Information Systems Capstone
Contents
1.0 Introduction
Singh, Shirah, and Barber Financial Holdings LLC. continues to grow its business, increasing their dependency on information technogy. The firm has reached a point where a more flexible, scalable, straightforward infrastructure, and easily managed applications are required for sucessful business practices. A solution like Amazon Web Services (AWS) can provide the computer power, storage, and other resources needed as the firm expands.
Solution
s of this magnitude do require a considerable amount of upfront investment, but will provide minimal cost for subsequential years reducing overall capital expenses. This solution will also enable minimal effort when moving applications to the cloud, minimizing support, to include administrative cost while retaining performance, security, reliability, and data integrity. 1.1 Company at a Glance
Singh, Shirah, and Barber Financial Holdings LLC., has drastically increased the number of clients and accounts over the past couple of years. This growth prompted the need for more qualified staff, additional offices and space, and newer communication technologies to facilitate services and improved management. The firm has acquired several buildings in various cities which are ready to be outfitted with network infrastructure, user workstations, peripherals and software applications. 1.2 Challenges
With just one present location in XYZ city growth in its industry is challenging, therefore the opening of several branch locations in various cities coupled with the data migration to a cloud service has become its number one project. The firm’s current infrastructure is limited, it does not currently have a full scale WAN and remote access (VPN), only a local LAN through the major local ISP is employed. All backups are stored onsite with tape copies sent to a cold off site location. Databases with all financial information are stored in the local server and there are no true access control restrictions. Additionally, there is only one system administrator performing all major database tasks and network functions.
Financial health is one of the most protected types of digital content. Finding ways to store, secure, and manage such data in this ever changing world of computing is a challenge. In order for the firm to grow and blossom, a large and fast LAN/WAN network is needed. Such network must provide access to internal resources via secure methods of authentication and also from the outside by a secure web interface client. VPN capabilities for traveling and visiting staff should provide a secure connection to internal resources. Access to the network and network shares must be tightly secured based on departmental roles. All databases will be kept in separate servers and backups will be conducted routinely (Weekly, Monthly; incremental/full). Access to database tables will be based on individual approval; single sign on authenti.
6 Steps to Confirm Successful Workday DeploymentZaranTech LLC
Workday HCM Training & Certification provided Online from USA industry expert trainers with real time project experience
Workday HCM Tutorial for Beginners | Learn Workday HCM Online | Workday HCM training - This is a video recording of a Live Webinar presentation by our Sr. SAP Solution Architect and trainer who is also a Manager in handling SAP Implementation projects.
Get More Free Videos - Subscribe ➜ https://goo.gl/5ZqDML
COURSE PAGE: https://www.zarantech.com/workday-hcm-training/
REGISTER FOR FREE LIVE DEMO: http://promo.zarantech.com/free-webinar-workday-hcm/
CONTACT: +1 (515) 309-7846 (or) Email - info@zarantech.com
"workday hcm tutorial"
"free workday hcm training"
"online workday hcm training"
"Best workday hcm training"
"workday hcm training for Beginners"
"Best workday hcm Training"
Reviews / Testimonials from past trainees are saying: https://goo.gl/ZVfnE4
Refer your friends to ZaranTech - http://www.zarantech.com/be-a-friend-tell-a-friend.
Understanding The Cloud For Enterprise Businesses. Triaxil
Cloud is getting lots of attention these days. Cloud is a transformational platform that can support the opportunities of today’s digital business being shaped and driven by mobile, social, IoT (Internet of Things), Big Data and other forces. Cloud Computing not only is a powerful agent of change, but it also can accelerate transformation.
The benefits are big. “Cloud computing is a disruptive phenomenon, with the potential to make IT organizations more responsive than ever,” says research firm Gartner. “Cloud computing promises economic advantages, speed, agility, flexibility,infinite elasticity an dinnovation.” As a result, more and more enterprises are moving to the cloud. According to Gartner, 78 percent of enterprises are planning to increase their investment in cloud through 2017.
Understanding The Cloud For Enterprise Businesses, an eBook from Triaxil!Ezhilarasan Natarajan
Cloud is getting lots of attention these days. Cloud is a transformational platform that can support the opportunities of today’s digital business being shaped and driven by mobile, social, IoT (Internet of Things), Big Data and other forces. Cloud Computing not only is a powerful agent of change, but it also can accelerate transformation.
The benefits are big. “Cloud computing is a disruptive phenomenon, with the
potential to make IT organizations more responsive than ever,” says research firm Gartner. “Cloud computing promises economic advantages, speed, agility,
flexibility,infinite elasticity and innovation.” As a result, more and more enterprises are moving to the cloud. According to Gartner, 78 percent of enterprises are planning to increase their investment in cloud through 2017.
Interested further?
6 Steps to Confirm Successful Workday DeploymentZaranTech LLC
Workday HCM Training & Certification provided Online from USA industry expert trainers with real time project experience
Workday HCM Tutorial for Beginners | Learn Workday HCM Online | Workday HCM training - This is a video recording of a Live Webinar presentation by our Sr. SAP Solution Architect and trainer who is also a Manager in handling SAP Implementation projects.
Get More Free Videos - Subscribe ➜ https://goo.gl/5ZqDML
COURSE PAGE: https://www.zarantech.com/workday-hcm-training/
REGISTER FOR FREE LIVE DEMO: http://promo.zarantech.com/free-webinar-workday-hcm/
CONTACT: +1 (515) 309-7846 (or) Email - info@zarantech.com
"workday hcm tutorial"
"free workday hcm training"
"online workday hcm training"
"Best workday hcm training"
"workday hcm training for Beginners"
"Best workday hcm Training"
Reviews / Testimonials from past trainees are saying: https://goo.gl/ZVfnE4
Refer your friends to ZaranTech - http://www.zarantech.com/be-a-friend-tell-a-friend.
Understanding The Cloud For Enterprise Businesses. Triaxil
Cloud is getting lots of attention these days. Cloud is a transformational platform that can support the opportunities of today’s digital business being shaped and driven by mobile, social, IoT (Internet of Things), Big Data and other forces. Cloud Computing not only is a powerful agent of change, but it also can accelerate transformation.
The benefits are big. “Cloud computing is a disruptive phenomenon, with the potential to make IT organizations more responsive than ever,” says research firm Gartner. “Cloud computing promises economic advantages, speed, agility, flexibility,infinite elasticity an dinnovation.” As a result, more and more enterprises are moving to the cloud. According to Gartner, 78 percent of enterprises are planning to increase their investment in cloud through 2017.
Understanding The Cloud For Enterprise Businesses, an eBook from Triaxil!Ezhilarasan Natarajan
Cloud is getting lots of attention these days. Cloud is a transformational platform that can support the opportunities of today’s digital business being shaped and driven by mobile, social, IoT (Internet of Things), Big Data and other forces. Cloud Computing not only is a powerful agent of change, but it also can accelerate transformation.
The benefits are big. “Cloud computing is a disruptive phenomenon, with the
potential to make IT organizations more responsive than ever,” says research firm Gartner. “Cloud computing promises economic advantages, speed, agility,
flexibility,infinite elasticity and innovation.” As a result, more and more enterprises are moving to the cloud. According to Gartner, 78 percent of enterprises are planning to increase their investment in cloud through 2017.
Interested further?
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
The Future of Cloud Transformation and Its Impact on Customer Experiences.pdfPetaBytz Technologies
Cloud transformations are becoming more common. Is your company ready to handle the transition? Petabytz Technologies assists businesses in making the transition to cloud-based solutions. For more information, please visit petabytz.com or call +91 89779 15322.
Running Head PROJECT PLAN-BUSINESS REQUIREMENT DOCUMENT .docxjeanettehully
Running Head: PROJECT PLAN-BUSINESS REQUIREMENT DOCUMENT
1
Project Plan-Business Requirement Document
Ali Allami
CIS 599
Graduate Information Systems Capstone
Supported by: Professor. Mark Cohen
Oct 27, 2019
PROJECT PLAN-BUSINESS REQUIREMENT DOCUMENT 2
Abstract
The project plan inception has been complete in last week with introduction documenting the cur-
rent IT network and that system is very important. Many kinds of businesses have an operation in place
to help with project management and implementation requirement. There is a chance for improvement
includes making suitable assessments of how to size a project is and project cost estimated.
There are multiple various names for tools that used with for this process: business needs requirement
and specification, requirements specification or, simply, business requirements. Business requirements
are the significant works of a company that must be done to make the company successful. And a busi-
ness requirements document (BRD) means company work documentation. The BRD process can be
incorporated within a Six Sigma DMAIC Define, Measure, Analyze, Improve, and Control culture.
Completion of a quality requirements document allows user needs and expectations to be captured, so
that infrastructure and information systems can be designed properly. Using the requirements document
provided in the course shell as a part of the requirements gathering process. You are to assess the needs
of the company as it prepares to become a multinational organization. You must consider current and
future trends and requirements; however, assumptions should be realistic and carefully considered. The
needs of the organization should be documented. Later deliverables will focus on specifics of all re-
quirements.
In the Business Require Document of this project I will describe the project summary and project
scope of work. In the scope, I will explain how to control the scope. Then I will describe the possible
risks, then integration with database and data warehousing, cloud technology and Virtualization, and
security level. The Project plan in MS Project (.mpp file) will be in the second attaced.
PROJECT PLAN-BUSINESS REQUIREMENT DOCUME ...
Governance of agile SW projects · White PaperpliXos GmbH
Effective governance of an offshore SW development project by an automated KPI cockpit. Customer case study.
Experts see the central and highly optimised governance of multiple service providers
– fully in line with customers’ requirements – as the future in outsourcing services
delivery. Innovative Software solutions out of the private Cloud are essential for
the successful delivery of “Multi-Vendor Management” or “Service Integration”. The
pliXos Outsourcing Director provides total visibility and control over any application
development project for the whole team – whatever their location.
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docxmonicafrancis71118
CLASS NAME:MIS600
PROFESSORS NAME:
STUDENTS NAME:
PROJECT NAME: NETWORK DESIGN
Content
Topic Page No.
Cover Page 1
Content 2
Executive summary 3
Project Charter 3
Earn Value Statement 11
Executive Summary
Network under a set of confined region is known as Intranet. It uses an IP protocol and IP-based tools like the file transfer application and web browsers that is provided by the server to only assigned IP address. Computer network communication is an important installation in a contemporary organization organisation. As the organization's service provision is improved through the reliable communication, its competition with related firms is enhanced and, therefore, valued competence. Ultimate network design as a mode of flow of information among employees and stakeholders in promotes coordination in the management, team work and services the business offer. This automatically improves the performance of the organisation at the good will of all workers.
It should be noted that an organisation's communication systems alone holds a large percentage in its performance that it should not be compromised, even on the slightest default. This would mean that the organisation would require an Information System that when a default occurs at any single point in the connection system, it would be easier to detect and reach that point as soon as possible. The design should be design with backbone network so temporally technical problem with not upset the performance of network communication. This is more appropriate in big organisations to maintain their data and communication confidentiality, integrity and accessibility. In networking design approach, the choice of device should be intelligently selected for the desired function, this will enhance performance in terms of managing security, traffic, errors in storage and transmitting information.
Documents and programs that are sensitive are run through LAN security domain system to create passwords for their protection against cybercrimes. The protected file would then be accessed by authorised personnel only. This would be an important idea where security of flowing information is paramount. Each set of the employee has got a privilege to prevent the access of any restricted file in the company.
Project Charter
Project Name
Network Design
Project Number
DW2
Project Team
Sponsor: Robert Elson
Author : Jacobs Adam
Manager: Joyce Rob.
Attached is a joint letter to Capitol Hill to advocate for increased.docxjaggernaoma
Attached is a joint letter to Capitol Hill to advocate for increased funding of the Public Health and Social Services Emergency Fund which included funding for nurses that are furloughed. Also, a type of reward that ANA is advocating for during Mental Health Month there is a call for legislative support for hazard pay and mental health services for nurses.
https://www.nursingworld.org/practice-policy/work-environment/health-safety/disaster-preparedness/coronavirus/what-you-need-to-know/legislative-and-regulatory-advocacy/covid-19-legislative-regulatory-and-advocacy-update/
What should nurses do to support each other and the professions during the COVID-19 pandemic?
.
Attached is a copy of an interview done with a Tribal member regardi.docxjaggernaoma
Attached is a copy of an interview done with a Tribal member regarding the issue of Tribal sovereignity. It needs to be restructured into something that resembles a newspaper article or reflection essay. The emphasis would be on five questions within the piece that discuss Tribal sovereignity, and the answers to same based on the entire document. The document needs to be approx. 2 pages, #12 font, double spaced. It needs to be completed by Tuesday afternoon. That would be tomorrow.
.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
The Future of Cloud Transformation and Its Impact on Customer Experiences.pdfPetaBytz Technologies
Cloud transformations are becoming more common. Is your company ready to handle the transition? Petabytz Technologies assists businesses in making the transition to cloud-based solutions. For more information, please visit petabytz.com or call +91 89779 15322.
Running Head PROJECT PLAN-BUSINESS REQUIREMENT DOCUMENT .docxjeanettehully
Running Head: PROJECT PLAN-BUSINESS REQUIREMENT DOCUMENT
1
Project Plan-Business Requirement Document
Ali Allami
CIS 599
Graduate Information Systems Capstone
Supported by: Professor. Mark Cohen
Oct 27, 2019
PROJECT PLAN-BUSINESS REQUIREMENT DOCUMENT 2
Abstract
The project plan inception has been complete in last week with introduction documenting the cur-
rent IT network and that system is very important. Many kinds of businesses have an operation in place
to help with project management and implementation requirement. There is a chance for improvement
includes making suitable assessments of how to size a project is and project cost estimated.
There are multiple various names for tools that used with for this process: business needs requirement
and specification, requirements specification or, simply, business requirements. Business requirements
are the significant works of a company that must be done to make the company successful. And a busi-
ness requirements document (BRD) means company work documentation. The BRD process can be
incorporated within a Six Sigma DMAIC Define, Measure, Analyze, Improve, and Control culture.
Completion of a quality requirements document allows user needs and expectations to be captured, so
that infrastructure and information systems can be designed properly. Using the requirements document
provided in the course shell as a part of the requirements gathering process. You are to assess the needs
of the company as it prepares to become a multinational organization. You must consider current and
future trends and requirements; however, assumptions should be realistic and carefully considered. The
needs of the organization should be documented. Later deliverables will focus on specifics of all re-
quirements.
In the Business Require Document of this project I will describe the project summary and project
scope of work. In the scope, I will explain how to control the scope. Then I will describe the possible
risks, then integration with database and data warehousing, cloud technology and Virtualization, and
security level. The Project plan in MS Project (.mpp file) will be in the second attaced.
PROJECT PLAN-BUSINESS REQUIREMENT DOCUME ...
Governance of agile SW projects · White PaperpliXos GmbH
Effective governance of an offshore SW development project by an automated KPI cockpit. Customer case study.
Experts see the central and highly optimised governance of multiple service providers
– fully in line with customers’ requirements – as the future in outsourcing services
delivery. Innovative Software solutions out of the private Cloud are essential for
the successful delivery of “Multi-Vendor Management” or “Service Integration”. The
pliXos Outsourcing Director provides total visibility and control over any application
development project for the whole team – whatever their location.
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docxmonicafrancis71118
CLASS NAME:MIS600
PROFESSORS NAME:
STUDENTS NAME:
PROJECT NAME: NETWORK DESIGN
Content
Topic Page No.
Cover Page 1
Content 2
Executive summary 3
Project Charter 3
Earn Value Statement 11
Executive Summary
Network under a set of confined region is known as Intranet. It uses an IP protocol and IP-based tools like the file transfer application and web browsers that is provided by the server to only assigned IP address. Computer network communication is an important installation in a contemporary organization organisation. As the organization's service provision is improved through the reliable communication, its competition with related firms is enhanced and, therefore, valued competence. Ultimate network design as a mode of flow of information among employees and stakeholders in promotes coordination in the management, team work and services the business offer. This automatically improves the performance of the organisation at the good will of all workers.
It should be noted that an organisation's communication systems alone holds a large percentage in its performance that it should not be compromised, even on the slightest default. This would mean that the organisation would require an Information System that when a default occurs at any single point in the connection system, it would be easier to detect and reach that point as soon as possible. The design should be design with backbone network so temporally technical problem with not upset the performance of network communication. This is more appropriate in big organisations to maintain their data and communication confidentiality, integrity and accessibility. In networking design approach, the choice of device should be intelligently selected for the desired function, this will enhance performance in terms of managing security, traffic, errors in storage and transmitting information.
Documents and programs that are sensitive are run through LAN security domain system to create passwords for their protection against cybercrimes. The protected file would then be accessed by authorised personnel only. This would be an important idea where security of flowing information is paramount. Each set of the employee has got a privilege to prevent the access of any restricted file in the company.
Project Charter
Project Name
Network Design
Project Number
DW2
Project Team
Sponsor: Robert Elson
Author : Jacobs Adam
Manager: Joyce Rob.
Attached is a joint letter to Capitol Hill to advocate for increased.docxjaggernaoma
Attached is a joint letter to Capitol Hill to advocate for increased funding of the Public Health and Social Services Emergency Fund which included funding for nurses that are furloughed. Also, a type of reward that ANA is advocating for during Mental Health Month there is a call for legislative support for hazard pay and mental health services for nurses.
https://www.nursingworld.org/practice-policy/work-environment/health-safety/disaster-preparedness/coronavirus/what-you-need-to-know/legislative-and-regulatory-advocacy/covid-19-legislative-regulatory-and-advocacy-update/
What should nurses do to support each other and the professions during the COVID-19 pandemic?
.
Attached is a copy of an interview done with a Tribal member regardi.docxjaggernaoma
Attached is a copy of an interview done with a Tribal member regarding the issue of Tribal sovereignity. It needs to be restructured into something that resembles a newspaper article or reflection essay. The emphasis would be on five questions within the piece that discuss Tribal sovereignity, and the answers to same based on the entire document. The document needs to be approx. 2 pages, #12 font, double spaced. It needs to be completed by Tuesday afternoon. That would be tomorrow.
.
Attached Files Week 5 - trace IP Physical Location.rtf (38..docxjaggernaoma
Attached Files:
Week 5 - trace IP Physical Location.rtf
(38.189 KB)
Lab WK 5
Scenario:
You are the cybersecurity expert for a government organization. There is great concern that hackers from another country will infiltrate the government network by using a phishing attack to interfere with our election process. One member send you an email that looks suspicious, in oder to provide law enforcement with as much information as possible you decide to track the sender.
You may use the attached email (.txt) the senders IP is highlighted or choose one from your own email
Trace the IP
to get a physical address (starting point)
Share any other information you find that may be relevant to law enforcement
Short Guides - You may need Google "how to view the source code for your specific" device, browser etc... also works on email that are not saved on your device.
Mac
Outlook (Windows)
.
Attached here is a psychology article I need to be summarized. Pleas.docxjaggernaoma
Attached here is a psychology article I need to be summarized. Please also follow attached rubric. Your summary should use
Study 2 (ONLY)
or EXPERIMENT 2 ONLY
of the Sherman, Haidt, and Cohen (2009) article and follow the format of the sample provided. Remember that your summary should be in your own words. Also follow attached instructions.
.
Attached Files:
News Analysis Sample.docx
News Analysis Sample.docx - Alternative Formats
(18.027 KB)
News Analysis #1_sample.docx
News Analysis #1_sample.docx - Alternative Formats
(17.771 KB)
This assignment fulfills/supports
Module Outcome: You will have discuss how prejudice, stereotypes, and racism help to perpetuate disadvantage for less powerful groups.
Course Outcome: You will identify and describe key social problems and proposed solutions.
Education Competency: You will demonstrate socialization skills that support cultural awareness and a global perspective.
The Assignment
Watch/browse a newscast and write a report containing the following:
Name, date, and time of newscast.
The top five stories of the day
A 3-5 sentence paragraph summarizing a story of interest shown during the newscast.
Share 3-5 sentences of your personal reaction to the story.
Apply
five
key concepts covered in the chapters of the module discussed during the story. Include a definition of each concept and provide a
quote
from the newscast to illustrate the concept. See the course outline for the due date for each analysis.
Resources
Student Submission of Safe Assignment
SafeAssign: Student Guide
Acceptable Length
You analysis should be no more than two pages.
Formatting Requirements
Put your name, course and section number, and assignment title at the top of the document.
Use one-inch margins.
Use a 12-point Times New Roman font.
Use double line spacing in the document.
Grading Criteria
The overall score noted in a SafeAssign originality report is an indicator of the percentage of the submitted paper matching existing sources. This score is a warning indicator only and papers should be reviewed to see if the matches are properly attributed.
Scores below 15 percent: These papers typical include some quotes and few common phrases or blocks of text that match other documents. These papers typically do not require further analysis, as there is no evidence of plagiarism in these papers.
Scores between 15 percent and 40 percent: These papers include extensive quoted or paraphrased material or they may include plagiarism. These papers should be reviewed to determine if the matching content is properly attributed.
Scores over 40 percent: There is a very high probability that text in this paper was copied from other sources. These papers likely include quoted or paraphrased text in excess and should be reviewed for plagiarism.
.
Attached Files:
SOC-220_SOCIAL PROBLEMS PRESENTATION_Sample.pptx
SOC-220_SOCIAL PROBLEMS PRESENTATION_Sample.pptx - Alternative Formats
(1.525 MB)
SOC 220 common presentation assignment rurbic.docx
SOC 220 common presentation assignment rurbic.docx - Alternative Formats
(18.424 KB)
Power Point Assignment Rubric and List of Social Problems are attached:
Social Problems Presentation Instructions
Introduction
This assignment will investigate the concepts covered in this course and allow you to use policy evaluation, cultural values, and political outlook to discuss it.
This assignment fulfills/supports
Module Outcome: You will define how prejudice, stereotypes, and racism help to perpetuate disadvantage for less powerful groups.
Course Outcome #2: You will identify and describe key social problems and proposed solutions.
General Education Competency #1: You will use critical thinking skills that support cultural awareness and a global perspective.
The Project Assignment:
As a journalist or researcher, create a 1-2 minute commercial OR 15-22 Power Point Presentation on an international (I ask that you limit your topics to non-American social problems) social problem to be shown during the news. This information should be compiled into a commercial presentation using power point slides, Flipgrid, Animoto, or Powtoon.
You must answer the following questions by also providing a typed summary in MSWord format answering the following questions if you are providing a 1-2 min. commercial. If choosing a power point presentation, please make sure theses questions are included in your presentation with answers- detailed and comprehensive, using 3 academic sources (min.) or more if needed:
Topic selection and explanation for choosing the topic
. Select a problem in another country. Since there are literally hundreds of topics to choose from, I ask that you limit your topics to non-American social problems. Identify the problem. Provide some background and/or information concerning why you choose this particular topic. Be sure to discuss who is involved. (
0-15 points
)
Explain why the social problem is considered a serious issue
. Provide research within the past 5 years. Is the problem increasing, and if so, how and/or why? (
0-25 points
)
Acknowledge how this problem can be addressed from a journalist perspective.
What path would you take to bring light to the problem if you were a journalist for this story? For example, you may choose to focus on a specific region or topic. If you want to focus on a specific topic, some ideas for you to consider might be youth (toy soldiers, child labor), gender, rape, health, illness (AIDS), drug use (additional topics may be found under helpful information). Since there are literally hundreds of topics to choose from, I ask that you limit your topics to non-American social problems. (
0-20 points
)
Identify at least four sociological concepts related to this social problem.
You mu.
Attached below you will find the series of 4 questions. This assignm.docxjaggernaoma
Attached below you will find the series of 4 questions. This assignment needs to be in by Monday 04/14/14, no later then 11:00 P.M Eastern Time. It is very important to use APA formating with in text citations and references used, and at least my book must be used as one of the references if not the only reference.
Absolutely No Plagiarism allowed!
My professor's will be watching me close on this!!! Original work only allowed...
My book is:
Patterson, T. (2013).
The American democracy
(11th ed.). New York, NY: McGraw-Hill, Inc.
.
Attached below isWEEK 4 As always, include references. As alwa.docxjaggernaoma
Attached below is:
WEEK 4: As always, include references. As always, no plagiarism, cite and list in apa format
Respond To Discussion Board: They are 2 discussion boards post below. read and Reply to each discussion post 100 words per each response so total 200words. Responses should demonstrate critical thinking and comprehension of the discussion topic and are strengthened when they are supported by additional research. You are expected to provide supporting details for your response; that support may come from the points covered in the readings and additional external research all source must be cited and listed (
appropriately cited
) in APA
.
Attached are two articles in one document. Write thoughtful resp.docxjaggernaoma
Attached are two articles in one document. Write thoughtful responses to the question about any one of the articles:
1. Expedia article: How did Expedia stay relevant or survive? What did their Usability Lab do? Describe A/B testing in simple words. 150-200 words.
2. Hidden Emotion article: summarize the techniques mentioned in this article. What are some limitaions of using them for decision making? 150-200 words.
.
Attached are the instructions to the assignment.Written Assign.docxjaggernaoma
Attached are the instructions to the assignment.
Written Assignment: Descriptive Statistics Data Analysis Plan.
To develop a plan to calculate descriptive statistics and generate graphs and tables from a set of real world data. (This is only the plan)
.
Attached are the instructions and rubric! Research Paper #2.docxjaggernaoma
Attached are the instructions and rubric!
Research Paper #2
Choose any of the recent emerging / reemerging infectious disease discussed in your textbook (for example: Severe Acute Respiratory Syndrome (SARS – 2002-2003), Middle East Respiratory Syndrome Coronavirus (MERS-CoV)- 2015-2018), Avian influenza, H1N1 Influenza (Swine Flu) Pandemic – 2009-2010, Novel Avian influenza A (H7N9) Virus 2013-2017, West Nile Virus, Lyme Disease, Escherichia Coli, Tuberculosis, Ebola virus disease, Zika virus disease).
1. Introduce the disease
2. Mention signs, symptoms and diagnosis of the disease.
3. Outline the factors that may have contributed to the emergence or reemergence of this infectious diseases.
4. How would you prevent similar occurrence? Mention the goals of Health People 2020 to reduce this infection / Prevention and control of the disease / Infection Control Guidelines.
5. Is there a CDC priority for public health response to this specific infectious disease?
6. What is your thought about emerging antibiotic -resistant microorganisms?
7. What is your role as a community health nurse?
8. Mention research studies related with the topics discussed in your paper (mention at least 3 research studies in paper).
Research Assignment # 2
Purpose
The student will choose (1) of the recent emerging / reemerging infectious disease (some examples were provided) to develop the research project. Also, the student will use given questions to guide the paper.
General directions
1.
You will submit one (1) paper as part of this assignment (individual assignment).
2. Your research paper must follow APA format according to Publication Manual American Psychological Association (APA) (6th ed.). Include a cover page and headings per 6th edition APA guidelines.
3. The research paper should be minimum of 3 pages (not including the title or reference pages) – maximum of 6 pages (not including the title or reference pages), single spaced, Times New Roman, Size 12, and 5 references about the topic (3 must be peer-reviewed journal articles).
Research Paper
Include the following components:
1. Introduction of the disease
2. Mention signs and symptoms of the disease. How do you diagnose this infectious disease?
3. Outline the factors that may have contributed to the emergence or reemergence of this infectious diseases.
4. How would you prevent similar occurrence? Mention the goals of Health People 2020 to reduce this infection / Prevention and control of the disease / Infection Control Guidelines.
5. Is there a CDC priority for public health response to this specific infectious disease?
6. What is your thought about emerging antibiotic -resistant microorganisms?
7. What is your role as a community health nurse?
8. Mention research studies related with the topics discussed in your paper (mention at least 3 research studies in paper).
9. Conclusion
10. References Page
.
Attached are the guidelines for the Expertise Sharing Project. M.docxjaggernaoma
Attached are the guidelines for the Expertise Sharing Project.
My Topic:
Memory Enhancement Strategies
14-15 Slides of Content.
REQUIRED COURSE MATERIALS Required textbook: Slavin, R.E. (2018). Educational psychology: Theory and practice (12th ed.). Boston, MA: Pearson. ISBN- 9780134995199.
Other Required and/or Recommended Resource(s): Writing Style Formatting: APA Format: Where applicable, the use of APA 6th edition is required.
Course Objective 7 - List and describe steps and principles relevant to direct instruction as it relates to the teaching of concepts, skills, and attitudes including various modes of retention, forgetting, and transfer.
Course Objective 8 - Identify the key concepts of the constructivist theory of learning as they relate to cooperative learning, problem-solving and thinking skills
Course Objective 9 - Identify and describe characteristics of appropriate and effective learner-centered lessons and units that utilize grouping, differentiation, and technology.
Course Objective 10 - Describe different bases of motivation such as drives, needs, goals, interests, and achievement motivation; and discuss psychological principles and procedures for teachers to motivate learners and foster intrinsic motivation.
Course Objective 11 - Identify the components of an effective learning environment for all learners, including those with exceptionalities.
Course Objective 12 - Identify methods for teacher accountability and their relation to assessment methodologies
.
Attached are the documents needed to complete the assignment. The in.docxjaggernaoma
Attached are the documents needed to complete the assignment. The instrucions are are attached with an example of how to write the assignment. Also attached is an article that the student is required to write about. It is important that this is completed no later than thursday. I appreciate your help. Thank you
.
Attached are the 3 documents1. Draft copy submitted2. Sam.docxjaggernaoma
Attached are the 3 documents:
1. Draft copy submitted
2. Sample final paper from a different student for reference on how to write our proposed paper.
3. Comments suggested from Professor
** Need a Final paper based on the above suggestions/comments and samples - 1800words (300 WORDS each page * 6pages)
.
attached are directions needed to complete this essay! Please make s.docxjaggernaoma
attached are directions needed to complete this essay! Please make sure
ALL QUESTIONS ARE ANSWERED
and
is original as teacher scans it for plagiarism
.
YOU CAN TALK ABOUT APPLE IPHONE AS A TOPIC!
Please use sources!
Thank you - APA FORMAT - NEEDS TO BE DONE NOT LATER THAN 5PM PST 8/25
.
Attach is the checklist For this Assignment, write a 3 and half pa.docxjaggernaoma
Attach is the checklist
For this Assignment, write a 3 and half page paper, including reference page, describing an imaginary crime scene of a mass disaster and plan a team approach to the examination of that scene. Describe all of the appropriate specialized personnel that should be present at the scene/disaster and what they should contribute to the investigation.
Use materials from the text and/or any outside resources to support your response.
You may use the textbook as a source, along with personal interviews, . Follow American Psychological Association (APA) format with proper citations and references.
.
Attach and submit the final draft of your Narrative Essay. Remember .docxjaggernaoma
Attach and submit the final draft of your Narrative Essay. Remember that the file you attach should be named with your last name and the assignment title.
Make sure that your essay has the following:
1. An Introduction
2. A Thesis with a specific topic and comment that clearly states exactly what the point of the essay is. Remember for the Narrative Essay the thesis should indicate the specific event or incident and exactly what was learned.
3. Body paragraphs (generally 3 or more)
4. A Conclusion
5. A Heading
6. A Header
7. Double spacing
8. A Title
This essay is worth 75pts.
Attach a Word document.
.
Atomic Theory Scientists and Their ContributionsScientist .docxjaggernaoma
Atomic Theory Scientists and Their Contributions
Scientist (date)
Contribution(s)
Empedocles
(492 BCE and 432 BCE)
All matter is composed of four elements: fire, air, water, and earth. The ratio of these four elements determines the properties of the matter
Democritus
(460 BCE - 370 BCE)
Matter can be cut into its constituent parts, these parts still possess all the properties of the original matter. He named this “atomos”.
.
Atomic models are useful because they allow us to picture what is in.docxjaggernaoma
Atomic models are useful because they allow us to picture what is inside of an atom, something we will never be able to actually see. We're going to talk about two models, the Bohr model and the Quantum model. While we know that the Quantum model is the correct way to represent atoms, the Bohr model is still useful for a very basic understanding. Think of it as a stick figure sketch of an atom. The parts are all there, its just not quite filled in all of the way.
Bohr Model
The Bohr model of the atom was developed in 1914 by Niels Bohr. In this model, electrons move around the nucleus in fixed, concentric circles. Picture the planets orbiting the Sun. These circles are called energy levels and electrons must have a specific amount of energy to be in each level. The energy levels closest to the nucleus require the least amount of energy. In order for an electron to move further from the nucleus (or move up an energy level) they must gain energy. If they lose energy they fall down to an energy level closer to the nucleus.
Drawing the Bohr model for an atom gives you valuable information about the atom's valence electrons. The
valence electrons
--
those in the outermost energy leve
l--are the ones that determine the chemical properties of an atom. In order to draw a Bohr model you must first use the periodic table to tell you the number of protons, neutrons, and electrons in an atom. For Bohr models we usually draw what the "average" atom for that element looks like and just round the average atomic mass to a whole number and use that for the mass number.
Steps for Drawing a Bohr Model:
1. Count the number of protons, electrons, and neutrons for that atom.
2. Draw the nucleus. Indicate the correct number of protons and neutrons in the nucleus.
3. Draw energy levels around the nucleus, starting with the energy level closest to the nucleus. Fill up each energy level before moving on to the next.
Each energy level in a Bohr model can only hold a specific number of electrons, as shown in the table below.
Energy Level
Max # of electrons
1
2
2
8
3
18
4
32
For example, here is a Bohr model for the average oxygen atom:
Here is one for phosphorus:
You try drawing one for Magnesium (Mg) and for Boron (B). Count the number of electrons on the outermost energy level to find the number of valence electrons. Check your answers by looking at the handout.
Quantum Model
In 1925 the Quantum model of the atom was developed after it was determined that electrons can behave like a wave and a particle at the same time. In addition, you can't know the precise location of an electron. Instead of traveling in orderly circles around the nucleus, we describe the electrons as existing in a three-dimensional
electron cloud
--a shape surrounding the nucleus. You will learn more about the Quantum model in chemistry.
These are some of the orbital shapes possible in the first two energy levels of an atom.
Draw a Bohr model for elements wi.
Atoms and Electrons AssignmentLook at these websites to he.docxjaggernaoma
Atoms and Electrons Assignment
Look at these websites to help you understand chemical bonding which depends on the atomic structure. The electrons in the orbitals will be crucial to figuring out how atoms bond.
Do not cut and paste from the internet or book. Do not copy from a book or internet. Paraphrase all answers in your own words. No quotes. You must do the assignment by yourself without help from other students, friends, significant others.
Jefferson Lab Question and Answers about Atoms
Make sure you click on the links to learn more about atoms and electrons
Atomic Structure
Make sure you look at all the links on the right side from Overview to Compound Names
Periodic Table1
You can click on the kind of table information you need on the left.
Periodic Table 2
Chemical Bonding Websites to help answer Questions 2 and 3:
Chemical Bonding 1
Chemical Bonding 2
SEE ASSIGNMENT RUBRIC AT END OF PAGES FOR HOW TO MAXIMIZE POINTS.
Atoms and Electrons
Name: ______________________
1. Fill in the table below using the periodic table. (2pts)
Element
Atomic Number
Atomic Mass
# of Valence Electrons
# of Electrons needed to fill the outer shell
Chlorine
Potassium
Magnesium
Fluorine
Sodium
Nitrogen
Oxygen
Carbon
Iodine
Hydrogen
2.
Name each element based on the number of electrons. Use the periodic chart to help you name the elements. The full name of the element is below the symbol.
Type the name into the box below each drawing. (2 pts)
1. ___________ 2. ______________ 3. ____________
4. _____________ 5. _____________ 6. _______________
(next page)
3. a. Name one ionic compound you can form from the above elements. (1 pt)
b. Describe specifically how you would form that ionic compound. (be detailed! I want to know that you know how an ionic bond is formed) (2 pts)
4. a. Name one covalent compound you could form from the above elements. You may need more than one of the elements to complete the compound. (1 pt)
b. Describe specifically how these elements would form. (be detailed! I want to know that you know how a covalent bond is formed) (2 pts)
Assignment Rubric
Teacher Name: Mrs. Russell
CATEGORY
10-9 pts
8-7 pts
6-5 pts
Less than 5 pts
Amount of Information
All questions are addressed.
Most questions are addressed.
Some questions are addressed.
Many questions were not answered.
Questions #3 b and #4 b
All answers are fully detailed with information required in the question. Most answers will have at least 3 or more sentences.
All answers are detailed with information required in the question. Most answers will have 2 sentences.
Answers do not have enough information required in the question. Most answers will 1 sentence.
No answer to the questions.
Quality of Information
Information clearly relates to the main topic. It includes several supporting details and/or examples.
Informat.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
1. Information Systems Capstone
Contents
1.0 Introduction
Singh, Shirah, and Barber Financial Holdings LLC. continues to
grow its business, increasing their dependency on information
technogy. The firm has reached a point where a more flexible,
scalable, straightforward infrastructure, and easily managed
applications are required for sucessful business practices. A
solution like Amazon Web Services (AWS) can provide the
computer power, storage, and other resources needed as the firm
expands.
Solution
2. s of this magnitude do require a considerable amount of upfront
investment, but will provide minimal cost for subsequential
years reducing overall capital expenses. This solution will also
enable minimal effort when moving applications to the cloud,
minimizing support, to include administrative cost while
retaining performance, security, reliability, and data integrity.
1.1 Company at a Glance
Singh, Shirah, and Barber Financial Holdings LLC., has
drastically increased the number of clients and accounts over
the past couple of years. This growth prompted the need for
more qualified staff, additional offices and space, and newer
communication technologies to facilitate services and improved
management. The firm has acquired several buildings in
various cities which are ready to be outfitted with network
infrastructure, user workstations, peripherals and software
applications. 1.2 Challenges
With just one present location in XYZ city growth in its
industry is challenging, therefore the opening of several branch
locations in various cities coupled with the data migration to a
cloud service has become its number one project. The firm’s
current infrastructure is limited, it does not currently have a full
scale WAN and remote access (VPN), only a local LAN through
the major local ISP is employed. All backups are stored onsite
with tape copies sent to a cold off site location. Databases with
all financial information are stored in the local server and there
3. are no true access control restrictions. Additionally, there is
only one system administrator performing all major database
tasks and network functions.
Financial health is one of the most protected types of digital
content. Finding ways to store, secure, and manage such data in
this ever changing world of computing is a challenge. In order
for the firm to grow and blossom, a large and fast LAN/WAN
network is needed. Such network must provide access to
internal resources via secure methods of authentication and also
from the outside by a secure web interface client. VPN
capabilities for traveling and visiting staff should provide a
secure connection to internal resources. Access to the network
and network shares must be tightly secured based on
departmental roles. All databases will be kept in separate
servers and backups will be conducted routinely (Weekly,
Monthly; incremental/full). Access to database tables will be
based on individual approval; single sign on authentication via
windows will provide secured network access without the
complication of multiple username/password plus database
access control/auditing capabilities which the firm currently
lacks. 2.0 Project Strategy Statement
Cloud computing value cannot be measured in dollars;
migrating to the cloud provides cost savings, and great benefits
such as data security, data integrity, auditing, access control,
4. flexibility and scalability. 2.1 Objective
Gaining benefits of cloud in the financial service industry
requires successfully navigating a highly complex technical and
regulatory environment. Cloud migration for a firm such as
Singh, Shirah, and Barber Financial Holdings LLC., will
addresses many challenges;
· Data Security- Encryption, secure access
· Risk & Compliance- Regulatory, audit and legal postures
· Industry Standards- ISO, NIST
· Governance- continuous governance and management
· Change management- tools and management models
· Automation
· DR/ BC –build in redundancy and disaster recovery
capabilities 2.2 Scope
The strategy for migrating to a cloud service(s) should align
with the strategy and vision of the firm. By reducing the total
cost of data center hardware, software, operations, and shifting
the IT finances to a more efficient computing platform
promotes the user and increases the security posture of Singh,
Shirah, and Barber Financial Holdings LLC.2.3 Competitive
Advantage
To stay on top of in this competitive financial market and pose
a challenge to competitors, our company has decided that it is
time for growth. Along with growth of a company the
infrastructure and the operational capabilities must grow in
5. parallel. In order to accomplish this growth, it is best for our
company to seek out a Cloud solution to ensure our data
systems can scale at the same pace as the company’s employees
and clients. In order for any company to stay competitive in the
market, the two most important things that need to be
considered are profit and growth. Both profit and growth are
only achievable if you have a well-established service and
customer base. In the financial sector, the most important trait
of a financial partner for customers is trust and security.
Like many other innovative technologies the value of cloud
services lies not just in the technology but in the operational
changes that it brings.
· IT staff can be freed from routine maintenance and task and
focus more on strategic projects
· Eliminate footprint of data center
· New applications which can improve revenue and information
processing can be easily tested and launched. The latest
versions of applications needed to run are made available as
soon as they are released.
· Cloud services can add functionality to established ecommerce
sites.
· Improved mobility, workers can access their resources from
anywhere via smart phones/tablets.
· Cloud offers flexibility; it can be turned up or down depending
6. on the needs.
· Less environmental impact
· Scaling of network infrastructure to analogous that of the
company3.0 Project Management Methodology
The Project Management Methodology is an important
document that can be leveraged to inform the project team on
procedures, communications, best practices, and lessons
learned. Within this project management methodology
document, we wish to establish the following:
· Create a framework for the management of the project
· Establish standards and guidelines for project processes
· Afford project teams and manager guidelines for project
results
· Create a vehicle for project managers to leverage policies and
practices that aid in project sharing
The methodology depicted in this document derives from an
assimilation of organizational best practices, current company
practices, and consultants. In order to structure this
methodology, the project was segmented into five different
management phases; planning, analysis, initiation, management,
and termination. These phases are designed to be inclusive of
all aspects of the project. While some aspects of the phases may
overlap, each phase serves its own purpose. Additionally, these
phases do not have to be undertaken sequentially, waiting to
7. begin the next once the previous is concluded. These phases can
be executed in parallel. This should allow for the adoption of an
agile strategy for the project if desired. Deliverables have been
built into the methodology to provide shareholders with a clear
understanding and communication of project status and
outcomes.3. 1 Phase 1- Planning
The planning phase of the project life cycle will be an outline
phase. During this phase the scope and structure of the project
will be formed. While this phase progresses, it will generate the
Project Proposal. At this point, the project is in its infancy and
has not yet been approved to procced as a viable project. This
phase does include the scope of the project, but it is a rough
estimate of the scope. The more finite and detailed scope of the
project would be flushed out if the project is approved to
continue. For this reason, the cost estimates are just that, best
guess estimates. These are designed to give the decision makers
reasonable information to determine the feasibility and
practicality of the project. Within this phase there are both
expected actions and outputs.
Planning Actions
The initial project purpose must be defined and translated into a
Project Proposal. The Project Proposal must define the
following:
· The problem expected to be solved by the project
8. · The project goals and objectives
· Measurements of success
· Project Budget
· Project Timeline
· Project Assumptions and Constraints
· Project Risks
It is at this point a decision must be made to ‘Go’ or ‘No Go’ on
the project via senior management. If the project gets approved,
it will move onto the next phase of the methodology. If the
project is not approved, then it will be documented as to why
and serve as a lessons learned for the project approval process.
Planning Outputs
The outputs that should be expected during the Outline phase of
the project life cycle are:
· Sponsor approval
· Project Proposal
· Management approval
3.2 Phase 2- Analysis
The planning phase of the project life cycle will be an outline
phase. During this phase the scope and structure of the project
will be formed. While this phase progresses, it will generate the
Project Proposal. At this point, the project is in its infancy and
has not yet been approved to procced as a viable project. This
9. phase does include the scope of the project, but it is a rough
estimate of the scope. The more finite and detailed scope of the
project would be flushed out if the project is approved to
continue. For this reason, the cost estimates are just that, best
guess estimates. These are designed to give the decision makers
reasonable information to determine the feasibility and
practicality of the project. Within this phase there are both
expected actions and outputs.
Planning Actions
The initial project purpose must be defined and translated into a
Project Proposal. The Project Proposal must define the
following:
· The problem expected to be solved by the project
· The project goals and objectives
· Measurements of success
· Project Budget
· Project Timeline
· Project Assumptions and Constraints
· Project Risks
It is at this point a decision must be made to ‘Go’ or ‘No Go’ on
the project via senior management. If the project gets approved,
it will move onto the next phase of the methodology. If the
project is not approved, then it will be documented as to why
10. and serve as a lessons learned for the project approval process.
Planning Outputs
The outputs that should be expected during the Outline phase of
the project life cycle are:
· Sponsor approval
· Project Proposal
· Management approval
3.3 Phase 3- Initiation
The initiation phase of the project begins once the project has
been organized and given the ‘Go’ decision from the executives.
At this point the structure of the project is completed and all of
the delegation of duties and responsibilities has been conducted.
Since the project is a work in progress, there may be cause for
team members to adapt the project work as necessary to ensure
the identified tasks can and will be accomplished. With all
projects conducted by the organization the project manager will
be the primary driver to keep the project on track to achieve the
specified goals. These are done in accordance with the project
sponsor’s demands and business decision. It is important to
record all issues that arise during this phase to ensure they can
be presently mitigated or avoided in future projects. An issue
can include anything that can impact the project’s timeline,
goals, or objectives.
11. Initiation Activities
· Project kick-off meeting
· Assign team members
· Assess and review project plan
Initiation Deliverables and Outputs
· Resource requirements
· Risk analysis
· Issue records3.4 Phase 4- Management
The management phase of the project is the most labor intensive
and toughest to execute. This phase lasts the duration of the
project and its primary purpose is to ensure active engagement
of team member and stakeholders occurs during the project life
span. During this phase reporting and tracking are critical
exercises to ensure the project stays on course and project
success occurs. For this reason the management phase will
incorporate various forms of communication such as email and
meetings to ensure all stakeholders are adequately informed on
the project status. This communication within this phase
consists of formal and informal communications to internal and
external players. Formal communications will consist of
presentations, briefs, and reports. Informal communication is
team discussion and brief verbal interactions. Any formal
reports should be included in calendar as a deliverable. As for
meetings these need to include the project sponsor, project
manager, project team, and vendor SMEs where applicable.
12. These meetings need to be held on a weekly basis and should
focus on the progress of previous tasks, the upcoming tasks, and
any issues involved with the project. It is imperative for the
success of the project that team members implement at least the
minimum reporting requirements.
Management Activities
· Project Plan Reporting and Execution- Regular weekly status
reports must go to the project sponsor from the project manager
updating them on the project status in real time. Also, any
issues that arise during the project need to be reported to the
project sponsor or manager if they affect the timeline, budget,
or resources.
· Risk/Issue Management- Mitigations should be implemented
to ensure the impact to the project dealt by a risk occurrence is
reduced as much as possible. If a risk occurs, the project
manager and the project sponsor need to be made aware of the
risk that occurred and the expected impact to the project.
· Communication Management- Strong communication is
essential to any project. In order to ensure this communication
is carried out successfully the following forms of
communication will need to be utilized daily; project status
13. reports, email, and phone calls. Team meetings should be held
at a minimum of biweekly and in cases where information may
need to be immediately disseminated.
· Project Change Request- If it is determined the scope of the
project needs to be adjusted, a project change request must be
made. The change request process requires a memo be sent to
the project manager detailing the change that is required. Once
the change is evaluated and found sustainable by the project
team and manager, the project manager will submit the project
change request form to the project sponsor for final approval.
The project sponsor can accept, reject, or forward it back to the
project manager for review. Once the project change is
submitted there are five outcomes that can occur.
· No change to resources or timeline
· No change to resources, increase in timeline
· Increase to resources, no change in timeline
· Increase to resources, increase in timeline
· Cannot be accommodated
Management Deliverables and Outputs
· Work breakdown structure (WBS)
· Status reports
· Risk reports
· Budget updates
· Schedule updates
14. · Communications to sponsor
· Communication to stakeholders
· Change control requests3.5 Phase 5- Termination
Once the project has concluded and is past the management
phase the project must formally come to an end. With this
formal ending certain actions need to occur to ensure the project
is ended appropriately and future projects can reap the benefits
from the project that has completed. Once all deliverables have
been sufficiently produced, there have been changes in
circumstance, or the project has been deemed a failure the
termination phase will begin.
The termination phase is a means to provide improvements to
the firm’s methodology of project management. By using the
lessons learned, templates, examples, and improved processes
and techniques the process of project management as a whole
can improve.
Termination Activities
· End the project
· Weigh project performance on time
· Weigh project performance on budget
· Weigh project performance on objectives
· Deliverables acceptance
· Project transition
· Administration termination
· Lessons learned
15. · Resource release
· Termination celebration
Termination Deliverables and Outputs
· Final sponsor approval
· Administration project termination documentation
· Lessons learned
· Resource reports
· Peer evaluations
· Any other project documentation developed4.0 Business
Requirements and Rules
Compliance demands can be a daunting subject for both
customers and cloud providers by better understanding
compliance issue and cloud migration phases issue can be
prevented. Cloud computing security and compliance are a
large concern for costumer specifically in the financial industry.
Cloud computing providers shoulder equal responsibility in
regards to security and compliance by having a high quality
security auditors look at the network security and physical
security and restricting user and server functions. For Singh,
Shirah, and Barber Financial Holdings LLC., migrating their
services to a cloud provider will provide the flexibility to
continue to grow while staying in compliance and ensuring
customer data security. 4.3 Use case scenarios
The process of migration of the database into the cloud involves
3 main stages:
16. 1. Building the necessary infrastructure to be used, so as to be
able to accommodate the rise in number of the customer’s
transactions and also increase in data quantity.
1. Identifying the possible risks that might occur and how to
prevent them.
1. Migration of the financial data into the cloud.
Out of the above main steps we are able to derive the use-cases
in the project.
USE-CASE NAME
USE CASE DESCRIPTION
PARTICIPATION ACTORS AND ROLES
Building the IT infrastructure
The use-case describes putting in place the relevant structures
to accommodate the new technology of cloud computing
· IT Team (internal)
· Database manager (internal)
Putting in place the relevant security measures to curb the risks
that might occur
The use-case describes the risks that might occur with adoption
of the new technology
· IT Team (internal)
· Database manager (internal)
Migrating the financial data (old database) into cloud
The use-case describes how data is transferred into the cloud
17. · Database manager (internal)
· IT Team (internal)
Planning the expansion and widening the IT infrastructure
The use-case describes the process of planning the expansion
and widening the IT infrastructure
· Database manager (internal)
· IT Team (internal))4.3.1 Building the Relevant Infrastructure
Use-case name
Building the IT infrastructure
Use-case id
1
priority
high
source
Requirement analysis
Primary business actor
Database manager and IT Team
Other participating actors
N/A
Other interested shareholders
The management
Description
It provides a description of the process of building the
necessary infrastructure to accommodate the new technology in
18. Singh, Shiraz, and Barber Financial Holdings LLC
Precondition
There must be previous data and increase number of
transactions.
Trigger
Its initiated when the rise in number of customers become high
to be handled by the available database
Typical causes of the events
Step 1: The database manager highlights what need to be added
in the firm
Response: Purchase of the relevant equipment that can handle
the new Technology
Step 2: IT Team approves whether the proposed equipment’s
can be able to handle or accommodate the new technology
Response: The database is ready to be migrated to the cloud
Alternate causes
Increased number of transactions
Conclusion
IT infrastructure building concludes and the system is ready to
be migrated
Post-condition
The IT infrastructure is ready to accommodate new technology
Business rules
The equipment proposed must be adequate and able to
accommodate
19. Assumptions
N/A
Implementation constraints and specifications
N/A4.3.2 Putting in Place Relevant Security Measures
Use-case name
Putting in place relevant security measures
Use-case id
2
priority
high
source
Requirement analysis
Primary business actor
IT Team and database manager
Other participating actors
N/A
Other interested shareholders
N/A
Description
The risk identified can occur with new technology to be adopted
Precondition
With the new technology, there must be possible risks
Trigger
The use-case is initiated by the fact that even upon adopting
20. cloud computing there must be some risks associated with it
Typical causes of the events
Step 1: possible risks are identified by the IT Team with the
help of the database manager
Response: Necessary measures to curb the risks are put in place
before migration is done.
Alternate causes
Previous occurrence of such risks
conclusion
With the new measures put in place, the occurrence of the
identified risks chances is minimal
Post-condition
The system itself can be able to handle most of the identified
risks
Business rules
The system can be able to handle and avoid the risks
Assumptions
N/A
Implementation constraints and specifications
N/A4.3.3 Migrating the Database into the Cloud
Use-case name
Database migration
Use-case id
3
21. priority
high
source
Requirement analysis
Primary business actor
IT Team and database manager
Other participating actors
N/A
Other interested shareholders
The authority
Description
Use-case describes the process of migrating the database into
the cloud
Precondition
The proposed infrastructure is to be able to handle the new
technology and also be able to take care of the possible risks
occurrence
Trigger
The need for the firm to grow and adopt new technology and be
able to handle the rise in number of the customer’s transactions
Typical causes of the events
Step 1: Migrating the database into the cloud
Response : The new database is transferred into the cloud
Alternate causes
22. N/A
conclusion
The new database concludes that it’s able to handle rise in
number of transactions and be able to curb the risks associated
with the cloud computing.
Post-condition
The data is stored and updated in the cloud
Business rules
All transactions history can be retrieved from the cloud
Assumptions
N/A
Implementation constraints and specifications
N/A
Logical ERD Diagram
Physical ERD Diagram
23. UML Use Case 1 Diagram
UML Use Case 2 Diagram
UML Use Case 3 Diagram