Cerv.docxjasoninnes20
1-
Watch the movie
Don Quixote
, which is an adaptation of Cervantes' novel
Don Quixote
. Then, write at least two paragraphs (minimum five well-developed sentences per paragraph) to explain a lesson one could learn from the characters. You need to incorporate at least three of the ideas provided below:
The value of friendship
Humility and nobility
Importance of time
Importance of reading
Importance of optimism
The role of imagination and vision
Justifying commitment
Sense of self and disciple
Building leadership
.
1- reply to both below, no more than 75 words per each. PSY 771.docxjasoninnes20
1- reply to both below, no more than 75 words per each.
PSY 7710
4 days ago
Karissa Milano
unit 9 discussion scenario 3
COLLAPSE
ABA Procedure: A DRO (differential reinforcement of other behavior) to address SIB exhibited by a toddler in a home setting.
Special Methods: Any appropriate behaviors other than SIB will be reinforced through a specific amount of time (every five minutes). Reinforcement is only given when the individual does not engage in SIB behaviors.
Risks
Notes
1 Implementing the plan at home can be difficult.
1 The family might be concerned with their safety and the safety of the child. There should be a protocol before implementing this intervention.
2 Family members and client could be at risk for danger.
2 The parents might be concerned for the safety of themselves and their child.
3 Possible increase in SIB
3 SIB behaviors might increase before it decreases due to an extinction burst. The behavior analyst should have a protocol before implementing this intervention.
4 SIB behaviors could remain the same.
4 If there is no change in the clients SIB behaviors then a preference test should be conducted to determine motivating reinfoncers.
Benefits
Notes
1 Generalization
1 The client will learn to use this skill at home as well as be able generalize this skill into other settings.
2 Improved learning environment
2 SIB behaviors will decrease and appropriate behavior will be taught. SIB will no longer impact the client and family in the future.
3 Increase in appropriate behaviors
3 Appropriate behaviors will be taught and replace the SIB behavior.
4 Least intrusive intervention
4 Using reinforcement to decrease the problem behavior and increase appropriate behaviors. This is a least restrictive method of treatment.
5 Parent training and involvement
5 Parents will feel confident about implementing this evidence based treatment at home. This will can lead to an increase a buy in from the family and they will feel comfortable implementing other interventions in the future.
Summary: DRO is an intervention that is used when the client does not engage in the problem behavior (SIB) (Bailey & Burch, 2016). Reinforcement should only be given to the individual after a certain amount of time that the client is not engaging in the problem behavior; in this case it should be after five minutes of the client not engaging in SIB. The person who is implementing this treatment should not reinforce the problem behavior. The benefits of implementing DRO outweigh the risks of implementing DRO. DRO is a good intervention to use when decreasing SIB behavior. Although there are some risks, the individual who is implementing DRO should have the knowledge, training and experience and be confident when implementing DRO ( Bailey & Burch, 2016).
Reference
Bailey, J. S., & Burch, M. R. (2016).
Ethics for behavior analysts
(3rd ed.). New York, NY: Routledge.
PSY 7711
3 days ago
Emily Gentile
Unit 9 Discussion
C.
1- Pathogenesis 2- Organs affected in the body 3- Chain of i.docxjasoninnes20
1- Pathogenesis
2- Organs affected in the body
3- Chain of infection and its Links associated: Infectious agent, Reservoirs, Portal of Exit, Route of Transmission, portal of Entry, and Susceptible Host. All must to be defined in the chosen agent.
4- Incidence, Prevalence, and Prevention of this infectious disease
5- Treatment if possible
6- Please answer, being a Nurse. “How are you going to break down the chain of infection of the selected microorganisms, to avoid Cross Contamination ?
.
1- I can totally see where there would be tension between.docxjasoninnes20
1- I can totally see where there would be tension between these two, especially in today’s world. I am no expert on religion or science for that matter, but I do feel like some of the tension is unnecessary. I feel that the two can work to benefit our patients by balancing them with the needs of the patient. Let’s take my kids for instance, if they were sick with some known treatable disease there would be no other option in my mind to treat them with science and medicine that has been proven to work. I wouldn’t only pray for them to get better and not do anything about it, but I would pray for them and do whatever was necessary to help my family deal with the stress and worry of a child being sick. Here we have used them both to our benefit and they each serve a different purpose and effectiveness. Thanks again for your post!
2-My perception of the tension between science and religion is founded at first glance and then not when looked at more closely. Science and religion can coincide in health care if respected for their own strengths and limitations. I feel that a healthy balance of both can benefit our patients providing different needs when they’re needed. I have seen with my own eyes CRP markers drop in an infant receiving antibiotic treatment and I have also seen an infant that wasn’t supposed to live by scientific probability actually make it and thrive with prayer being the only obvious intervention. So, trying to single out one over the other as more effective than the other seems less beneficial than trying to work them both in when the patient requires such help.
I feel that science is good for some of the more usual cases and things we feel we can help with its information, and I also feel that we can use religion to help a patient with their mental aspects of healing. We can quantify an improvement in a patient through lab levels and such, but it's hard to do the same with religion and how a patient uses that tool as comfort or however they use it in their lives. “Some observational studies suggest that people who have regular spiritual practices tend to live longer. Another study points to a possible mechanism: interleukin (IL)-6. Increased levels of IL-6 are associated with an increased incidence of disease. A research study involving 1700 older adults showed that those who attended church were half as likely to have elevated levels of IL-6. The authors hypothesized that religious commitment may improve stress control by offering better coping mechanisms, richer social support, and the strength of personal values and worldview” (NCBI, 2001). In this example we see the benefits were surveyed to be founded, but the exact workings aren’t exactly known. The great thing about science is that usually we have some tangible results that are repeatable and there’s safety to be found in that. The great thing about religion is that we can have faith in whatever we believe in and that’s all that’s needed. It's our.
1- One of the most difficult challenges leaders face is to integrate.docxjasoninnes20
1- One of the most difficult challenges leaders face is to integrate their task and relationship behaviors. Do you see this as a challenge in your own leadership? How do you integrate task and relationship behaviors?
2- If you were to change in an effort to improve your leadership, what aspect of your style would you change? Would you try to be more task oriented or more relationship oriented?
.
1- Design one assignment of the Word Find (education word) and the o.docxjasoninnes20
1- Design one assignment of the Word Find (education word) and the one of Using Digital Technology in two separate attachments, each named. Note that a sample of each is located in attachment.
2- Read the lecture and post a one-paragraph summary of the lecture. (Graphic organizers).
.
1- This chapter suggests that emotional intelligence is an interpers.docxjasoninnes20
1- This chapter suggests that emotional intelligence is an interpersonal leadership whether you agree or disagree with this assumption. As you think about your own leadership, do emotions help or hinder your role as a leader? Discuss.
2- One unique aspect of leadership skills is that they can be practiced. List and briefly describe three things you could do to improve administrative skills.
.
1-2 pages APA format1. overall purpose of site 2. resources .docxjasoninnes20
1-2 pages APA format
1. overall purpose of site
2. resources available to social workers on the site and
3. how these resources can be specifically used in either the social worker assessment of or the social work intervention with children. Make certain to fully reference the site in a separate page. must include 3 headings that address Each requiremen.
.
1-Define Energy.2- What is Potential energy3- What is K.docxjasoninnes20
1-Define Energy.
2- What is Potential energy?
3- What is Kinetic energy?
4-Define Metabolism and name the two main types of metabolism.
5-Define an Enzyme and name the most important classes of Enzymes.
6- Name the three Metabolic Pathways.
7-What is Aerobic cellular respiration?
8-What is Anaerobic respiration?
9- Define Fermentation.
10.Name the final Products of Anaerobic Respiration.
1. - What is the main function of enzymes in our body?
2. - Please name the 6 types of enzymes:
3. - What is Energy of Activation, for the enzymes?
4. - Factors that affect enzyme activity include:
5. - What is a cofactor:
.
1- Find one quote from chapter 7-9. Explain why this quote stood.docxjasoninnes20
1- Find one quote from chapter 7-9. Explain why this quote stood out to you. What is its importance?
2- Discussion 7-9
1-Share your quote and ideas.
2- “violence is the only lever big enough to move the world”
3-Compare and contrast Elwood and Turner.
4-Why is Turner right? Why is he wrong?
5- Theme. reading vs reals world, inside vs outside, optimism vs pessimism, violence, division of lower class among racial lines.
7- “violence is the only lever big enough to move the world”
.
1-Confucianism2-ShintoChoose one of the religious system.docxjasoninnes20
1-Confucianism
2-Shinto
Choose one of the religious systems above; find some point of interest to discuss (350 wds). You may use your textbook OR any other reputable encyclopedia or source. ALWAYS CITE your source.
To support your response you are required to provide at least one supporting reference with proper citation
.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
2024.06.01 Introducing a competency framework for languag learning materials ...
BUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docx
1. BUSINESS CASE CAPSTONE 2
BUSINESS CASE CAPSTONE 3
Business Case Capstone
Connie Farris
Raphael Brown
Jim Chambers
Shaun Cummings
Deandre Kralevic
Colorado Technical University
IT Capstone II
(IT488-1904B-01)
Henrietta Okora
Running head: BUSINESS CASE CAPSTONE 1
Business Case Capstone
Table of Contents
(Week 1) Section 1: Overview of the project (from IT487)3
Overview3
I75 Corridor4
Section 2: Requirements (from IT487)5
2. Section 3: Design (from IT487)7
Section 4: System development methodology9
Section 5: Work breakdown structure11
Section 6: Communication Plan13
(WEEK 2) Section 7: Quality Assurance Plan TBD15
(WEEK 3) Section 8: Documentation Plan TBD16
(Week 4) Section 9: Quality Assurance and results of test-case
execution TBD17
Section 10: Project Closure18
References:19
(Week 1) Section 1: Overview of the project (from
IT487)Overview
The Galactic Customer IT Services is IT Support Company with
over 250,000 employees with companies in over 50 states with
the main headquarters located in Gainesville, FL. The location
chosen for the headquarters is based on a Telco Gateway
Infrastructure that the main fiber-optic truck line runs along the
I75 corridor, from Miami Lakes FL to the northern part of
Michigan. This I75 corridor plays an important part of the
Networking ability for the organization. The Galactic Customer
IT Services is an IT support company, which provides IT
support to various small to large companies both within the
Unites States and support to various military bases overseas.
This large customer service company has installed application
software to its large Help Desk ticketing system. The next phase
being implemented is the upgrading of its Networking
Infrastructure, which also includes cloud-based networking.
This Organization has several new updated Servers ready to
install on the network. With the previous project being accepted
3. the organization has decided to move forward to improving its
networking infrastructure, however the organization has request
the project team to draft a plan that requires the following in the
plan: Requirements, Design, System Development Methodology,
WBS (Work Breakdown Structure), Communications Plan,
Quality Assurance Plan, Documentation Plan, and Quality
Assurance and results of test-case execution be the project can
be closed. I75 Corridor
http://gregkantner.com/blog/wp-
content/uploads/2012/05/interstate-75-map.gif
Section 2: Requirements (from IT487)
The project requirements here are derived from the software
4. requirements for the Galactic customer services. The project
was to create new ticketing software that the customer wanted
upgraded and to completely replace the previous product. The
requirements are the following:
• Ticket system
• Ticketing automation forwarding system
• VoIP system for out of country calls
• Application that delivers automated workflow
• Application that handles auto-updates and simple to
intermediate patches
The ticketing system that we have been tasked to create has to
follow the design that the stakeholders and owners expect. A
ticketing system that needs to be omni-channel supported,
which is a type of support that gives the customer using the
product the ability to utilize the application from any multiple
sources. This includes phone, email, self-service ticket creation
via application, and walk-in visits to the company itself.
(Andrews, 2019)
This application is required to have a section that allows the
system to process incoming tickets and to be able to route the
ticket to the appropriate IT support personnel. This system is
required to have the capability to allow the user to select in
detail what their issue is, select the department the issue
pertains too, and also select the level of importance the user the
believes the issue is. However, the level of importance will not
be created by the user, the automated system will determine the
level of importance by keywords located in the ticket and which
section the ticket is for. (Andrews, 2019)
The VoIP telecommunication is crucial to the company’s
success of providing adequate care to its overseas and out of
state clients. Companies that must call into the main HQ in
Gainesville, FL, do not want to spend the extra money for long
distance phone calls, when there is an alternative that could be
created. Instead the stakeholders have insisted on requiring an
5. easier more cost-efficient way of telecommunication for the
long-distance entities. VoIP will utilize a private VPN that will
allow the client and HQ to speak directly with each other over
the internet rather than use a phone company that will hike up
prices of telephone usage. (Unknown, 2019)
The application portion of the software will be able to create
self-service tickets while also be used to create and recommend
updated software while providing the adequate information to
patch the current software if needed. This is a valuable part of
the software because it allows the end users the ability to fix
issues and low-level problems themselves or have the automated
service patch the issue if possible. Having that service will
provide the client and the service provider to spend more time
on conducting business as usual instead of losing time and
money waiting to speak to an operator or having their ticket
cleared.
References
Andrews, M. (2019) "The Best 11 Ticketing System Software in
2019" Retrieved from https://blog.hubspot.com/service/it-
ticketing-system
Section 3: Design (from IT487)
Below is a design diagram that I did for the team project from
the last course, as you see it was for an online ticketing
application. As seen, you have customers that can communicate
to the customer service group via the Internet which is
connected by way of a secure VPN that is linked to the online
ticketing application, which is connected to the ticket
automation part of the system and sends tickets to customer
service operators. As you can see the system is simple and yet
can be complicated.
6. Now the team is working on the Networking portion for the
organization. The organization will have to seed out service
technicians to customers for issues that cannot be rectified by
remote access for customers that the help deck could not
resolve. Even though the main hub is in Gainesville, FL there is
a remote site in every State located in one of the major cities.
Below is a diagram depicting a replica of the network that will
connect all areas where trouble tickets will be printed for the
service technicians?
Drafted and Imported from my Smart Draw Software 16
November 2019
The ticketing application servers will be in Gainesville, Florida.
The network will consist of Voice over Internet Protocols
(VoIP), IP routing, DS3 lines to the ISPs (Internet Service
Provider) HTML protocols will be used and the HTTPS
protocol. The Organization will be utilizing Secured Virtual
Private Network services.
Section 4: System development methodology
For the creation of our network that will work with the Galactic
Customer Service unit we will implement the Waterfall
methodology. This method is a slow starter but once it gets in
the design and development stages it fairs great because of the
long planning.
The waterfall approach begins with multiple meetings that
allows the stakeholders, owners, dev team, and customer to
brainstorm and come up with detailed plans to ensure that the
entire project is covered from beginning to end. The reason for
this choice is because the very detailed structured
7. documentation of the project. (Rouse, 2019) This structure
allows our group to follow step by step to ensure the success of
the project and guarantee that nothing is missed or overlooked.
The planning stages increase the efficiency of the project while
allowing for all avenues to be viewed. This is to include all
risks and threat factors. During the planning stage, the group
will come together to discuss probable/possible risks that could
come along during the development stage. Once all factors are
discussed, then the plans are put in the works to create a risk
mitigation process. (Rouse, 2019) This will allow the team to
know how to mitigate/avoid certain risks that come along.
Another factor in choosing this method is the fact that the
personnel on the development team can be interchangeable. This
means that if six people start the project and one or two decide
to leave or gets fired, the process can continue as planned. This
works well also if other people come in to fill that vacant
position. It allows the process to continue as planned without a
lag in the development process because of the detail in the
plans. With the way our remote communication is set-up,
communication issues are sure to occur. With that being said,
the waterfall method is the appropriate choice based on the fact
that the approach is our way of risk mitigation.
Reference
Rouse, M. (2019, February). waterfall model . Retrieved from
TechTarget:
https://searchsoftwarequality.techtarget.com/definition/waterfall
-model
8. Section 5: Work breakdown structure
Collection of data and analysis will be conducted at the same
time in the planning phase which will help to establish the
9. needs of stakeholders. The process is supposed to take one week
where the project crew will collect all the information from
vendors, customers, and stakeholders. This will help to decide
the features expected from the program. The next process is
coming up with integration tools and this step will be done
approximately in 3 weeks due to the complex nature of the
process.
Time and cost should be well managed and thus testing and
development of the project features will be conducted
simultaneously. Actual testing of the application on vendors and
customers will provide real-time support that greatly aids in the
development and implementation of security measures to reduce
risk. Real-time support also helps greatly to reduce the effects
of malfunctioning on the business and also try to establish the
vital features that might be left out in the development phase.
This phase is expected to be conducted for not more than 3
weeks. The development team will actively fix any
malfunctioning of the application.
The last process is monitoring how the application is
performing. The team will offer oversight for support for
example database administration or cloud-based services.
Cloud-based services always have various security features in
place to ensure information communicated through the network
resource is reliable and secured properly (Dennis, 2018).
Reference:
Dennis, J. (2018). Three unbeatable security advantages of
cloud-based solutions for your business. Retrieved from
https://www.cloudcomputing-news.net/news/2018/jun/25/three-
unbeatable-security-advantages-cloud-based-solutions-your-
business/
Section 6: Communication Plan
10. The system will utilize the use of automated response system
which will always ensure that customers and vendors get real-
time as well as proper company support using well-organized
customer service. The application is designed in a way that
whenever a customer logs into the system, there is an automatic
query popping out prompting the customer to chat with the
client about anything they may wish to enquire about the
company.
Customer satisfaction is very essential; therefore, there is the
need to properly track customer and client communication. To
ensure there is monitoring, the application will have to always
produce a copy of the communication between the companies;
client and other users. This will easily provide an oversight
authority for tracking the communications there; the business
managers can check if the clients are useful to the business.
This approach is very beneficial in determining if the
application effectively provides customer satisfaction.
The alignment of stakeholders’ requirements and the application
design will ensure the organization has attained operational
effectiveness. The organization will attain improved
productivity if the customer service application is working
properly
Regarding the quality of communication, the application
architecture is modeled in a way that response will give the
preferred quality assurance to the customers by the utilization
of automated systems. Using automated alert applications in the
automation strategy will ensure that customers’ issues are
properly and in time. Communication quality is also enhanced
by ensuring every stakeholder’s requirements are considered
since different people have different interests. Additionally, it
also aids in ensuring the right design is implemented.
17. References:
Andrews, M. (2019) "The Best 11 Ticketing System
Software in 2019" Retrieved from
https://blog.hubspot.com/service/it-ticketing-system
Dennis, J. (2018). Three unbeatable security advantages of
cloud-based solutions for your business. Retrieved from
https://www.cloudcomputing-news.net/news/2018/jun/25/three-
unbeatable-security-advantages-cloud-based-solutions-your-
business/
Rouse, M. (2019, February). waterfall model . Retrieved
from
TechTarget:https://searchsoftwarequality.techtarget.com/definiti
on/waterfall-model
Online Ticketing
Customer Service
Tickets
Persistence
Security
UML Component Diagram: Online Ticketing
order
access
18. control
encryption
dataAccess
dataAccess
VPN
Internet
Customer
Remote Site 1
Remote Site 2Remote Site 3
Remote Site 4 Remote Site 5
Remote Site 6Remote Site 7Remote Site 8
Remote Site 9
Remote Site 10
Gainesville Florida
LosAngeles,Calafornia
ISP
Cloud
ISP
Cloud
T3
T2T2
T2
T2
T2
T2
T2
T2
T2
T2
DS3
DS3
Running Head: PLANNING & DEVELOPING A PROJECT
1
PLANNING & DEVELOPING A PROJECT
19. 2
IT Capstone II
IT488-1904B-01
Unit 1– Group Project
Group 1
Participating members:
Connie Farris
Raphael Brown
Deandre Kralevic
Shaun Cummings
Jim Chambers
Matthew Dunn
11/20/2019
Table of Contents
(Week 1) Section 1: Overview of the project (from IT487) 3
Overview 3
(Week 1) Section 2: Requirements (from IT487) 5
(Week 1) Section 3: Design (from IT487) 7
(Week 1) Section 4: System development methodology 9
(Week 1) Section 5: Work breakdown structure 10
(Week 1) Section 6: Communication plan 12
Quality management report 14
(Week 2) Section 7: Quality Assurance Plan 24
(Week 3) Section 8: Documentation plan 25
(Week-4) Section 9: Quality Assurance and results of test-case
execution 26
20. Section 10 – Project closure 26
References 28
(Week 1) Section 1: Overview of the project (from IT487)
Overview
The Galactic Customer IT Services is an IT support company
with over 250,000 employees with companies in 50 States with
the main headquarters located in Gainesville, FL. The location
chosen for the headquarters is based on a Telco Gateway
Infrastructure that the main fiber-optic trunk line, which runs
along the I-75 corridor, from Miami Lakes FL to the northern
most part of Michigan. This I-75 corridor plays an important
part of the Networking ability for the organization. The Galactic
Customer IT Services is an IT support company, which provides
IT support to various small to large companies both within the
Unites States and support to various military bases overseas.
This large customer service company has installed an
application software to its large Help Desk ticketing system.
The next phase being implemented is the upgrading of its
Networking Infrastructure, which also includes cloud-based
networking.
This Organization has several new updated Servers ready to
install on the network. With the previous project being accepted
the organization has decided to move forward to improving its
networking infrastructure, however the organization has
requested the project team to draft a plan that requires the
following in the plan: Requirements, Design, System
Development Methodology, WBS (Work Breakdown Structure),
Communications Plan, Quality Assurance Plan, Documentation
Plan, and Quality Assurance and results of test-case execution
before the project can be closed. Additionally, this organization
is upgrading it phone systems to Voice Over Internet Protocol,
21. which will eliminate all Intra-Ladder costs from Telco
Companies and the cloud-based networking will also be added
to the VoIP system. Using the Waterfall method, the plan below
will detail the necessary requirements and resources that will be
taken by Galactic IT to provide the most comprehensive plan
possible regarding the allocation of personnel, time and
technology to meet the requirements of the contract and provide
a working roadmap to success.
I75 Corridor
http://gregkantner.com/blog/wp-
content/uploads/2012/05/interstate-75-map.gif
(Week 1) Section 2: Requirements (from IT487)
The project requirements here are derived from the software
requirements for the Galactic customer services. The project
was to create a new ticketing software that the customer wanted
upgraded and to completely replace the previous product. The
requirements are the following:
· Ticket system
· Ticketing automation forwarding system
· VoIP system for out of country calls
· Application that delivers automated workflow
· Application that handles auto-updates and simple to
intermediate patches
The ticketing system that we have been tasked to create has to
follow the design that the stakeholders and owners expect. A
ticketing system that needs to be omni-channel supported,
which is a type of support that gives the customer using the
22. product the ability to utilize the application from any multiple
sources. This includes phone, email, self-service ticket creation
via application, and walk-in visits to the company itself.
(Andrews, 2019)
This application is required to have a section that allows the
system to process incoming tickets and to be able to route the
ticket to the appropriate IT support personnel. This system is
required to have the capability to allow the user to select in
detail what their issue is, select the department the issue
pertains too, and also select the level of importance the user the
believes the issue is. However, the level of importance will not
be created by the user, the automated system will determine the
level of importance by keywords located in the ticket and which
section the ticket is for. (Andrews, 2019)
The VoIP telecommunication is crucial to the company’s
success of providing adequate care to its overseas and out of
state clients. Companies that must call into the main HQ in
Gainesville, FL, do not want to spend the extra money for long
distance phone calls, when there is an alternative that could be
created. Instead the stakeholders have insisted on requiring an
easier more cost-efficient way of telecommunication for the
long-distance entities. VoIP will utilize a private VPN that will
allow the client and HQ to speak directly with each other over
the internet rather than use a phone company that will hike up
prices of telephone usage. (Unknown, 2019)
The application portion of the software will be able to create
self-service tickets while also be used to create and recommend
updated software while providing the adequate information to
patch the current software if needed. This is a valuable part of
the software because it allows the end users the ability to fix
issues and low-level problems themselves or have the automated
service patch the issue if possible. Having that service will
provide the client and the service provider to spend more time
on conducting business as usual instead of losing time and
money waiting to speak to an operator or having their ticket
cleared.
23. .
(Week 1) Section 3: Design (from IT487)
Below is a design diagram that I did for the team project from
the last course, as you see it was for an online ticketing
application. As seen, you have customers that can communicate
to the customer service group via the Internet which is
connected by way of a secure VPN that is linked to the online
ticketing application, which is connected to the ticket
automation part of the system and sends tickets to customer
service operators. As you can see the system is simple and yet
can be complicated.
Drafted and Imported from my Smart Draw Software 16
November 2019
Now the team is working on the Networking portion for the
organization. The organization will have to send out service
technicians to customers for issues that cannot be rectified by
remote access for customers that the help deck could not
resolve. Even though the main hub is in Gainesville, FL there is
a remote site in every State located in one of the major cities.
Below is a diagram depicting a replica of the network that will
connect all areas where trouble tickets will be printed for the
service technicians.
Drafted and Imported from my Smart Draw Software 16
November 2019
The ticketing application servers will be in Gainesville, Florida.
The network will consist of Voice over Internet Protocols
(VoIP), IP routing, DS3 lines to the ISPs (Internet Service
24. Provider) HTML protocols will be used and the HTTPS
protocol. The Organization will be utilizing Secured Virtual
Private Network services.
(Week 1) Section 4: System development methodology
For the creation of our network that will work with the Galactic
Customer Service unit we will implement the Waterfall
methodology. This method is a slow starter but once it gets in
the design and development stages it fairs great because of the
long planning. The waterfall approach begins with multiple
meetings that allows the stakeholders, owners, dev team, and
customer to brainstorm and come up with detailed plans to
ensure that the entire project is covered from beginning to end.
The reason for this choice is because the very detailed
structured documentation of the project. (Rouse, 2019) This
structure allows our group to follow step by step to ensure the
success of the project and guarantee that nothing is missed or
overlooked. The planning stages increases the efficiency of the
project while allowing for all avenues to be viewed. This is to
include all risks and threat factors. During the planning stage,
the group will come together to discuss probable/possible risks
that could come along during the development stage. Once all
factors are discussed, then the plans are put in the works to
create a risk mitigation process. (Rouse, 2019) This will allow
the team to know how to mitigate/avoid certain risks that come
along.
Another factor in choosing this method is the fact that the
personnel on the development team can be interchangeable. This
means that if six people start the project and one or two decide
to leave or gets fired, the process can continue as planned. This
works well also if other people come in to fill those vacant
position. It allows the process to continue as planned without a
lag in the development process because of the detail in the
plans. With the way our remote communication is set-up,
communication issues are sure to occur. With that being said,
the waterfall method is the appropriate choice based on the fact
that the approach is our way of risk mitigation.(Week 1) Section
25. 5: Work breakdown structure
Collection of data and analysis will be conducted at the same
time in the planning phase which will help to establish the
needs of stakeholders. The process is supposed to take one week
where the project crew will collect all the information from
vendors, customers, and stakeholders. This will help to decide
the features expected from the program. The next process is
coming up with integration tools and this step will be done
approximately in 3 weeks due to the complex nature of the
process.
Time and cost should be well managed and thus testing and
development of the project features will be conducted
simultaneously. Actual testing of the application on vendors and
customers will provide real-time support that greatly aids in the
development and implementation of security measures to reduce
risk. Real-time support also helps greatly to reduce the effects
of malfunctioning on the business and also try to establish the
vital features that might be left out in the development phase.
This phase is expected to be conducted for not more than 3
weeks. The development team will actively fix any
malfunctioning of the application.
The last process is monitoring how the application is
performing. The team will offer oversight for support for
example database administration or cloud-based services.
Cloud-based services always have various security features in
place to ensure information communicated through the network
resource is reliable and secured properly (Dennis, 2018).
26. (Week 1) Section 6: Communication plan
The system will utilize the use of automated response system
which will always ensure that customers and vendors get real-
time as well as proper company support using well-organized
customer service. The application is designed in a way that
whenever a customer logs into the system, there is an automatic
query popping out prompting the customer to chat with the
client about anything they may wish to enquire about the
company.
Customer satisfaction is very essential; therefore, there is the
need to properly track customer and client communication. To
ensure there is monitoring, the application will have to always
produce a copy of the communication between the companies;
client and other users. This will easily provide an oversight
authority for tracking the communications there; the business
managers can check if the clients are useful to the business.
This approach is very beneficial in determining if the
application effectively provides customer satisfaction.
The alignment of stakeholders’ requirements and the application
design will ensure the organization has attained operational
effectiveness. The organization will attain improved
productivity if the customer service application is working
properly (Lin, 2007).
Regarding the quality of communication, the application
architecture is modeled in a way that response will give the
preferred quality assurance to the customers by the utilization
of automated systems. Using automated alert applications in the
27. automation strategy will ensure that customers’ issues are
properly and in time. Communication quality is also enhanced
by ensuring every stakeholder’s requirements are considered
since different people have different interests. Additionally, it
also aids in ensuring the right design is implemented.
Quality management report
IT488 – IT Capstone II
Introduction
Purpose: Quality Management Review
Audience: Stakeholders, Client, and project Team Members
Details: This report will review the progress of all phases of the
project.
28. Galactic Customer IT Services is an IT Support Company
located in Gainesville, FL. They have tasked out a project
development team to upgrade their ticketing system, upgrade
their VoIP capabilities, and an application to automate
workflow, updates, and patches. Galactic Customer IT Services
is a well-known client in the IT industry. This document will be
used alongside all other deliverables to produce reports,
reviews, and tasks that are completed throughout the course of
the project.
The Project Manager is responsible for:
· Documenting the client’s requirements, expectations, and
constraints for the project.
· Communicating with the client and project design teams
· Ensuring the client’s quality objectives are clearly identified
and documented.
· Identifying the scope of the project and determine the needs of
the project that include refining the requirements, budgets, and
all quality assessments.
The Project Design Teams are responsible for:
· Creating a finished product that meets or exceeds the
requirements and constraints that the client has identified.
· Delivering the product with all quality assessments accounted
and implemented.
· Taking the appropriate steps to ensure quality is being upheld
at their level.
· Communicating with the Project Manager with identified
risks, time frames, and stage/phase completions.
Requirements
Project Requirements
Completion/Status
Yes
No
29. Under Review
R-1
Ticketing System
X
The Ticketing System will be omni-channel supported. (i.e.
phone, email, self-service application, and employee input.)
R-2
Ticket Automation
X
This application will allow ticketing automation. This will
allow users to identify their problem and a ticket will be auto
generated into the system. The system will automatically
forward the tickets to the appropriate levels.
30. R-3
VoIP upgrade
X
The VoIP capabilities will provide telecommunications with the
use of a VPN. This will include local and long-distance calling.
R-4
Automated workflow and updates
X
31. The application will provide the capabilities to create tickets,
provide updates and patches to the system.
Quality Planning
Quality Control
Quality Assurance
Quality Improvement
Plan
Do
Check
Act
What is done
Determining the Requirements and constraints of the project.
Monitoring the requirements at each phase.
Measuring the quality of the requirements
Increasing the quality of the requirements at each stage.
When it is done
Planning phase: client identified these resources
Project development & quality assurance phases
Project development & quality assurance phases
Project development, quality assurance, and sprint phases
32. Resources
· This system has an expected employee user usage of 250,000
and 250,000 potential customer users.
· Galactic Customer IT Services has several servers at each
location.
· Current system software will be replaced after completion of
this project.
· Several Remote locations across the country.
· Workstations and VoIP hardware.
· VPN
· Current ticketing system
Quality Planning
Quality Control
Quality Assurance
Quality Improvement
Plan
Do
Check
Act
What is done
Determining the resources available to the project
Monitoring the resources and to utilize them to the fullest
Determining if the resources are available and the quality of
each.
Improve efficiency and effectiveness of the project resources.
When it is done
Planning phase: client identified these resources
Project development & quality assurance phases
Project development & quality assurance phases
Sprints
Design
33. This design will be reviewed by the client and project manager
before this phase will be completed. Once the design has been
approved, this will be reviewed and updated only as needed
throughout the course of the project. Design changes will be
minimized to reduce risks such as scope creep.
Quality Planning
Quality Control
Quality Assurance
Quality Improvement
Plan
Do
Check
Act
What is done
Determining the appropriate design
Monitoring the design to determine if it meets requirements
Measuring the quality of the design for overall performance to
the project
Increase performance when necessary
When it is done
Planning phase: client identified these resources
Project development & quality assurance phases
Project development & quality assurance phases
Sprints
System Development Methodology
The waterfall method has been approved for use. This
methodology will provide detailed documentation throughout
the project. The project team is confident is providing all the
necessary documentation to ensure the project starts off with as
much information as possible. This will help mitigate risks in
the later stages of development. This methodology has been
approved and will not receive any changes during the project
life cycle.
34. Quality Planning
Quality Control
Quality Assurance
Quality Improvement
Plan
Do
Check
Act
What is done
Determining the appropriate methodology
Monitoring the chosen methodology
Measuring the quality of each sprint
Increase performance and efficiency of each sprint phase.
When it is done
Planning phase: client identified these resources
Project development & quality assurance phases
Project development & quality assurance phases
Sprints
Work Breakdown Structure
The Work Breakdown Structure (WBS) has been provided in the
Project Plan document. This WBS will be reviewed and updated
during each phase of the project. Future phases may alter this
structure and will be updated as needed.
Quality Planning
Quality Control
Quality Assurance
Quality Improvement
Plan
Do
Check
35. Act
What is done
Determining the appropriate Work Breakdown Structure
Monitoring the assigned WBS at each level.
Measuring the performance of each level and their time frames
Alter the WBS as needed to increase efficiency.
When it is done
Planning phase: client identified these resources
Project development & quality assurance phases
Project development & quality assurance phases
Sprints
Communication Plan
· Daily reports will be produced and sent out via email to all
team members. This will allow the teams to fully understand the
areas that have been completed and in progress.
· Weekly reports will be generated to cover the timeline,
budget, main goals for the week, deliverables, and questions or
concerns about the previous week.
· Milestone reports will be covered during weekly meetings.
These meetings will cover the requirements for completion,
completed milestone reviews, deliverable approvals, and project
time frames.
· Quality management meetings will be held weekly to cover the
current status of each stage of the project.
· Updates to the communication plan will need to be approved
before any changes are made.
Quality Planning
Quality Control
Quality Assurance
36. Quality Improvement
Plan
Do
Check
Act
What is done
Determining the appropriate communication plan
Monitoring the effectiveness of the communication plan
Measuring the communication plan for any unused time.
Alter the time allotted for meetings, reports, etc. to produce an
efficient plan.
When it is done
Planning phase: client identified these resources
Project development & quality assurance phases
Project development & quality assurance phases
Project development, quality assurance, and sprint phases
(WEEK 2) Section 7: Quality Assurance Plan TBD
39. Section 10 – Project closure
References
Andrews, M. (2019) "The Best 11 Ticketing System Software in
2019" Retrieved from https://blog.hubspot.com/service/it-
ticketing-system
Dennis, J. (2018). Three unbeatable security advantages of
cloud-based solutions for your business. Retrieved from
https://www.cloudcomputing-news.net/news/2018/jun/25/three-
40. unbeatable-security-advantages-cloud-based-solutions-your-
business
Rouse, M. (2019, February). waterfall model . Retrieved from
TechTarget:
https://searchsoftwarequality.techtarget.com/definition/waterfall
-model
Online Ticketing
Customer Service
Tickets
Persistence
Security
UML Component Diagram: Online Ticketing
order
access
control
encryption
dataAccess
dataAccess
VPN
Internet
Customer
Remote Site 1
Remote Site 2Remote Site 3
Remote Site 4 Remote Site 5
Remote Site 6Remote Site 7Remote Site 8
Remote Site 9
Remote Site 10
Gainesville Florida
LosAngeles,Calafornia
ISP
Cloud
ISP
Cloud