ITSP #2 Assignment Hints
First, you will revise ITSP #1’s assignment with my feedback and it will precede ITSP #2’s assignment, on the same document.
IT Strategies: There will be a minimum of one internal IT strategy and two business-enabling IT strategies. They will not be the same organizational strategic objectives you used for the ITSP #1 assignment, nor are they the completion of any of the systems in the IT Portfolio unless you justify how they align to the corporate strategic business objectives. To make it very clear, discuss the relationship between the strategies you present with the corporate strategic business objectives. Discuss how they will benefit RR and any external customers or processes. (Per the assignment, internal and external strategies are discussed in Chapter 9. For an explanation of internal and external IT strategies, see the portion of the text just prior to Table 9.2). Discuss how they relate to your IT vision and advance how RR uses IT (How does it enhance RR’s operations? How is RR becoming more effective in their operations, how are they becoming more efficient and productive through the use of IT? What are the CIO and staff doing to put IT to better use?)
IT Portfolio: This must include the systems in the Inventory of Current IT Projects from the ITSP #1 assignment and the proposed project you will present in the next section. Utilize the table that is provided and list the projects by functional area.
Proposed Project: This will not be any of the projects presented in the Current Inventory of IT Projects from the ITSP #1 assignment. You can scrap a current system (Fleet Maintenance, Route Optimization/Freight Tracking) and integrate a new solution, but considerable thought should be made prior to making that decision. It can be a new solution not being covered in the Current Inventory of IT Projects. The project must support either the internal IT or business-enabling strategy presented in section #1 of this assignment. (You can propose a specific vendor package though it is not necessary. However, if you are incorporating an integrated solution, you should discuss the various features of the package that are appropriate for the study.
Solution
s such as backups, training of employees, utilizing social media and involving Human Resources are not appropriate solutions for this assignment.) To ensure you are on the right track, explain the relationship between your proposed project andthe internal IT/business-enabling strategy.
· How Inventory System Software Can Help Reduce Costs – BusinessBee, S. Teczar:http://www.businessbee.com/resources/operations/how-inventory-system-software-can-help-reduce-costs/
· Axon - Trucking Software: http://www.axonsoftware.com/
· Cheetah.com, Delivery and LTL Software | Cheetah Software Systems: http://www.cheetah.com
Risk Management: Explain how the risk you present relates to the case study to ensure your risk information relates to the case study facts.
· R.
CIO Organization Memo HintsIntroduction and Purpose Note the p.docxchristinemaritza
CIO Organization Memo Hints
Introduction and Purpose: Note the purpose of the memo along with corporate financial objectives.
Leadership Philosophy: Discuss both (1) leadership philosophy and (2) management style of the CIO. Leadership: authoritarian, participative, delegative, and others are examples. Incorporate business strategic objectives, RR’s current IT Portfolio and role of the Governance Board in these projects.
· Leadership Philosophy, Kelly Murray: http://www.polk.amedd.army.mil/docs/Leadership_Philosophy.pdf
· The Leadership Philosophy of 3 P’s: Passion, Purpose, People: http://www.huffingtonpost.com/ekaterina-walter/the-leadership-philosophy_b_4393874.html
· Leadership Philosophy, J. Byrne: http://www.largo.com/egov/gallery/1183485474_176666.pdf
Internal IT Strategies: Your five internal IT strategies (one from Part 2 of your IT Strategic Plan and four more added with this assignment) must also have a minimum of one example of improving the organization’s effectiveness through each of the three elements of people, process and technology. They will not include completion of planned systems or the names of the systems unless you justify how these will improve current processes/systems. These should not be the business strategic objectives from the ITSP #1 assignment.
Some good examples include: better organization of the IT department, transforming it into a CIO organization; refresh/improve the IT infrastructure for RR (similar to above); incorporating governance, prioritize the governance system and projects; process improvements; alignment of IT goals with organization; determine appropriate hardware and back-end software; disaster recovery plan creation; prioritize security needs/plans (including personnel and data); outsource any potential services; increase IT staff; improve product labeling (RFID technology); staff development/training of employees; improve help-desk software and adequacy of personnel; more effective interaction/communication between terminal managers and IT Department; implement SDLC; implement a website for RR; online applications; ensure solutions are meeting business goals; software refresh; automation of inventory; maintain a reliable network; implement redundancy into our architecture (to better ensure backup as part of the BCP; replace outdated hardware; maintain standard operating procedures; cross-training opportunities for IT staff; utilize feedback in decision-making; review current business trends to ensure RR is providing innovative solutions to remain competitive; improve performance of application developers; review current systems to ensure they are meeting needs of the company now and in the future; consider COTS solutions to save developer/programming time; ensure data infrastructure is meeting operational needs; provide network with 24x7x365 availability; create and utilize metrics to gauge success of IT projects; expand web-based applications; implement work orders/help ticke ...
IT Strategic Plan, Part 1Using the case provided, analyze the busi.docxlmelaine
IT Strategic Plan, Part 1
Using the case provided, analyze the business environment described to develop Part 1 of an IT Strategic Plan. Identify the business’ strategic objectives, develop an IT mission and vision for the organization, describe an appropriate governance process, and provide an inventory of the organization’s current IT projects. Your analysis will be presented in a short paper that follows the outline provided, using Microsoft Word, or in a format that can be read using MS Word.
Case Study: Wobbly Wheels (WW) Distribution Company
Overview
WW is a regional transportation and distribution company in operation for over 60 years. The company serves major cities in the Mid-Atlantic region. They are headquartered in Wilmington, Delaware and have a staff of 400 employees including truck drivers. There are 6 distribution terminals (Philadelphia PA, Baltimore MD, New York City, Washington DC, Newark NJ and Wilmington DE) for consolidating freight, and 100 delivery vehicles including 20 tractor/semi-trailer units, 40 box trucks and 40 panel vans.
The company operates in a highly competitive business environment. Growth has been stagnant because of a slow economy. John, the president of the company, would like to see growth at 5% per year. He would also like to see expenses cut by 5% to help fund new initiatives. Current revenue is about $39 million a year with profit running at 4%.
Current Business Operations
WW operates 24 hours a day, 7 days a week. Sales personnel (12 people, two per terminal) visit prospective customers to outline company capability, services provided and costs. When a customer decides to use WW they call the dispatch office with shipment information. Usually they FAX a copy of the bill (s) of lading to a terminal with information such as origin, destination, product description, weight and number of packages.
A dispatcher at a terminal makes a list of freight pickups and sends a truck to get the freight. To do this they use the routing system to determine the sequence of pickups by zip code. They use local maps within a zip code to map out the specific order of pickups since there may be several in a zip code area. They have a performance goal of 98% of freight picked up within 24 hours of availability.
A driver follows the dispatch order for pickups. Many of the drivers complain that the pickup order is not efficient. When they pick up an order they sign for receipt and either load the freight or guide the customer’s forklift operators to arrange it properly in the truck.
After freight is picked up it is brought to the terminal where it is unloaded and sorted by destination. A dispatcher then prepares a delivery ticket (again using the routing system) that is used to load a truck in the proper sequence for delivery. Some trucks take freight from one terminal to another while others make local deliveries. About half of a terminal’s space is used on any given night. Dispatchers have a goal to turn freight around.
IT Strategic Plan, Part 2Using the case provided, build on Part .docxlmelaine
IT Strategic Plan, Part 2
Using the case provided, build on Part 1 of your IT Strategic Plan, and develop Part 2. Develop IT strategies to align to the business strategies, complete a roadmap of the current IT projects, propose a new IT project to support the IT strategies, identify risks associated with the IT projects, and explain the steps required to develop a business continuity plan for the most important IT systems. Your analysis will be presented in a short paper that follows the outline provided, using Microsoft Word, or in a format that can be read using MS Word.
Case Study: Wobbly Wheels (WW) Distribution Company
Overview
WW is a regional transportation and distribution company in operation for over 60 years. The company serves major cities in the Mid-Atlantic region. They are headquartered in Wilmington, Delaware and have a staff of 400 employees including truck drivers. There are 6 distribution terminals (Philadelphia PA, Baltimore MD, New York City, Washington DC, Newark NJ and Wilmington DE) for consolidating freight, and 100 delivery vehicles including 20 tractor/semi-trailer units, 40 box trucks and 40 panel vans.
The company operates in a highly competitive business environment. Growth has been stagnant because of a slow economy. John, the president of the company, would like to see growth at 5% per year. He would also like to see expenses cut by 5% to help fund new initiatives. Current revenue is about $39 million a year with profit running at 4%.
Current Business Operations
WW operates 24 hours a day, 7 days a week. Sales personnel (12 people, two per terminal) visit prospective customers to outline company capability, services provided and costs. When a customer decides to use WW they call the dispatch office with shipment information. Usually they FAX a copy of the bill (s) of lading to a terminal with information such as origin, destination, product description, weight and number of packages.
A dispatcher at a terminal makes a list of freight pickups and sends a truck to get the freight. To do this they use the routing system to determine the sequence of pickups by zip code. They use local maps within a zip code to map out the specific order of pickups since there may be several in a zip code area. They have a performance goal of 98% of freight picked up within 24 hours of availability.
A driver follows the dispatch order for pickups. Many of the drivers complain that the pickup order is not efficient. When they pick up an order they sign for receipt and either load the freight or guide the customer’s forklift operators to arrange it properly in the truck.
After freight is picked up it is brought to the terminal where it is unloaded and sorted by destination. A dispatcher then prepares a delivery ticket (again using the routing system) that is used to load a truck in the proper sequence for delivery. Some trucks take freight from one terminal to another while others make local deliveries. About half of a terminal’s sp.
672015 1 Case Study Rusty Rims (RR) Distribution Co.docxalinainglis
6/7/2015 1
Case Study: Rusty Rims (RR) Distribution Company
Overview
RR is a regional transportation and distribution company in operation for over 60 years. The company
serves major cities in the Mid-Atlantic region. They are headquartered in Wilmington, Delaware and
have a staff of 400 employees including truck drivers. There are 6 distribution terminals (Philadelphia
PA, Baltimore MD, New York City, Washington DC, Newark NJ and Wilmington DE) for consolidating
freight, and 100 delivery vehicles including 20 tractor/semi-trailer units, 40 box trucks and 40 panel
vans.
The company operates in a highly competitive business environment. Growth has been stagnant
because of a slow economy. John, the president of the company, would like to see growth at 5% per
year. He would also like to see expenses cut by 5% to help fund new initiatives. Current revenue is about
$39 million a year with profit running at 4%.
To familiarize yourself with commonly-used shipping terms in the freight industry, visit this site and refer
to it as you read the case study and assignments:
http://www.shipnorthamerica.com/htmfiles/glossary/gloss_shipterms.html
Current Business Operations
RR operates 24 hours a day, 7 days a week. Sales personnel (12 people, two per terminal) visit
prospective customers to outline company capability, services provided and costs. When a customer
decides to use RR they call the dispatch office with shipment information. Usually they FAX a copy of the
bill (s) of lading to a terminal with information such as origin, destination, product description, weight
and number of packages.
A dispatcher at a terminal makes a list of freight pickups and sends a truck to get the freight. To do this
they use the routing system to determine the sequence of pickups by zip code. They use local maps
within a zip code to map out the specific order of pickups since there may be several in a zip code area.
They have a performance goal of 98% of freight picked up within 24 hours of availability.
A driver follows the dispatch order for pickups. Many of the drivers complain that the pickup order is not
efficient. When they pick up an order they sign for receipt and either load the freight or guide the
customer’s forklift operators to arrange it properly in the truck.
After freight is picked up it is brought to the terminal where it is unloaded and sorted by destination. A
dispatcher then prepares a delivery ticket (again using the routing system) that is used to load a truck in
the proper sequence for delivery. Some trucks take freight from one terminal to another while others
make local deliveries. About half of a terminal’s space is used on any given night. Dispatchers have a
goal to turn freight around in the terminal overnight for next day delivery.
When freight is sent out for delivery, the driver follows the delivery ticket order. Often they are held up
at a delivery destination by.
592019 1 Case Study KY LOGISTICS & DISTRIBUTION COM.docxtroutmanboris
5/9/2019 1
Case Study: KY LOGISTICS & DISTRIBUTION COMPANY (KYLOD)
Overview
KYLOD is a regional transportation and distribution company in operation for over 40 years. The
company serves major cities in the US’s Midwest region. They are headquartered in Chicago, Illinois and
have a staff of 700 employees including truck drivers. There are six distribution terminals (Chicago IL,
Milwaukee WI, Green Bay Wi, Fort Wayne IN, Indianapolis IN and Grand Rapids MI) for consolidating
freight, and 200 delivery vehicles including 40 tractor/semi-trailer units, 80 box trucks and 80 panel
vans.
The company operates in a highly competitive business environment. Growth has been stagnant
because of a slow economy. Kevin, the president of the company, would like to see growth at 6% per
year. He would also like to see expenses cut by 6% to help fund new initiatives. Current revenue is about
$42 million a year with profit running at 5%.
To familiarize yourself with commonly-used shipping terms in the freight industry, visit this site and refer
to it as you read the case study and assignments:
http://www.shipnorthamerica.com/htmfiles/glossary/gloss_shipterms.html
Current Business Operations
KYLOD operates 24 hours a day, 7 days a week. Sales personnel (10 people, two per terminal) visit
prospective customers to outline company capability, services provided and costs. When a customer
decides to use KYLOD they call the dispatch office with shipment information. Usually they FAX a copy of
the bill(s) of lading to a terminal with information such as origin, destination, product description,
weight and number of packages.
A dispatcher at a terminal makes a list of freight pickups and sends a truck to get the freight. To do this
they use the routing system to determine the sequence of pickups by zip code. They use local maps
within a zip code to map out the specific order of pickups since there may be several in a zip code area.
They have a performance goal of 98% of freight picked up within 24 hours of availability.
A driver follows the dispatch order for pickups. Many of the drivers complain that the pickup order is not
efficient. When they pick up an order they sign for receipt and either load the freight or guide the
customer’s forklift operators to arrange it properly in the truck.
After freight is picked up it is brought to the terminal where it is unloaded and sorted by destination. A
dispatcher then prepares a delivery ticket (again using the routing system) that is used to load a truck in
the proper sequence for delivery. Some trucks take freight from one terminal to another while others
make local deliveries. About half of a terminal’s space is used on any given night. Dispatchers have a
goal to turn freight around in the terminal overnight for next day delivery.
When freight is sent out for delivery, the driver follows the delivery ticket order. Often, they are held up
at a delive.
2262014 1 Case Study Wobbly Wheels (WW) Distributio.docxeugeniadean34240
2/26/2014 1
Case Study: Wobbly Wheels (WW) Distribution Company
Overview
WW is a regional transportation and distribution company in operation for over 60 years. The company
serves major cities in the Mid-Atlantic region. They are headquartered in Wilmington, Delaware and
have a staff of 400 employees including truck drivers. There are 6 distribution terminals (Philadelphia
PA, Baltimore MD, New York City, Washington DC, Newark NJ and Wilmington DE) for consolidating
freight, and 100 delivery vehicles including 20 tractor/semi-trailer units, 40 box trucks and 40 panel
vans.
The company operates in a highly competitive business environment. Growth has been stagnant
because of a slow economy. John, the president of the company, would like to see growth at 5% per
year. He would also like to see expenses cut by 5% to help fund new initiatives. Current revenue is about
$39 million a year with profit running at 4%.
Current Business Operations
WW operates 24 hours a day, 7 days a week. Sales personnel (12 people, two per terminal) visit
prospective customers to outline company capability, services provided and costs. When a customer
decides to use WW they call the dispatch office with shipment information. Usually they FAX a copy of
the bill (s) of lading to a terminal with information such as origin, destination, product description,
weight and number of packages.
A dispatcher at a terminal makes a list of freight pickups and sends a truck to get the freight. To do this
they use the routing system to determine the sequence of pickups by zip code. They use local maps
within a zip code to map out the specific order of pickups since there may be several in a zip code area.
They have a performance goal of 98% of freight picked up within 24 hours of availability.
A driver follows the dispatch order for pickups. Many of the drivers complain that the pickup order is not
efficient. When they pick up an order they sign for receipt and either load the freight or guide the
customer’s forklift operators to arrange it properly in the truck.
After freight is picked up it is brought to the terminal where it is unloaded and sorted by destination. A
dispatcher then prepares a delivery ticket (again using the routing system) that is used to load a truck in
the proper sequence for delivery. Some trucks take freight from one terminal to another while others
make local deliveries. About half of a terminal’s space is used on any given night. Dispatchers have a
goal to turn freight around in the terminal overnight for next day delivery.
When freight is sent out for delivery, the driver follows the delivery ticket order. Often they are held up
at a delivery destination by traffic or by lack of available unloading space. This can cause the driver to be
late trying to make the day’s deliveries. Sometimes they get to a destination and the facility is closed
and they bring the freight back to the term.
Case StudyFrancisco LeonGrantham University.docxrobert345678
Case Study
Francisco Leon
Grantham University
LOG456 Emerging Trend Supply Chain
Instructor:
Due Date:12/20/2022
CASE QUESTIONS
1. What factors help to explain why J&J historically had as many as 12 distribution centers in Europe?
· In the past, Johnson & Johnson had as many as 12 distribution centers in Europe. This was because they focused on meeting their European customers' needs and service expectations. The company emphasizes keeping a high level of service by giving customers one-day and two-day delivery. It also cuts down on time it takes to place an order and get a shipment to its destination.
2. What steps in the supply chain network design process discussed in this chapter would have been most relevant to the task faced by J&J in Europe?
These steps would have helped J&J make a good design for its supply chain network.
1. Business development and resource allocation: They can look at business data and determine what resources will be needed and how to get them and use them on time. This includes finding out what customers want and taking environmental factors into account. So, to grow their business, they need to hire more people, analyze data, and set goals. Once this is done, they can start building a team and figuring out their plans.
2. Network optimization software can help them reduce the number of distribution centers. They can also plan an audit of their supply chain, which wallow help them find places to cut costs.
3. Model baseline scenario
As is—simulate transportation in and out, build and simulate business scenarios, create an econometric financial model, and develop assumptions and constraints for the infrastructure.
4. Coming up with a plan
Defining the main scenario to be evaluated, simulating inventory assets by plan, representing operating, capital, and one-time expenses, developing a financial model by design, and addressing IT, tax, incentive, legal, and infrastructure issues. Develop a plan for transition and implementation, including a timeline, resources, funds, structure, limitations, partners, stakeholders, and a communication strategy.
3. Are there other factors that the network optimization study should have considered?
· Essential things to consider are how close you are to your customers and how much money it will cost you to get there from where you are right now. These are the factors that are most important to consider. These are the two aspects that constitute the most important aspects to take into consideration. Because the frameworks have already been established, every phase that is still to come may have already been planned out. The corporation has significant data about the costs associated with the land and the utilities. In addition to the information it possesses regarding the labor market and the supplier network, this is another area in which it excels. The company will only need to make modifications to the components of the logistics network that are the mos.
Running Head WOBBLY WHEELS DISTRIBUTION COMPANY1WOBBLY WHEELS .docxagnesdcarey33086
Running Head: WOBBLY WHEELS DISTRIBUTION COMPANY 1
WOBBLY WHEELS DISTRIBUTION COMPANY 7
Wobbly Wheels Distribution Company
Richard Kennedy
Case Study
Institution
6/1/2014
Part 1
Business environment
Business environment refers to both internal and external factors which affect the operations of a given business or organizational entity (Fernando, 2011). Wobbly Wheels Distribution Company is a distribution and transportation company that serves major cities in the mid-Atlantic region. It is located in Wilmington, Delaware and boosts of more than 400 employees. The company has 6 distribution channels for consolidating freight and 100 delivery vehicles. The business environment is highly competitive and there has been stagnant growth due to a slow economy. The president of the company wishes to reduce the expenses by 5% and set growth at 5% in order to fund new initiatives.
According to Wobbly Wheels (WW) Distribution Company, their environment of operation is affected by several other business environment factors. In developing an efficient IT strategic plan, the company has to evaluate various results such a development may bring to the firm.
In developing a new IT strategic plan, Wobbly Wheels Distribution Company will have to consider the effects on its personnel. The new plan must be a morale booster rather than a demoralizing tool to the customers. The drivers are the most outspoken and good ambassadors to the company and the new system should provide them with an extra motivation.
The company also considers the legal factors in their operations. This involves ensuring compliance with the set federal and state laws whereby the ones given foremost attention are: the Sarbanes Oxley financial audit, a federal requiring that vehicles go through a safety check every 10,000 miles and finally an FCC reporting requirement which requires statements on the number of hours each driver is involved in the company’s operations.
In developing a new IT strategic plan, the company should consider the technological implications of the system. The two-way radio that is used as a mode of communication between the dispatchers at the terminals and the drivers usually has low power which may result in relatively short range compared to other high power radios. Also the further apart the users are the higher the possibility of harmful interferences e.g. a nearby PMR446 walkie-talkie may unknowingly block the lines thus interfering with communication.
Business strategic objective
A business strategic objective refers to the goals set by an organization or a business entity whose fulfillment is deemed as appropriate by the business. (Kelly, 2006)
Wobbly Wheels Distribution Company has set various strategic objectives. One of their main objectives is providing their customers with warehousing services as this will go a long way in reducing their customers’ delivery time since their products will be available locally. Another objective is improving the.
CIO Organization Memo HintsIntroduction and Purpose Note the p.docxchristinemaritza
CIO Organization Memo Hints
Introduction and Purpose: Note the purpose of the memo along with corporate financial objectives.
Leadership Philosophy: Discuss both (1) leadership philosophy and (2) management style of the CIO. Leadership: authoritarian, participative, delegative, and others are examples. Incorporate business strategic objectives, RR’s current IT Portfolio and role of the Governance Board in these projects.
· Leadership Philosophy, Kelly Murray: http://www.polk.amedd.army.mil/docs/Leadership_Philosophy.pdf
· The Leadership Philosophy of 3 P’s: Passion, Purpose, People: http://www.huffingtonpost.com/ekaterina-walter/the-leadership-philosophy_b_4393874.html
· Leadership Philosophy, J. Byrne: http://www.largo.com/egov/gallery/1183485474_176666.pdf
Internal IT Strategies: Your five internal IT strategies (one from Part 2 of your IT Strategic Plan and four more added with this assignment) must also have a minimum of one example of improving the organization’s effectiveness through each of the three elements of people, process and technology. They will not include completion of planned systems or the names of the systems unless you justify how these will improve current processes/systems. These should not be the business strategic objectives from the ITSP #1 assignment.
Some good examples include: better organization of the IT department, transforming it into a CIO organization; refresh/improve the IT infrastructure for RR (similar to above); incorporating governance, prioritize the governance system and projects; process improvements; alignment of IT goals with organization; determine appropriate hardware and back-end software; disaster recovery plan creation; prioritize security needs/plans (including personnel and data); outsource any potential services; increase IT staff; improve product labeling (RFID technology); staff development/training of employees; improve help-desk software and adequacy of personnel; more effective interaction/communication between terminal managers and IT Department; implement SDLC; implement a website for RR; online applications; ensure solutions are meeting business goals; software refresh; automation of inventory; maintain a reliable network; implement redundancy into our architecture (to better ensure backup as part of the BCP; replace outdated hardware; maintain standard operating procedures; cross-training opportunities for IT staff; utilize feedback in decision-making; review current business trends to ensure RR is providing innovative solutions to remain competitive; improve performance of application developers; review current systems to ensure they are meeting needs of the company now and in the future; consider COTS solutions to save developer/programming time; ensure data infrastructure is meeting operational needs; provide network with 24x7x365 availability; create and utilize metrics to gauge success of IT projects; expand web-based applications; implement work orders/help ticke ...
IT Strategic Plan, Part 1Using the case provided, analyze the busi.docxlmelaine
IT Strategic Plan, Part 1
Using the case provided, analyze the business environment described to develop Part 1 of an IT Strategic Plan. Identify the business’ strategic objectives, develop an IT mission and vision for the organization, describe an appropriate governance process, and provide an inventory of the organization’s current IT projects. Your analysis will be presented in a short paper that follows the outline provided, using Microsoft Word, or in a format that can be read using MS Word.
Case Study: Wobbly Wheels (WW) Distribution Company
Overview
WW is a regional transportation and distribution company in operation for over 60 years. The company serves major cities in the Mid-Atlantic region. They are headquartered in Wilmington, Delaware and have a staff of 400 employees including truck drivers. There are 6 distribution terminals (Philadelphia PA, Baltimore MD, New York City, Washington DC, Newark NJ and Wilmington DE) for consolidating freight, and 100 delivery vehicles including 20 tractor/semi-trailer units, 40 box trucks and 40 panel vans.
The company operates in a highly competitive business environment. Growth has been stagnant because of a slow economy. John, the president of the company, would like to see growth at 5% per year. He would also like to see expenses cut by 5% to help fund new initiatives. Current revenue is about $39 million a year with profit running at 4%.
Current Business Operations
WW operates 24 hours a day, 7 days a week. Sales personnel (12 people, two per terminal) visit prospective customers to outline company capability, services provided and costs. When a customer decides to use WW they call the dispatch office with shipment information. Usually they FAX a copy of the bill (s) of lading to a terminal with information such as origin, destination, product description, weight and number of packages.
A dispatcher at a terminal makes a list of freight pickups and sends a truck to get the freight. To do this they use the routing system to determine the sequence of pickups by zip code. They use local maps within a zip code to map out the specific order of pickups since there may be several in a zip code area. They have a performance goal of 98% of freight picked up within 24 hours of availability.
A driver follows the dispatch order for pickups. Many of the drivers complain that the pickup order is not efficient. When they pick up an order they sign for receipt and either load the freight or guide the customer’s forklift operators to arrange it properly in the truck.
After freight is picked up it is brought to the terminal where it is unloaded and sorted by destination. A dispatcher then prepares a delivery ticket (again using the routing system) that is used to load a truck in the proper sequence for delivery. Some trucks take freight from one terminal to another while others make local deliveries. About half of a terminal’s space is used on any given night. Dispatchers have a goal to turn freight around.
IT Strategic Plan, Part 2Using the case provided, build on Part .docxlmelaine
IT Strategic Plan, Part 2
Using the case provided, build on Part 1 of your IT Strategic Plan, and develop Part 2. Develop IT strategies to align to the business strategies, complete a roadmap of the current IT projects, propose a new IT project to support the IT strategies, identify risks associated with the IT projects, and explain the steps required to develop a business continuity plan for the most important IT systems. Your analysis will be presented in a short paper that follows the outline provided, using Microsoft Word, or in a format that can be read using MS Word.
Case Study: Wobbly Wheels (WW) Distribution Company
Overview
WW is a regional transportation and distribution company in operation for over 60 years. The company serves major cities in the Mid-Atlantic region. They are headquartered in Wilmington, Delaware and have a staff of 400 employees including truck drivers. There are 6 distribution terminals (Philadelphia PA, Baltimore MD, New York City, Washington DC, Newark NJ and Wilmington DE) for consolidating freight, and 100 delivery vehicles including 20 tractor/semi-trailer units, 40 box trucks and 40 panel vans.
The company operates in a highly competitive business environment. Growth has been stagnant because of a slow economy. John, the president of the company, would like to see growth at 5% per year. He would also like to see expenses cut by 5% to help fund new initiatives. Current revenue is about $39 million a year with profit running at 4%.
Current Business Operations
WW operates 24 hours a day, 7 days a week. Sales personnel (12 people, two per terminal) visit prospective customers to outline company capability, services provided and costs. When a customer decides to use WW they call the dispatch office with shipment information. Usually they FAX a copy of the bill (s) of lading to a terminal with information such as origin, destination, product description, weight and number of packages.
A dispatcher at a terminal makes a list of freight pickups and sends a truck to get the freight. To do this they use the routing system to determine the sequence of pickups by zip code. They use local maps within a zip code to map out the specific order of pickups since there may be several in a zip code area. They have a performance goal of 98% of freight picked up within 24 hours of availability.
A driver follows the dispatch order for pickups. Many of the drivers complain that the pickup order is not efficient. When they pick up an order they sign for receipt and either load the freight or guide the customer’s forklift operators to arrange it properly in the truck.
After freight is picked up it is brought to the terminal where it is unloaded and sorted by destination. A dispatcher then prepares a delivery ticket (again using the routing system) that is used to load a truck in the proper sequence for delivery. Some trucks take freight from one terminal to another while others make local deliveries. About half of a terminal’s sp.
672015 1 Case Study Rusty Rims (RR) Distribution Co.docxalinainglis
6/7/2015 1
Case Study: Rusty Rims (RR) Distribution Company
Overview
RR is a regional transportation and distribution company in operation for over 60 years. The company
serves major cities in the Mid-Atlantic region. They are headquartered in Wilmington, Delaware and
have a staff of 400 employees including truck drivers. There are 6 distribution terminals (Philadelphia
PA, Baltimore MD, New York City, Washington DC, Newark NJ and Wilmington DE) for consolidating
freight, and 100 delivery vehicles including 20 tractor/semi-trailer units, 40 box trucks and 40 panel
vans.
The company operates in a highly competitive business environment. Growth has been stagnant
because of a slow economy. John, the president of the company, would like to see growth at 5% per
year. He would also like to see expenses cut by 5% to help fund new initiatives. Current revenue is about
$39 million a year with profit running at 4%.
To familiarize yourself with commonly-used shipping terms in the freight industry, visit this site and refer
to it as you read the case study and assignments:
http://www.shipnorthamerica.com/htmfiles/glossary/gloss_shipterms.html
Current Business Operations
RR operates 24 hours a day, 7 days a week. Sales personnel (12 people, two per terminal) visit
prospective customers to outline company capability, services provided and costs. When a customer
decides to use RR they call the dispatch office with shipment information. Usually they FAX a copy of the
bill (s) of lading to a terminal with information such as origin, destination, product description, weight
and number of packages.
A dispatcher at a terminal makes a list of freight pickups and sends a truck to get the freight. To do this
they use the routing system to determine the sequence of pickups by zip code. They use local maps
within a zip code to map out the specific order of pickups since there may be several in a zip code area.
They have a performance goal of 98% of freight picked up within 24 hours of availability.
A driver follows the dispatch order for pickups. Many of the drivers complain that the pickup order is not
efficient. When they pick up an order they sign for receipt and either load the freight or guide the
customer’s forklift operators to arrange it properly in the truck.
After freight is picked up it is brought to the terminal where it is unloaded and sorted by destination. A
dispatcher then prepares a delivery ticket (again using the routing system) that is used to load a truck in
the proper sequence for delivery. Some trucks take freight from one terminal to another while others
make local deliveries. About half of a terminal’s space is used on any given night. Dispatchers have a
goal to turn freight around in the terminal overnight for next day delivery.
When freight is sent out for delivery, the driver follows the delivery ticket order. Often they are held up
at a delivery destination by.
592019 1 Case Study KY LOGISTICS & DISTRIBUTION COM.docxtroutmanboris
5/9/2019 1
Case Study: KY LOGISTICS & DISTRIBUTION COMPANY (KYLOD)
Overview
KYLOD is a regional transportation and distribution company in operation for over 40 years. The
company serves major cities in the US’s Midwest region. They are headquartered in Chicago, Illinois and
have a staff of 700 employees including truck drivers. There are six distribution terminals (Chicago IL,
Milwaukee WI, Green Bay Wi, Fort Wayne IN, Indianapolis IN and Grand Rapids MI) for consolidating
freight, and 200 delivery vehicles including 40 tractor/semi-trailer units, 80 box trucks and 80 panel
vans.
The company operates in a highly competitive business environment. Growth has been stagnant
because of a slow economy. Kevin, the president of the company, would like to see growth at 6% per
year. He would also like to see expenses cut by 6% to help fund new initiatives. Current revenue is about
$42 million a year with profit running at 5%.
To familiarize yourself with commonly-used shipping terms in the freight industry, visit this site and refer
to it as you read the case study and assignments:
http://www.shipnorthamerica.com/htmfiles/glossary/gloss_shipterms.html
Current Business Operations
KYLOD operates 24 hours a day, 7 days a week. Sales personnel (10 people, two per terminal) visit
prospective customers to outline company capability, services provided and costs. When a customer
decides to use KYLOD they call the dispatch office with shipment information. Usually they FAX a copy of
the bill(s) of lading to a terminal with information such as origin, destination, product description,
weight and number of packages.
A dispatcher at a terminal makes a list of freight pickups and sends a truck to get the freight. To do this
they use the routing system to determine the sequence of pickups by zip code. They use local maps
within a zip code to map out the specific order of pickups since there may be several in a zip code area.
They have a performance goal of 98% of freight picked up within 24 hours of availability.
A driver follows the dispatch order for pickups. Many of the drivers complain that the pickup order is not
efficient. When they pick up an order they sign for receipt and either load the freight or guide the
customer’s forklift operators to arrange it properly in the truck.
After freight is picked up it is brought to the terminal where it is unloaded and sorted by destination. A
dispatcher then prepares a delivery ticket (again using the routing system) that is used to load a truck in
the proper sequence for delivery. Some trucks take freight from one terminal to another while others
make local deliveries. About half of a terminal’s space is used on any given night. Dispatchers have a
goal to turn freight around in the terminal overnight for next day delivery.
When freight is sent out for delivery, the driver follows the delivery ticket order. Often, they are held up
at a delive.
2262014 1 Case Study Wobbly Wheels (WW) Distributio.docxeugeniadean34240
2/26/2014 1
Case Study: Wobbly Wheels (WW) Distribution Company
Overview
WW is a regional transportation and distribution company in operation for over 60 years. The company
serves major cities in the Mid-Atlantic region. They are headquartered in Wilmington, Delaware and
have a staff of 400 employees including truck drivers. There are 6 distribution terminals (Philadelphia
PA, Baltimore MD, New York City, Washington DC, Newark NJ and Wilmington DE) for consolidating
freight, and 100 delivery vehicles including 20 tractor/semi-trailer units, 40 box trucks and 40 panel
vans.
The company operates in a highly competitive business environment. Growth has been stagnant
because of a slow economy. John, the president of the company, would like to see growth at 5% per
year. He would also like to see expenses cut by 5% to help fund new initiatives. Current revenue is about
$39 million a year with profit running at 4%.
Current Business Operations
WW operates 24 hours a day, 7 days a week. Sales personnel (12 people, two per terminal) visit
prospective customers to outline company capability, services provided and costs. When a customer
decides to use WW they call the dispatch office with shipment information. Usually they FAX a copy of
the bill (s) of lading to a terminal with information such as origin, destination, product description,
weight and number of packages.
A dispatcher at a terminal makes a list of freight pickups and sends a truck to get the freight. To do this
they use the routing system to determine the sequence of pickups by zip code. They use local maps
within a zip code to map out the specific order of pickups since there may be several in a zip code area.
They have a performance goal of 98% of freight picked up within 24 hours of availability.
A driver follows the dispatch order for pickups. Many of the drivers complain that the pickup order is not
efficient. When they pick up an order they sign for receipt and either load the freight or guide the
customer’s forklift operators to arrange it properly in the truck.
After freight is picked up it is brought to the terminal where it is unloaded and sorted by destination. A
dispatcher then prepares a delivery ticket (again using the routing system) that is used to load a truck in
the proper sequence for delivery. Some trucks take freight from one terminal to another while others
make local deliveries. About half of a terminal’s space is used on any given night. Dispatchers have a
goal to turn freight around in the terminal overnight for next day delivery.
When freight is sent out for delivery, the driver follows the delivery ticket order. Often they are held up
at a delivery destination by traffic or by lack of available unloading space. This can cause the driver to be
late trying to make the day’s deliveries. Sometimes they get to a destination and the facility is closed
and they bring the freight back to the term.
Case StudyFrancisco LeonGrantham University.docxrobert345678
Case Study
Francisco Leon
Grantham University
LOG456 Emerging Trend Supply Chain
Instructor:
Due Date:12/20/2022
CASE QUESTIONS
1. What factors help to explain why J&J historically had as many as 12 distribution centers in Europe?
· In the past, Johnson & Johnson had as many as 12 distribution centers in Europe. This was because they focused on meeting their European customers' needs and service expectations. The company emphasizes keeping a high level of service by giving customers one-day and two-day delivery. It also cuts down on time it takes to place an order and get a shipment to its destination.
2. What steps in the supply chain network design process discussed in this chapter would have been most relevant to the task faced by J&J in Europe?
These steps would have helped J&J make a good design for its supply chain network.
1. Business development and resource allocation: They can look at business data and determine what resources will be needed and how to get them and use them on time. This includes finding out what customers want and taking environmental factors into account. So, to grow their business, they need to hire more people, analyze data, and set goals. Once this is done, they can start building a team and figuring out their plans.
2. Network optimization software can help them reduce the number of distribution centers. They can also plan an audit of their supply chain, which wallow help them find places to cut costs.
3. Model baseline scenario
As is—simulate transportation in and out, build and simulate business scenarios, create an econometric financial model, and develop assumptions and constraints for the infrastructure.
4. Coming up with a plan
Defining the main scenario to be evaluated, simulating inventory assets by plan, representing operating, capital, and one-time expenses, developing a financial model by design, and addressing IT, tax, incentive, legal, and infrastructure issues. Develop a plan for transition and implementation, including a timeline, resources, funds, structure, limitations, partners, stakeholders, and a communication strategy.
3. Are there other factors that the network optimization study should have considered?
· Essential things to consider are how close you are to your customers and how much money it will cost you to get there from where you are right now. These are the factors that are most important to consider. These are the two aspects that constitute the most important aspects to take into consideration. Because the frameworks have already been established, every phase that is still to come may have already been planned out. The corporation has significant data about the costs associated with the land and the utilities. In addition to the information it possesses regarding the labor market and the supplier network, this is another area in which it excels. The company will only need to make modifications to the components of the logistics network that are the mos.
Running Head WOBBLY WHEELS DISTRIBUTION COMPANY1WOBBLY WHEELS .docxagnesdcarey33086
Running Head: WOBBLY WHEELS DISTRIBUTION COMPANY 1
WOBBLY WHEELS DISTRIBUTION COMPANY 7
Wobbly Wheels Distribution Company
Richard Kennedy
Case Study
Institution
6/1/2014
Part 1
Business environment
Business environment refers to both internal and external factors which affect the operations of a given business or organizational entity (Fernando, 2011). Wobbly Wheels Distribution Company is a distribution and transportation company that serves major cities in the mid-Atlantic region. It is located in Wilmington, Delaware and boosts of more than 400 employees. The company has 6 distribution channels for consolidating freight and 100 delivery vehicles. The business environment is highly competitive and there has been stagnant growth due to a slow economy. The president of the company wishes to reduce the expenses by 5% and set growth at 5% in order to fund new initiatives.
According to Wobbly Wheels (WW) Distribution Company, their environment of operation is affected by several other business environment factors. In developing an efficient IT strategic plan, the company has to evaluate various results such a development may bring to the firm.
In developing a new IT strategic plan, Wobbly Wheels Distribution Company will have to consider the effects on its personnel. The new plan must be a morale booster rather than a demoralizing tool to the customers. The drivers are the most outspoken and good ambassadors to the company and the new system should provide them with an extra motivation.
The company also considers the legal factors in their operations. This involves ensuring compliance with the set federal and state laws whereby the ones given foremost attention are: the Sarbanes Oxley financial audit, a federal requiring that vehicles go through a safety check every 10,000 miles and finally an FCC reporting requirement which requires statements on the number of hours each driver is involved in the company’s operations.
In developing a new IT strategic plan, the company should consider the technological implications of the system. The two-way radio that is used as a mode of communication between the dispatchers at the terminals and the drivers usually has low power which may result in relatively short range compared to other high power radios. Also the further apart the users are the higher the possibility of harmful interferences e.g. a nearby PMR446 walkie-talkie may unknowingly block the lines thus interfering with communication.
Business strategic objective
A business strategic objective refers to the goals set by an organization or a business entity whose fulfillment is deemed as appropriate by the business. (Kelly, 2006)
Wobbly Wheels Distribution Company has set various strategic objectives. One of their main objectives is providing their customers with warehousing services as this will go a long way in reducing their customers’ delivery time since their products will be available locally. Another objective is improving the.
chinabusinessreview.com April–June 2012 13
L
ogistics is an essential component of a successful
deal anywhere in the world, but especially in China
where services offered may not be what they seem.
Global supply chains are easily disrupted when
companies do not consider critical logistics services
or blindly trust their supplier to arrange transportation and the
export of products from China.
To avoid these supply chain traps, consider these nine rules:
1. Carefully select a logistics and .transportation supplier
There are thousands of small logistics companies in China
that advertise as freight forwarders and export trade brokers.
Almost anyone will say they can do this job because they
A carefully selected logistics partner can help companies
overcome their China supply chain challenges.
Nine Rules for Logistics in China
Rosemary Coates
F O C U S : D I S T R I B U T I O N & LO G I S T I C S
Companies in China should select a logistics provider with a global network of offices, standard procedures, and up-to-date information technology systems.
Ch
in
a
Fo
to
P
re
ss
14 April–June 2012 chinabusinessreview.com
have connections to trade services. But so many things can
go wrong and result in supply chain disasters. If a company
cannot get goods to market in time for the season or the
sale, or to meet peak demand, the company’s logistics net-
work has failed.
Small freight forwarders can provide personalized service
when a company needs special care, but they may also add
time and frustration to your supply chain. Because they are
independent businesses, small, independent Chinese forward-
ers rely on a network of agency relationships and one-off
favors to move freight. Essentially, these small forwarders and
brokers are just cargo coordinators. They typically do not
own any of their own equipment, make no investments in
capital equipment or systems, and rely on subcontractors to
provide trucking, air, and ocean freight. Their networks are
only as strong as the weakest link. It is common to see small
forwarders like this in tier-two or tier-three cities, moving
cargo in tricycle carts from manufacturing sites to airports.
Some of these companies also subcontract the preparation of
export documentation, including US Customs’ 10+2 report-
ing—the information now required to be processed before an
ocean shipment, bound for the United States, can leave a for-
eign country—which can cause delays in China if documents
are not properly prepared. Companies should select a freight
forwarder or broker with a global network of company-
owned offices, standard procedures, and information technol-
ogy (IT) systems capabilities that comply with the complicat-
ed export and import regulations.
Global logistics providers that have established offices across
China, such as Expeditors International of Washington, Inc.,
CEVA Logistics, DB Schenker, Kuehne & Nagel International
AG, among others, o ...
SEMESTER PROJECT – PHASE II Introduction to the Company S.docxedgar6wallace88877
SEMESTER PROJECT – PHASE II
Introduction to the Company:
Security Transport Professionals Incorporated (STP), has its home office located in Lexington, Kentucky and in addition has more than 3,000 employees located in each of its branch offices located in Houston, Texas and San Diego, California.
STP is primarily a nationwide freight hauler. Its customer are comprised of major market retailers particularly in the medical and pharmaceutical industry, the federal government, and several state governments. STP operates a fleet of trucks and private cargo planes that it uses to move “goods” belonging to its customers from one destination to another across the continental United States. Its fleet of truck carriers are located in Lexington, Kentucky with it planes located in Louisville, Kentucky.
STP carries and transports highly controlled, narcotics and scheduled prescription drugs, toxic, radioactive, nuclear, and top-secret materials from one facility belonging to its customer to another. The method of transport depends on the type of cargo being hauled. In addition to hauling/forwarding its customers products/goods, STP is required from time to time to store its customer goods for brief periods of time. Two years ago, STP began contracting with a number of subcontractor’s hereafter referred to as either “limited joint partners (LJPs)” or “independent subcontractor alliances (ISAs)” for the purpose of expanding its freight forwarding, storage, and delivery service. Due to the confidential nature of the freight that it transports, STP vets its employees, as well as any subcontractors (LJPs and ISAs) that it engages.
STP’s business objectives and goals include the confidential, safe and secure movement of its customer goods, from the customer/distributor to its client, or from one of its customer’s locations to another of the customer’s locations in a timely and efficient manner using cost effective methods. Alternatively, STP may transfer this responsibility to one of its limited joint partners (LJPs) or independent subcontractor alliances (ISAs), if it is more cost-effective and the income differential is within acceptable limits. There are 3 LJPs with which STP had entered into contracts. LJPs are corporate organizations in the same industry that offer essentially the same services as STP, and who are generally competitors of STP. However, when the job requires resources that exceed those of STP or its competitor, the two will enter into an agreement to jointly undertake the contract together and will together provide the same full range of services, with both entering into the same contract or joint venture with the customer.
Independent subcontractor alliances (ISAs) differ from Limited Joint Partners (LJPs) in that a ISA is not a direct competitor of STP. Rather, the ISA is a company that offers a subset of services to STP, or contracts with STP to provide it with necessary resources to perform the particular job at.
A supply chain consists of all parties involved
directly or indirectly, in fulfilling a customer request. The supply
chain includes not only the manufacturers and suppliers, but also
transporters, workhouse, retailers and even customers
themselves. Within each organization, such as a manufactures,
the supply chain includes all functions involved in receiving and
filling a customer request. These functions include, but are not
limited to, new product development, marketing operations,
distributions, finance, and customer service. Supply chain
management (SCM) is the management of an interconnected or
interlinked between network, channel and node businesses
involved in the provision of product and service packages
required by the end customers in a supply chain. Supply chain
management spans the movement and storage of raw materials,
work-in-process inventory, and finished goods from point of
origin to point of consumption. It is also defined as the "design,
planning, execution, control, and monitoring of supply chain
activities with the objective of creating net value, building a
competitive infrastructure, leveraging worldwide logistics,
synchronizing supply with demand and measuring performance
globally.
Customer satisfaction improves not because goods are more reliable and have fewer defects but because the entire process that the customer experiences from start to finish, from the sales office all the way through delivery and post-sale servicing and technical support, is improved.
Exercise 44. Selecting from Imperfect ApplicantsScenarioThe diBetseyCalderon89
Exercise 44. Selecting from Imperfect Applicants
Scenario
The director of college recruiting for Duro Insurance Company is presently recruiting college students for its administrative trainee program. The one-year training program involves a combination of on-the-job and formal classroom training. Upon successful completion of the training, a candidate is assigned a position as assistant department supervisor.
Duro Insurance Company ranks in the top 15 percent of life insurance companies nationally with in-force insurance in excess of $6 billion. Duro markets all forms of insurance, bonds, and pension products on an individual and group basis. More recently, the company added diversified financial services, including discount brokerage services, real estate financing, and mutual funds. The company is divided into six major divisions: Employee Benefits, Commercial Insurance, Individual Life, Automobile, Homeowners, and Diversified Financial Services and functionally into several major operating departments: Sales, Underwriting, Administrative, Loss Prevention, Actuarial, Claims, Legal, Financial and Investments, Advertising and Public Relations, Personnel, and Research and Policy Development. Duro has over 25,000 employees and more than 300 field offices throughout the country. Management at each field office consists of a manager, several department heads, and their assistants. The company has enjoyed a pattern of steady growth and expansion over the years.
Job Description for Administrative Trainee
Handle day-to-day administration of field office, including direct supervision of office clerks.
Plan and oversee the use of space, furniture, and equipment on a continuing basis and recommend changes as necessary.
Supervise computer processing operations for issuing and servicing insurance policies, including claims.
Implement and maintain accounting and collection procedures. The trainee works closely with the department head in learning these duties.
Job Qualifications
BS/BA with business management background (knowledge of accounting desired).
Ability to communicate effectively.
Ability to handle detail.
Ability to plan and direct activities of subordinate personnel.
Demonstrated leadership potential.
Knowledge of computers and software packages including Microsoft Office.
Additional Job Data
The trainee position reports directly to a department head.
Expected career progression is to assistant department supervisor (1–2 years) and, with continued development, to department head (4–5 years after supervisory assignment).
The position requires relocation.
The company offers competitive salaries and benefits, including a tuition repayment plan and in-house career planning and development.
Exercise 43. Which Selection Procedure Is Most Effective?
objectives
To examine the strengths and weaknesses of four different methods for selecting new employees.
To enhance your oral communication skills.
out-of-class preparation time: 30 mi ...
The document discusses domestic and international logistics and supply chain management. It defines logistics, domestic logistics, and international logistics. Domestic logistics involves distribution within a country while international logistics involves distribution across international borders. Managing logistics internationally is more complex due to factors like multiple transportation options, additional costs like tariffs, and challenges building relationships across countries. The document also discusses transportation types, warehouse types, facility location decisions, and evaluating locations using models like weighted factor and break even.
Gg freight case study grace ijeluumgcgg freightjoney4
GG Freight is a freight company operating in the southwestern US with $35 million in annual revenue. It has eight terminals and 750 employees. The company aims to increase profits to 8% through cost reductions and efficiency gains. The current IT system handles freight tracking, fleet maintenance, finance, and accounting. The new CIO plans to restructure IT as a strategic department to better support the business through initiatives like unified communications, open source software, customer relationship management, and business intelligence.
Sheet1EarthMover ProjectCurrent project has a critical path of 30.docxbjohn46
Sheet1EarthMover Project"Current project has a critical path of 30 days. You must complete the job by at least day 26!"NORMALCRASHActivityTime (weeks)CostBest Time (weeks)Activity Crash Cost ($)Time reduction (weeks)Crash Cost ($/week)A6$ 80,0005$ 20,0001$ 20,000B4$ 100,0004$ - 00C3$ 50,0002$ 50,0001$ 50,000D6$ 150,0003$ 150,0003$ 50,000E3$ 180,0002$ 70,0001$ 70,000F10$ 300,0007$ 180,0003$ 60,000G2$ 100,0002$ - 00H6$ 450,0005$ 350,0001$ 350,000I8$ 350,0004$ 300,0004$ 75,000Goal to complete by:30weeks<---- Change this goal from the currect 30 weeks to the new 26 week target!Objective FunctionThen run SOLVER to find the least expensive way to reach your goal !!!Min cost to CRASH$ - 0Xi = earliest finish time for activity i EF-limitYi = the amount of time activity i is crashed Max crash availableNew timeA6=6A0<=1A6B10=10B0<=0B4C9=9C0<=1C3D16=16D0<=3D6E13=13E0<=1E3F20=20F0<=3F10G22=22G0<=0G2H28=28H0<=1H6I30=30I0<=4I8Note:EF = EF of previous + tNon-negativity constraintsNew t = Original t - CrashNew Finish timeGoalH28<=30I30<=30
KY Logistics & Distribution Company (KYLOD)
IT Strategic Plan for KY Logistics and Distribution Company
Nambo Francis
IFSM 301
ITSP: KY Logistics &Distribution Company
May 31, 2019
May 31.20196
IT strategic plan for KY Logistics and Distribution Company
1. Business Statement - KY Logistics and Distribution Company (KYLOD) is a zonal company which has been offering transportation and services for the past four decades. The company provides its services to major cities in the Midwest region of the United States. Their headquarters is located in Chicago, Illinois. They have a total staff of 700 employees, including all the truck drivers. They have several distribution terminals which are located in Chicago, Milwaukee, Green Bay, Fort Wayne Indianapolis, and Grand Rapids, which help to fuse shipping, they also have vehicles including 40 tractors, 80 box trucks, and 80-panel vans. The company’s line of business is highly competitive, and they have shown slow growth due to a sluggish economy. Kevin, the company president, aspires, to see an increase in the rate of 6% per year. They work 24/7, with their salespersons visiting everywhere to market the company and make quotations. A dispatcher at terminal makes a list of freight pickups and drives and follows the routes making the drops at the respective stoppages. The company is reliable and competent in all their transport and distributive endeavors.
2. Business Strategic Objectives - KYLDO has three particular objectives which it intends to pursue and realize success in the next business year strategically and to give better services to their customers (firstgroupplc.com, 2014). They objectives are discussed below.
Business Strategic Objective 1: Focused and Disciplined Bidding
· The company is willing to be diligent and straightforward in their bargaining for freight transportation prices whenever they have to.
PKI and Encryption at WorkLearning Objectives and Outcomes· De.docxJUST36
PKI and Encryption at Work
Learning Objectives and Outcomes
· Develop a plan to deploy public key infrastructure (PKI) and encryption solutions to protect data and information.
Assignment Requirements
In this assignment, you play the role of chief information technology (IT) security officer for the Quality Medical Company (QMC). QMC is a publicly traded company operating in the pharmaceutical industry.
QMC is expanding its arena of work through an increase in the number of clients and products. The senior management of the company is highly concerned about complying with the multitude of legislative and regulatory laws and issues in place. The company has an internal compliance and risk management team to take care of all the compliance-related issues. The company needs to make important decisions about the bulk of resources they will need to meet the voluminous compliance requirements arising from the multidimensional challenge of expansion.
QMC will be required to conform to the following compliance issues:
· Public-company regulations, such as the Sarbanes-Oxley (SOX) Act
· Regulations affecting financial companies, companies that make loans and charge interest, such as the U.S. Securities and Exchange Commission (SEC) rules and Gramm-Leach-Bliley Act (GLBA)
· Regulations affecting healthcare privacy information, such as Health Insurance Portability and Accountability Act (HIPAA)
· Intellectual Property Law that is important for information asset protection particularly for organizations in the pharmaceutical and technology industry
· Regulations affecting the privacy of information, including personal identification information, such as personally identifiable information (PII) regularly collected from employees, customers, and end users
· Corporate governance policies including disclosures to the board of directors and the auditors and the policies related to human resources, governance, harassment, code of conduct, and ethics
Compliance with regulatory requirements implies encrypting sensitive data at rest (DAR) and allowing access to role-holders in the enterprise who require the access. It also implies that sensitive data in motion (DIM) or data that is being communicated via e-mail, instant message (IM), or even Web e-mail must be suitably protected and sent only to the individuals who have a right to view it. The company is conscious about the loss they may face in terms of penalty and brand damage if they fail to abide by the compliance laws, especially in the online information transfer phase. Therefore, as a dedicated employee, your task is to develop a content monitoring strategy using PKI as a potential solution. You will need to determine a process or method to identify multiple data types, processes, and organizational policies. Incorporate them into a plan, and select a PKI solution that will effectively address the content management needs of your company.
You need to present your PKI solution in the form of a profes.
SEMESTER PROJECT DescriptionIntroduction to the Company S.docxedgar6wallace88877
SEMESTER PROJECT Description
Introduction to the Company:
Security Transport Professionals Incorporated (STP), has its home office located in Lexington, Kentucky and in addition has more than 3,000 employees located in each of its branch offices located in Houston, Texas and San Diego, California.
STP is primarily a nationwide freight hauler. Its customer are comprised of major market retailers particularly in the medical and pharmaceutical industry, the federal government, and several state governments. STP operates a fleet of trucks and private cargo planes that it uses to move “goods” belonging to its customers from one destination to another across the continental United States. Its fleet of truck carriers are located in Lexington, Kentucky with it planes located in Louisville, Kentucky.
STP carries and transports highly controlled, narcotics and scheduled prescription drugs, toxic, radioactive, nuclear, and top secret materials from one facility belonging to its customer to another. The method of transport depends on the type of cargo being hauled. In addition to hauling/forwarding its customers products/goods, STP is required from time to time to store its customer goods for brief periods of time. Two years ago STP began contracting with a number of subcontractors hereafter referred to as either “limited joint partners (LJPs)” or “independent subcontractor alliances (ISAs)” for the purpose of expanding its freight forwarding, storage, and delivery service. Due to the confidential nature of the freight that it transports, STP vets its employees, as well as any subcontractors (LJPs and ISAs) that it engages.
STP’s business objectives and goals include the confidential, safe and secure movement of its customer goods, from the customer/distributor to its client, or from one of its customer’s locations to another of the customer’s locations in a timely and efficient manner using costeffective methods. Alternatively, STP may transfer this responsibility to one of its limited joint partners (LJPs) or independent subcontractor alliances (ISAs), if it is more cost-effective and the income differential is within acceptable limits. There are 3 LJPs with which STP had entered into contracts. LJPs are corporate organizations in the same industry that offer essentially the same services as STP, and who are generally competitors of STP. However, when the job requires resources that exceed those of STP or its competitor, the two will enter into an agreement to jointly undertake the contract together, and will together provide the same full range of services, with both entering into the same contract or joint venture with the customer.
Independent subcontractor alliances (ISAs) differ from Limited Joint Partners (LJPs) in that a ISA is not a direct competitor of STP. Rather, the ISA is a company that offers a subset of services to STP, or contracts with STP to provide it with necessary resources to perform the particular job at h.
Part 1Question 1You are the Chief Purchasing Officer of a .docxherbertwilson5999
Part 1
Question 1
You are the Chief Purchasing Officer of a company with World Wide Production and buying locations. Design an organizational structure that allows you to compete effectively. Describe the reporting structure, the physical placement of personnel, the placement of purchasing authority and the coordination of activities with other functional groups.
Question 2
Discuss the sources of Information available to a buyer when seeking information about potential sources of supply. When do you think it is appropriate to use different sources?
Question 3
Please Answer the following questions :
1) Provide reasons why most firms do not have an adequate supplier measurements system.
2) What is a full service supplier ? What are the benefits of using full –service suppliers?
3) Of the barriers to supplier development mentioned in this chapter, which ones are the most difficult to overcome in you opinion?
4) Why should a buyer be concerned with supplier quality performance?
5) How can early supplier design involvement contribute to higher levels of product quality?
6) What are the differences between TQM and Six sigma quality approaches?
Question 4
Please read the following case on Air Products and answer the questions at the end of the case. Please see attachment.
Question 5
Discuss whether the growth in worldwide sourcing will have a positive or negative effect over the long run in the United States. Why? What alternatives exist to world wide sourcing?
Question 6
Discuss why it is important for buyers to have knowledge of a supplier's learning rate when preparing to negotiate a purchase contract.
Question 7
Please Read both cases and respond to the case questions. Please see attached.
Case 1: Supply Chain Management at Bose Corporation (see attachment)
Case 2: Strategic Sourcing and Supply at Federal Express (see attachment}
Question 8
Discuss concept of ethics and discuss the reasons why some issues that confront a buyer are not often clear from an ethical perspective.
Question 9
Please turn in any portion of your assignment. It does not have to be complete and it can be a draft. I am only looking to see your progress.
Part 2
Project – Term Paper
· Due the last day of class:
You have been hired as a purchasing/procurement Manager for a large US based automotive manufacturer. You have been assigned the responsibility of evaluating current supplier relationships and developing relationships with new supplier for automotive parts.
Go through the process, policy and procedures to evaluate current suppliers and select new suppliers. This should include:
1) Negotiations
2) Purchasing relationships
3) Purchasing strategies
4) Insourcing and outsourcing
5) Supplier quality management
6) Supplier evaluation, selection and measurements.
Give examples of some current best practices that are being used in the economy today to evaluate and manage suppliers.
Please use standard form.
Management Information System MIS 201 .docxcroysierkathey
Management Information System MIS 201
Assignment - 2
Course: MIS 201
Student name:
Academic Year: 1441
Students number:
Semester: 1st
student grade: (out of 9)
Section:
InstructorName: Signature Dr.Gokulkumari
Govindasamy
Level of the Mark: Level
Management Information System MIS 201
Semester 1 (2019-2020)
Assignment Details
Prepare an in-depth analysis of four case studies during the semester. Here are some guidelines:
· This is an individual assessment, which is a part of your course score. It requires effort and critical thinking
· Answer all the questions listed below the case.
· The ‘answers’ to the questions are best formulated by reviewing the case and the reading materials up and including the current week in the course.
· The questions are worded to help you apply the readings to the case, so don’t limit yourself to the case’s terminology and perspective. The best analysis will abstract the case content by applying the reading materials to draw broader lessons about the material
Submission Time
Assignment 2 (Case 3 & 4)
Week12
Case Study 3: Driving Ari Fleet Management with Real-Time Analytics
Automotive Resources International®, better known as simply ARI®, is the world's largest privately-held company for vehicle fleet management services. ARI is headquartered in Mt. Laurel, New Jersey and has 2,500 employees and offices throughout North America, Europe, the UK, and Hong Kong. The company manages more than 1,000,000 vehicles in the U.S., Canada, Mexico, Puerto Rico and Europe.
Businesses that need vehicles for shipments (trucks, vans, cars, ships, and rail cars) may choose to manage their own fleet of vehicles or they may outsource fleet management to companies such as ARI which specialize in these services. ARI manages the entire life cycle and operation of a fleet of vehicles for its customers, from up-front specification and acquisition to resale, including financing, maintenance, fuel management, and risk management services such as driver safety training and accident management. ARI also maintains six call centers in North America that operate 24/7, 365 days a year to support customers' fleet operations by providing assistance regarding repairs, breakdowns, accident response, preventive maintenance, and other driver needs. These call centers handle about 3.5 million calls per year from customers, drivers, and suppliers who expect access to real-time actionable information.
Providing this information has become increasingly challenging. Operating a single large commercial vehicle fleet generates high volumes of complex data, such as data on fuel consumption, maintenance, licensing, and compliance. A fuel transaction, for example, requires data on state taxes paid, fuel grade, total sale, amount sold, and time and place of purchase. A simple brake job and preventive maintenance checkup ...
The document discusses collaborative outsourcing models for freight management. It describes collaborative outsourcing as partnering with an outside provider to take on labor-intensive transportation tasks while maintaining strategic control. This allows companies to focus on strategic planning while leveraging an expert provider's scale and technology. Key aspects include immediately lowering costs through benchmarking and optimization, achieving sustained savings through continuous improvements, deploying advanced technology at no direct cost, and gaining industry expertise to inform supply chain strategies.
The Connected Logistics system integrates data from various sources, such as ERP systems, warehouse management systems, and transportation management systems, to provide real-time visibility and control over the logistics operations. Bosch L.OS is designed to improve efficiency, reduce costs, and increase customer satisfaction by optimizing logistics processes - https://www.l-os.com/in/en
The Disaster Recovery Plan Sumanth Lagadapati[email protecte.docxtodd241
The Disaster Recovery Plan
Sumanth Lagadapati
[email protected]
Introduction
Many companies don’t have a disaster recovery plan often there is a desire for a DRP.
The level of effort and\or cost required to create DRP can cause this project to have a low priority relative to other more immediate projects.
A DRP is viewed as "nice to have" or "just insurance that will not be used ", and not as a critical business component.
That is, until there is a failure that causes a significant outage or loss of data (often at a significant cost to the business).
It is my opinion that every company could benefit from both a disaster recovery plan and a business continuity plan (BCP)
Investing in a DRP and BCP is just as an important for most business in my opinion.
Where do you start?
The first step is to create a DR team and this includes an:
Executive sponsor.
DR coordinator.
Team leaders (there will be several groups and possibly subgroups).
Team members.
This people should be designated as either primary or backup for position, with every position having more than one person assigned this to minimize people as a single point of failure.
The goal is to have the expertise to help develop the various recovery procedures, and is committed to success of the overall effort.
Where do you start? cont…
The next step is to define business goals.
The goal should address items such as:
What functional areas need to be recovered?
What length of time is acceptable for recovery?
What amount of data loss is acceptable?
This often involves prioritization and a cost-benefit analysis to determine the worth of recovery (i.e. something that may be premature at this phase of the project).
Understand the business goals and objectives
To find out what that really entails you must know:
What are the critical systems?
What are the key processes and applications?
What are the dependencies on other systems?
This includes:
Data transfers.
Manual processes
Remote processing
Then documents these processes.
Because there is interaction with dependencies on other systems and user interface, and the sensitivity of the data.
Once the systems have been identified, attempt to quantify their impact relative to the overall business goals.
Identify specific requirements
Everyone involve with this effort (including upper management within a company) needs to have a single vision of what success look like, without this you risk wasting time and money on a plan that may be viewed as a failure.
Identify key personnel
These people may not be part of the DR team, but they are important. (For example who has the authority to declare a disaster?)
This list should be maintained both by name and by role; it should be validated and updated frequently.
Identify single point of failure
The overall goal of this step is to mitigate unnecessary risk.
The scope of this effort includes people, software, equipment, and infrastructure.
It i.
UNIVERSITY OF THE CUMBERLANDS ITS 833 – INFORMATION GOVER.docxouldparis
UNIVERSITY OF THE CUMBERLANDS
ITS 833 – INFORMATION GOVERNANCE
SEMESTER PROJECT – PHASE I
Introduction to the Company:
Security Transport Professionals Incorporated (STP), has its home office located in
Lexington, Kentucky and in addition has more than 3,000 employees located in each of its branch
offices located in Houston, Texas and San Diego, California.
STP is primarily a nationwide freight hauler. Its customer are comprised of major market
retailers particularly in the medical and pharmaceutical industry, the federal government, and
several state governments. STP operates a fleet of trucks and private cargo planes that it uses to
move “goods” belonging to its customers from one destination to another across the continental
United States. Its fleet of truck carriers are located in Lexington, Kentucky with it planes located
in Louisville, Kentucky.
STP carries and transports highly controlled, narcotics and scheduled prescription drugs,
toxic, radioactive, nuclear, and top secret materials from one facility belonging to its customer to
another. The method of transport depends on the type of cargo being hauled. In addition to
hauling/forwarding its customers products/goods, STP is required from time to time to store its
customer goods for brief periods of time. Two years ago STP began contracting with a number of
subcontractors hereafter referred to as either “limited joint partners (LJPs)” or “independent
subcontractor alliances (ISAs)” for the purpose of expanding its freight forwarding, storage, and
delivery service. Due to the confidential nature of the freight that it transports, STP vets its
employees, as well as any subcontractors (LJPs and ISAs) that it engages.
STP’s business objectives and goals include the confidential, safe and secure movement of
its customer goods, from the customer/distributor to its client, or from one of its customer’s
locations to another of the customer’s locations in a timely and efficient manner using costeffective
methods. Alternatively, STP may transfer this responsibility to one of its limited joint partners
(LJPs) or independent subcontractor alliances (ISAs), if it is more cost-effective and the income
differential is within acceptable limits. There are 3 LJPs with which STP had entered into contracts.
LJPs are corporate organizations in the same industry that offer essentially the same services as
STP, and who are generally competitors of STP. However, when the job requires resources that
exceed those of STP or its competitor, the two will enter into an agreement to jointly undertake
the contract together, and will together provide the same full range of services, with both entering
into the same contract or joint venture with the customer.
Independent subcontractor alliances (ISAs) differ from Limited Joint Partners (LJPs) in that a ISA
is not a direct competitor of STP. Rather, the ISA is a company th ...
Assignment 1 ERM RoadmapThe following material may be useful .docxtrippettjettie
Assignment 1: ERM Roadmap
The following material may be useful for the completion of this assignment. You may refer to the documents titled “Embracing Enterprise Risk Management: Practical Approaches for Getting Started” and “Developing Key Risk Indicators to Strengthen Enterprise Risk Management”, located at http://www.coso.org/-ERM.htm.
Imagine you are an Information Technology Manager employed by a business that needs you to develop a plan for an effective Enterprise Risk Management (ERM) program. In the past, ERM has not been a priority for the organization. Failed corporate security audits, data breaches, and recent news stories have convinced the Board of Directors that they must address these weaknesses. As a result, the CEO has tasked you to create a brief overview of ERM and provide recommendations for establishing an effective ERM program that will be used as a basis to address this area moving forward.
Write a three to four (3-4) page paper in which you:
1. Summarize the COSO Risk Management Framework and COSO’s ERM process.
1. Recommend to management the approach that they need to take to implement an effective ERM program. Include the issues and organizational impact they might encounter if they do not implement an effective ERM program.
1. Analyze the methods for establishing key risk indicators (KRIs).
1. Suggest the approach that the organization needs to take in order to link the KRIs with the organization’s strategic initiatives.
1. Use at least three (3) quality resources in this assignment (in addition to and that support the documents from the COSO Website referenced in this assignment). Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
1. Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA format.
The specific course learning outcomes associated with this assignment are:
1. Describe the COSO enterprise risk management framework.
1. Describe the process of performing effective information technology audits and general controls.
1. Use technology and information resources to research issues in information technology audit and control.
1. Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.
Bottom of Form
1.
How would you use the stages of the Systems Development Life Cycle (SDLC) to help Drewmobile Incorporated automate its currently manual “Submit Official Travel Requests & Vouchers Online” business task/activity? (see Chapter 13). Please craft a well-written and fluid essay exam response to address this question. Moreover, please use examples to illustrate your answer.
The automobile industry is always evolving. The modern automotive industry can no longer just rely on the economy demand, political backstops, or experienced markets t ...
Ways and Means of Better Fleet ManagementInfra Bazaar
Plant and equipment manager always face this herculean task of keeping the fleet in top order. The fleet should be ready to take up any tedious tasks at ease without any kind of vehicle/equipment break down. For this the challenge is to keep fleet age below 5 years. They are also under the pressure of using the budget optimally. Maintenance of old vehicles and purchase of new machinery are very expensive affair. Hence, planning in advance will help maintain proper productivity and keeping the fleet in good condition. A quarterly plan or even a monthly plan is required to assess the vehicle condition and their replacement.
Running head SIMPLIFIED PROJECT PLAN .docxrtodd599
Running head: SIMPLIFIED PROJECT PLAN 1
SIMPLIFIED PROJECT PLAN 2
Simplified Project Plan
Name
Institution
The project to be implemented involves the development of Bank Management Software and entails the use of the waterfall model. Selecting a methodology is essential since it gives a framework of the overall process and associated project documents as well as the deliverables that will control the project development cycle from start to close. The waterfall model ensures that the development phases flow seamlessly and is subdivided into separate sequential stages where the result of the preceding phase becomes the input of the succeeding phase.
In the waterfall model, the development team moves through the stages of development. The phases include; Analysis, Requirements Specification, Design, Coding, and Implementation, Testing and integration. The sequence flow from one phase to another in a top to bottom fashion. Theoretically, all the requirements are initially specified as well as the scope of the project. The app is designed according to the requirements where it is implemented and tested devoid of any modifications. The final product is then delivered to the customer.
Development phases for the project include:
· Requirements gathering and elicitation where the system requirement objectives are met. The user requirements for the system will entail Financial / Management Accounting, Treasury and Risk Management as well as Bank Communication Management.
· The system design phase will enable proper determination of the hardware and software requirements that describes the entire system architecture.
· The Implementation phase involves the development of application modules which are tested separately to establish their functionality.
· The Integration and Testing phase will entail the integration of the individual modules into a single system which is then tested as a single system. Also, user acceptance testing is done at this phase
· System implementation phase. This phase follows the successful integration and testing phase where it is deployed.
· The maintenance phase occurs after the system is implemented to correct or add new modules to meet customer’s changing needs or scope creep.
Simplified project plan for a Bank Management Software
Task Mode
Task Name
Duration
Start
Finish
Predecessors
Auto Scheduled
Bank Management Software Development
23 days
Wed 5/2/18
Fri 6/1/18
Auto Scheduled
Application conception and initiation
2 days
Wed 5/2/18
Thu 5/3/18
Auto Scheduled
Project plan
2 days
Wed 5/2/18
Thu 5/3/18
Auto Scheduled
Requirement analysis and specification
3 days
Fri 5/4/18
Tue 5/8/18
Auto Scheduled
Develop Financial / Management Accounting requirements
1 day
Fri 5/4/18
Fri 5/4/18
3
Auto Scheduled
Supply Chain Manag.
100 Original WorkZero PlagiarismGraduate Level Writing Required.docxchristiandean12115
This document provides instructions for a 1,250- to 1,400-word paper that is due on March 6, 2021. Students must choose between the topics of immigration, drug legislation, or three-strikes sentencing. For the selected topic, students must describe how each branch of the US government (executive, legislative, judicial) participates in the policy. The paper must follow APA formatting guidelines and include at least three peer-reviewed literature references, excluding sources like Wikipedia.
10.11771066480704270150THE FAMILY JOURNAL COUNSELING AND THE.docxchristiandean12115
10.1177/1066480704270150THE FAMILY JOURNAL: COUNSELING AND THERAPY FOR COUPLES AND FAMILIES / January 2005Lambert / GAY AND LESBIAN FAMILIES
❖ Literature Review—Research
Gay and Lesbian Families:
What We Know and Where to Go From Here
Serena Lambert
Idaho State University
The author reviewed the research on gay and lesbian parents and
their children. The current body of research has been clear and con-
sistent in establishing that children of gay and lesbian parents are as
psychologically healthy as their peers from heterosexual homes.
However, this comparison approach to research design appears to
have limited the scope of research on gay and lesbian families, leav-
ing much of the experience of these families yet to be investigated.
Keywords: gay men; lesbians; parenting; families
The relationships and family lives of gay and lesbian peo-ple have been the focus of much controversy in the past
decade. The legal and social implications of gay and lesbian
parents appear to have clearly affected the direction that
researchers in the fields of psychology and sociology have
taken in regard to these diverse families. As clinicians, educa-
tors, and researchers, counselors need to be aware of and
involved with issues related to lesbian and gay family life for
several reasons. First, our professional code of ethics charges
us with the ethical responsibility to demonstrate a commit-
ment to gaining knowledge, personal awareness, sensitivity,
and skills significant for working with diverse populations
(American Counseling Association, 1995; International
Association of Marriage and Family Counselors, n.d.). Coun-
selors are also in a unique position to advocate for diverse
clients and families in their communities as well as in their
practices but must possess the knowledge to do so effectively
(Eriksen, 1999). It is believed that work in this area not only
has the potential to affect the lives of our gay and lesbian cli-
ents and their children but also influences developmental and
family theory and informs public policies for the future
(Patterson, 1995, 2000; Savin-Williams & Esterberg, 2000).
This article will review the recent research regarding fami-
lies headed by gay men and lesbians. Studies reviewed in-
clude investigations of gay or lesbian versus homosexual par-
ents, sources of diversity among gay and lesbian parents, and
the personal and sociological development of the children of
gay and lesbian parents. Implications for counselors as well
as directions for future research will also be discussed.
GAY AND LESBIAN PARENTS
How Many Are Out There?
Unfortunately, accurate statistics regarding the numbers
of families headed by gay men and lesbians in our culture are
difficult to determine. Due to fear of discrimination in one or
more aspects of their lives, many gay men and lesbians have
carefully kept their sexual orientation concealed—even from
their own children in some cases (Huggins, 1989). Patterson
(2000) noted that it is es.
More Related Content
Similar to ITSP #2 Assignment HintsFirst, you will revise ITSP #1’s assignm.docx
chinabusinessreview.com April–June 2012 13
L
ogistics is an essential component of a successful
deal anywhere in the world, but especially in China
where services offered may not be what they seem.
Global supply chains are easily disrupted when
companies do not consider critical logistics services
or blindly trust their supplier to arrange transportation and the
export of products from China.
To avoid these supply chain traps, consider these nine rules:
1. Carefully select a logistics and .transportation supplier
There are thousands of small logistics companies in China
that advertise as freight forwarders and export trade brokers.
Almost anyone will say they can do this job because they
A carefully selected logistics partner can help companies
overcome their China supply chain challenges.
Nine Rules for Logistics in China
Rosemary Coates
F O C U S : D I S T R I B U T I O N & LO G I S T I C S
Companies in China should select a logistics provider with a global network of offices, standard procedures, and up-to-date information technology systems.
Ch
in
a
Fo
to
P
re
ss
14 April–June 2012 chinabusinessreview.com
have connections to trade services. But so many things can
go wrong and result in supply chain disasters. If a company
cannot get goods to market in time for the season or the
sale, or to meet peak demand, the company’s logistics net-
work has failed.
Small freight forwarders can provide personalized service
when a company needs special care, but they may also add
time and frustration to your supply chain. Because they are
independent businesses, small, independent Chinese forward-
ers rely on a network of agency relationships and one-off
favors to move freight. Essentially, these small forwarders and
brokers are just cargo coordinators. They typically do not
own any of their own equipment, make no investments in
capital equipment or systems, and rely on subcontractors to
provide trucking, air, and ocean freight. Their networks are
only as strong as the weakest link. It is common to see small
forwarders like this in tier-two or tier-three cities, moving
cargo in tricycle carts from manufacturing sites to airports.
Some of these companies also subcontract the preparation of
export documentation, including US Customs’ 10+2 report-
ing—the information now required to be processed before an
ocean shipment, bound for the United States, can leave a for-
eign country—which can cause delays in China if documents
are not properly prepared. Companies should select a freight
forwarder or broker with a global network of company-
owned offices, standard procedures, and information technol-
ogy (IT) systems capabilities that comply with the complicat-
ed export and import regulations.
Global logistics providers that have established offices across
China, such as Expeditors International of Washington, Inc.,
CEVA Logistics, DB Schenker, Kuehne & Nagel International
AG, among others, o ...
SEMESTER PROJECT – PHASE II Introduction to the Company S.docxedgar6wallace88877
SEMESTER PROJECT – PHASE II
Introduction to the Company:
Security Transport Professionals Incorporated (STP), has its home office located in Lexington, Kentucky and in addition has more than 3,000 employees located in each of its branch offices located in Houston, Texas and San Diego, California.
STP is primarily a nationwide freight hauler. Its customer are comprised of major market retailers particularly in the medical and pharmaceutical industry, the federal government, and several state governments. STP operates a fleet of trucks and private cargo planes that it uses to move “goods” belonging to its customers from one destination to another across the continental United States. Its fleet of truck carriers are located in Lexington, Kentucky with it planes located in Louisville, Kentucky.
STP carries and transports highly controlled, narcotics and scheduled prescription drugs, toxic, radioactive, nuclear, and top-secret materials from one facility belonging to its customer to another. The method of transport depends on the type of cargo being hauled. In addition to hauling/forwarding its customers products/goods, STP is required from time to time to store its customer goods for brief periods of time. Two years ago, STP began contracting with a number of subcontractor’s hereafter referred to as either “limited joint partners (LJPs)” or “independent subcontractor alliances (ISAs)” for the purpose of expanding its freight forwarding, storage, and delivery service. Due to the confidential nature of the freight that it transports, STP vets its employees, as well as any subcontractors (LJPs and ISAs) that it engages.
STP’s business objectives and goals include the confidential, safe and secure movement of its customer goods, from the customer/distributor to its client, or from one of its customer’s locations to another of the customer’s locations in a timely and efficient manner using cost effective methods. Alternatively, STP may transfer this responsibility to one of its limited joint partners (LJPs) or independent subcontractor alliances (ISAs), if it is more cost-effective and the income differential is within acceptable limits. There are 3 LJPs with which STP had entered into contracts. LJPs are corporate organizations in the same industry that offer essentially the same services as STP, and who are generally competitors of STP. However, when the job requires resources that exceed those of STP or its competitor, the two will enter into an agreement to jointly undertake the contract together and will together provide the same full range of services, with both entering into the same contract or joint venture with the customer.
Independent subcontractor alliances (ISAs) differ from Limited Joint Partners (LJPs) in that a ISA is not a direct competitor of STP. Rather, the ISA is a company that offers a subset of services to STP, or contracts with STP to provide it with necessary resources to perform the particular job at.
A supply chain consists of all parties involved
directly or indirectly, in fulfilling a customer request. The supply
chain includes not only the manufacturers and suppliers, but also
transporters, workhouse, retailers and even customers
themselves. Within each organization, such as a manufactures,
the supply chain includes all functions involved in receiving and
filling a customer request. These functions include, but are not
limited to, new product development, marketing operations,
distributions, finance, and customer service. Supply chain
management (SCM) is the management of an interconnected or
interlinked between network, channel and node businesses
involved in the provision of product and service packages
required by the end customers in a supply chain. Supply chain
management spans the movement and storage of raw materials,
work-in-process inventory, and finished goods from point of
origin to point of consumption. It is also defined as the "design,
planning, execution, control, and monitoring of supply chain
activities with the objective of creating net value, building a
competitive infrastructure, leveraging worldwide logistics,
synchronizing supply with demand and measuring performance
globally.
Customer satisfaction improves not because goods are more reliable and have fewer defects but because the entire process that the customer experiences from start to finish, from the sales office all the way through delivery and post-sale servicing and technical support, is improved.
Exercise 44. Selecting from Imperfect ApplicantsScenarioThe diBetseyCalderon89
Exercise 44. Selecting from Imperfect Applicants
Scenario
The director of college recruiting for Duro Insurance Company is presently recruiting college students for its administrative trainee program. The one-year training program involves a combination of on-the-job and formal classroom training. Upon successful completion of the training, a candidate is assigned a position as assistant department supervisor.
Duro Insurance Company ranks in the top 15 percent of life insurance companies nationally with in-force insurance in excess of $6 billion. Duro markets all forms of insurance, bonds, and pension products on an individual and group basis. More recently, the company added diversified financial services, including discount brokerage services, real estate financing, and mutual funds. The company is divided into six major divisions: Employee Benefits, Commercial Insurance, Individual Life, Automobile, Homeowners, and Diversified Financial Services and functionally into several major operating departments: Sales, Underwriting, Administrative, Loss Prevention, Actuarial, Claims, Legal, Financial and Investments, Advertising and Public Relations, Personnel, and Research and Policy Development. Duro has over 25,000 employees and more than 300 field offices throughout the country. Management at each field office consists of a manager, several department heads, and their assistants. The company has enjoyed a pattern of steady growth and expansion over the years.
Job Description for Administrative Trainee
Handle day-to-day administration of field office, including direct supervision of office clerks.
Plan and oversee the use of space, furniture, and equipment on a continuing basis and recommend changes as necessary.
Supervise computer processing operations for issuing and servicing insurance policies, including claims.
Implement and maintain accounting and collection procedures. The trainee works closely with the department head in learning these duties.
Job Qualifications
BS/BA with business management background (knowledge of accounting desired).
Ability to communicate effectively.
Ability to handle detail.
Ability to plan and direct activities of subordinate personnel.
Demonstrated leadership potential.
Knowledge of computers and software packages including Microsoft Office.
Additional Job Data
The trainee position reports directly to a department head.
Expected career progression is to assistant department supervisor (1–2 years) and, with continued development, to department head (4–5 years after supervisory assignment).
The position requires relocation.
The company offers competitive salaries and benefits, including a tuition repayment plan and in-house career planning and development.
Exercise 43. Which Selection Procedure Is Most Effective?
objectives
To examine the strengths and weaknesses of four different methods for selecting new employees.
To enhance your oral communication skills.
out-of-class preparation time: 30 mi ...
The document discusses domestic and international logistics and supply chain management. It defines logistics, domestic logistics, and international logistics. Domestic logistics involves distribution within a country while international logistics involves distribution across international borders. Managing logistics internationally is more complex due to factors like multiple transportation options, additional costs like tariffs, and challenges building relationships across countries. The document also discusses transportation types, warehouse types, facility location decisions, and evaluating locations using models like weighted factor and break even.
Gg freight case study grace ijeluumgcgg freightjoney4
GG Freight is a freight company operating in the southwestern US with $35 million in annual revenue. It has eight terminals and 750 employees. The company aims to increase profits to 8% through cost reductions and efficiency gains. The current IT system handles freight tracking, fleet maintenance, finance, and accounting. The new CIO plans to restructure IT as a strategic department to better support the business through initiatives like unified communications, open source software, customer relationship management, and business intelligence.
Sheet1EarthMover ProjectCurrent project has a critical path of 30.docxbjohn46
Sheet1EarthMover Project"Current project has a critical path of 30 days. You must complete the job by at least day 26!"NORMALCRASHActivityTime (weeks)CostBest Time (weeks)Activity Crash Cost ($)Time reduction (weeks)Crash Cost ($/week)A6$ 80,0005$ 20,0001$ 20,000B4$ 100,0004$ - 00C3$ 50,0002$ 50,0001$ 50,000D6$ 150,0003$ 150,0003$ 50,000E3$ 180,0002$ 70,0001$ 70,000F10$ 300,0007$ 180,0003$ 60,000G2$ 100,0002$ - 00H6$ 450,0005$ 350,0001$ 350,000I8$ 350,0004$ 300,0004$ 75,000Goal to complete by:30weeks<---- Change this goal from the currect 30 weeks to the new 26 week target!Objective FunctionThen run SOLVER to find the least expensive way to reach your goal !!!Min cost to CRASH$ - 0Xi = earliest finish time for activity i EF-limitYi = the amount of time activity i is crashed Max crash availableNew timeA6=6A0<=1A6B10=10B0<=0B4C9=9C0<=1C3D16=16D0<=3D6E13=13E0<=1E3F20=20F0<=3F10G22=22G0<=0G2H28=28H0<=1H6I30=30I0<=4I8Note:EF = EF of previous + tNon-negativity constraintsNew t = Original t - CrashNew Finish timeGoalH28<=30I30<=30
KY Logistics & Distribution Company (KYLOD)
IT Strategic Plan for KY Logistics and Distribution Company
Nambo Francis
IFSM 301
ITSP: KY Logistics &Distribution Company
May 31, 2019
May 31.20196
IT strategic plan for KY Logistics and Distribution Company
1. Business Statement - KY Logistics and Distribution Company (KYLOD) is a zonal company which has been offering transportation and services for the past four decades. The company provides its services to major cities in the Midwest region of the United States. Their headquarters is located in Chicago, Illinois. They have a total staff of 700 employees, including all the truck drivers. They have several distribution terminals which are located in Chicago, Milwaukee, Green Bay, Fort Wayne Indianapolis, and Grand Rapids, which help to fuse shipping, they also have vehicles including 40 tractors, 80 box trucks, and 80-panel vans. The company’s line of business is highly competitive, and they have shown slow growth due to a sluggish economy. Kevin, the company president, aspires, to see an increase in the rate of 6% per year. They work 24/7, with their salespersons visiting everywhere to market the company and make quotations. A dispatcher at terminal makes a list of freight pickups and drives and follows the routes making the drops at the respective stoppages. The company is reliable and competent in all their transport and distributive endeavors.
2. Business Strategic Objectives - KYLDO has three particular objectives which it intends to pursue and realize success in the next business year strategically and to give better services to their customers (firstgroupplc.com, 2014). They objectives are discussed below.
Business Strategic Objective 1: Focused and Disciplined Bidding
· The company is willing to be diligent and straightforward in their bargaining for freight transportation prices whenever they have to.
PKI and Encryption at WorkLearning Objectives and Outcomes· De.docxJUST36
PKI and Encryption at Work
Learning Objectives and Outcomes
· Develop a plan to deploy public key infrastructure (PKI) and encryption solutions to protect data and information.
Assignment Requirements
In this assignment, you play the role of chief information technology (IT) security officer for the Quality Medical Company (QMC). QMC is a publicly traded company operating in the pharmaceutical industry.
QMC is expanding its arena of work through an increase in the number of clients and products. The senior management of the company is highly concerned about complying with the multitude of legislative and regulatory laws and issues in place. The company has an internal compliance and risk management team to take care of all the compliance-related issues. The company needs to make important decisions about the bulk of resources they will need to meet the voluminous compliance requirements arising from the multidimensional challenge of expansion.
QMC will be required to conform to the following compliance issues:
· Public-company regulations, such as the Sarbanes-Oxley (SOX) Act
· Regulations affecting financial companies, companies that make loans and charge interest, such as the U.S. Securities and Exchange Commission (SEC) rules and Gramm-Leach-Bliley Act (GLBA)
· Regulations affecting healthcare privacy information, such as Health Insurance Portability and Accountability Act (HIPAA)
· Intellectual Property Law that is important for information asset protection particularly for organizations in the pharmaceutical and technology industry
· Regulations affecting the privacy of information, including personal identification information, such as personally identifiable information (PII) regularly collected from employees, customers, and end users
· Corporate governance policies including disclosures to the board of directors and the auditors and the policies related to human resources, governance, harassment, code of conduct, and ethics
Compliance with regulatory requirements implies encrypting sensitive data at rest (DAR) and allowing access to role-holders in the enterprise who require the access. It also implies that sensitive data in motion (DIM) or data that is being communicated via e-mail, instant message (IM), or even Web e-mail must be suitably protected and sent only to the individuals who have a right to view it. The company is conscious about the loss they may face in terms of penalty and brand damage if they fail to abide by the compliance laws, especially in the online information transfer phase. Therefore, as a dedicated employee, your task is to develop a content monitoring strategy using PKI as a potential solution. You will need to determine a process or method to identify multiple data types, processes, and organizational policies. Incorporate them into a plan, and select a PKI solution that will effectively address the content management needs of your company.
You need to present your PKI solution in the form of a profes.
SEMESTER PROJECT DescriptionIntroduction to the Company S.docxedgar6wallace88877
SEMESTER PROJECT Description
Introduction to the Company:
Security Transport Professionals Incorporated (STP), has its home office located in Lexington, Kentucky and in addition has more than 3,000 employees located in each of its branch offices located in Houston, Texas and San Diego, California.
STP is primarily a nationwide freight hauler. Its customer are comprised of major market retailers particularly in the medical and pharmaceutical industry, the federal government, and several state governments. STP operates a fleet of trucks and private cargo planes that it uses to move “goods” belonging to its customers from one destination to another across the continental United States. Its fleet of truck carriers are located in Lexington, Kentucky with it planes located in Louisville, Kentucky.
STP carries and transports highly controlled, narcotics and scheduled prescription drugs, toxic, radioactive, nuclear, and top secret materials from one facility belonging to its customer to another. The method of transport depends on the type of cargo being hauled. In addition to hauling/forwarding its customers products/goods, STP is required from time to time to store its customer goods for brief periods of time. Two years ago STP began contracting with a number of subcontractors hereafter referred to as either “limited joint partners (LJPs)” or “independent subcontractor alliances (ISAs)” for the purpose of expanding its freight forwarding, storage, and delivery service. Due to the confidential nature of the freight that it transports, STP vets its employees, as well as any subcontractors (LJPs and ISAs) that it engages.
STP’s business objectives and goals include the confidential, safe and secure movement of its customer goods, from the customer/distributor to its client, or from one of its customer’s locations to another of the customer’s locations in a timely and efficient manner using costeffective methods. Alternatively, STP may transfer this responsibility to one of its limited joint partners (LJPs) or independent subcontractor alliances (ISAs), if it is more cost-effective and the income differential is within acceptable limits. There are 3 LJPs with which STP had entered into contracts. LJPs are corporate organizations in the same industry that offer essentially the same services as STP, and who are generally competitors of STP. However, when the job requires resources that exceed those of STP or its competitor, the two will enter into an agreement to jointly undertake the contract together, and will together provide the same full range of services, with both entering into the same contract or joint venture with the customer.
Independent subcontractor alliances (ISAs) differ from Limited Joint Partners (LJPs) in that a ISA is not a direct competitor of STP. Rather, the ISA is a company that offers a subset of services to STP, or contracts with STP to provide it with necessary resources to perform the particular job at h.
Part 1Question 1You are the Chief Purchasing Officer of a .docxherbertwilson5999
Part 1
Question 1
You are the Chief Purchasing Officer of a company with World Wide Production and buying locations. Design an organizational structure that allows you to compete effectively. Describe the reporting structure, the physical placement of personnel, the placement of purchasing authority and the coordination of activities with other functional groups.
Question 2
Discuss the sources of Information available to a buyer when seeking information about potential sources of supply. When do you think it is appropriate to use different sources?
Question 3
Please Answer the following questions :
1) Provide reasons why most firms do not have an adequate supplier measurements system.
2) What is a full service supplier ? What are the benefits of using full –service suppliers?
3) Of the barriers to supplier development mentioned in this chapter, which ones are the most difficult to overcome in you opinion?
4) Why should a buyer be concerned with supplier quality performance?
5) How can early supplier design involvement contribute to higher levels of product quality?
6) What are the differences between TQM and Six sigma quality approaches?
Question 4
Please read the following case on Air Products and answer the questions at the end of the case. Please see attachment.
Question 5
Discuss whether the growth in worldwide sourcing will have a positive or negative effect over the long run in the United States. Why? What alternatives exist to world wide sourcing?
Question 6
Discuss why it is important for buyers to have knowledge of a supplier's learning rate when preparing to negotiate a purchase contract.
Question 7
Please Read both cases and respond to the case questions. Please see attached.
Case 1: Supply Chain Management at Bose Corporation (see attachment)
Case 2: Strategic Sourcing and Supply at Federal Express (see attachment}
Question 8
Discuss concept of ethics and discuss the reasons why some issues that confront a buyer are not often clear from an ethical perspective.
Question 9
Please turn in any portion of your assignment. It does not have to be complete and it can be a draft. I am only looking to see your progress.
Part 2
Project – Term Paper
· Due the last day of class:
You have been hired as a purchasing/procurement Manager for a large US based automotive manufacturer. You have been assigned the responsibility of evaluating current supplier relationships and developing relationships with new supplier for automotive parts.
Go through the process, policy and procedures to evaluate current suppliers and select new suppliers. This should include:
1) Negotiations
2) Purchasing relationships
3) Purchasing strategies
4) Insourcing and outsourcing
5) Supplier quality management
6) Supplier evaluation, selection and measurements.
Give examples of some current best practices that are being used in the economy today to evaluate and manage suppliers.
Please use standard form.
Management Information System MIS 201 .docxcroysierkathey
Management Information System MIS 201
Assignment - 2
Course: MIS 201
Student name:
Academic Year: 1441
Students number:
Semester: 1st
student grade: (out of 9)
Section:
InstructorName: Signature Dr.Gokulkumari
Govindasamy
Level of the Mark: Level
Management Information System MIS 201
Semester 1 (2019-2020)
Assignment Details
Prepare an in-depth analysis of four case studies during the semester. Here are some guidelines:
· This is an individual assessment, which is a part of your course score. It requires effort and critical thinking
· Answer all the questions listed below the case.
· The ‘answers’ to the questions are best formulated by reviewing the case and the reading materials up and including the current week in the course.
· The questions are worded to help you apply the readings to the case, so don’t limit yourself to the case’s terminology and perspective. The best analysis will abstract the case content by applying the reading materials to draw broader lessons about the material
Submission Time
Assignment 2 (Case 3 & 4)
Week12
Case Study 3: Driving Ari Fleet Management with Real-Time Analytics
Automotive Resources International®, better known as simply ARI®, is the world's largest privately-held company for vehicle fleet management services. ARI is headquartered in Mt. Laurel, New Jersey and has 2,500 employees and offices throughout North America, Europe, the UK, and Hong Kong. The company manages more than 1,000,000 vehicles in the U.S., Canada, Mexico, Puerto Rico and Europe.
Businesses that need vehicles for shipments (trucks, vans, cars, ships, and rail cars) may choose to manage their own fleet of vehicles or they may outsource fleet management to companies such as ARI which specialize in these services. ARI manages the entire life cycle and operation of a fleet of vehicles for its customers, from up-front specification and acquisition to resale, including financing, maintenance, fuel management, and risk management services such as driver safety training and accident management. ARI also maintains six call centers in North America that operate 24/7, 365 days a year to support customers' fleet operations by providing assistance regarding repairs, breakdowns, accident response, preventive maintenance, and other driver needs. These call centers handle about 3.5 million calls per year from customers, drivers, and suppliers who expect access to real-time actionable information.
Providing this information has become increasingly challenging. Operating a single large commercial vehicle fleet generates high volumes of complex data, such as data on fuel consumption, maintenance, licensing, and compliance. A fuel transaction, for example, requires data on state taxes paid, fuel grade, total sale, amount sold, and time and place of purchase. A simple brake job and preventive maintenance checkup ...
The document discusses collaborative outsourcing models for freight management. It describes collaborative outsourcing as partnering with an outside provider to take on labor-intensive transportation tasks while maintaining strategic control. This allows companies to focus on strategic planning while leveraging an expert provider's scale and technology. Key aspects include immediately lowering costs through benchmarking and optimization, achieving sustained savings through continuous improvements, deploying advanced technology at no direct cost, and gaining industry expertise to inform supply chain strategies.
The Connected Logistics system integrates data from various sources, such as ERP systems, warehouse management systems, and transportation management systems, to provide real-time visibility and control over the logistics operations. Bosch L.OS is designed to improve efficiency, reduce costs, and increase customer satisfaction by optimizing logistics processes - https://www.l-os.com/in/en
The Disaster Recovery Plan Sumanth Lagadapati[email protecte.docxtodd241
The Disaster Recovery Plan
Sumanth Lagadapati
[email protected]
Introduction
Many companies don’t have a disaster recovery plan often there is a desire for a DRP.
The level of effort and\or cost required to create DRP can cause this project to have a low priority relative to other more immediate projects.
A DRP is viewed as "nice to have" or "just insurance that will not be used ", and not as a critical business component.
That is, until there is a failure that causes a significant outage or loss of data (often at a significant cost to the business).
It is my opinion that every company could benefit from both a disaster recovery plan and a business continuity plan (BCP)
Investing in a DRP and BCP is just as an important for most business in my opinion.
Where do you start?
The first step is to create a DR team and this includes an:
Executive sponsor.
DR coordinator.
Team leaders (there will be several groups and possibly subgroups).
Team members.
This people should be designated as either primary or backup for position, with every position having more than one person assigned this to minimize people as a single point of failure.
The goal is to have the expertise to help develop the various recovery procedures, and is committed to success of the overall effort.
Where do you start? cont…
The next step is to define business goals.
The goal should address items such as:
What functional areas need to be recovered?
What length of time is acceptable for recovery?
What amount of data loss is acceptable?
This often involves prioritization and a cost-benefit analysis to determine the worth of recovery (i.e. something that may be premature at this phase of the project).
Understand the business goals and objectives
To find out what that really entails you must know:
What are the critical systems?
What are the key processes and applications?
What are the dependencies on other systems?
This includes:
Data transfers.
Manual processes
Remote processing
Then documents these processes.
Because there is interaction with dependencies on other systems and user interface, and the sensitivity of the data.
Once the systems have been identified, attempt to quantify their impact relative to the overall business goals.
Identify specific requirements
Everyone involve with this effort (including upper management within a company) needs to have a single vision of what success look like, without this you risk wasting time and money on a plan that may be viewed as a failure.
Identify key personnel
These people may not be part of the DR team, but they are important. (For example who has the authority to declare a disaster?)
This list should be maintained both by name and by role; it should be validated and updated frequently.
Identify single point of failure
The overall goal of this step is to mitigate unnecessary risk.
The scope of this effort includes people, software, equipment, and infrastructure.
It i.
UNIVERSITY OF THE CUMBERLANDS ITS 833 – INFORMATION GOVER.docxouldparis
UNIVERSITY OF THE CUMBERLANDS
ITS 833 – INFORMATION GOVERNANCE
SEMESTER PROJECT – PHASE I
Introduction to the Company:
Security Transport Professionals Incorporated (STP), has its home office located in
Lexington, Kentucky and in addition has more than 3,000 employees located in each of its branch
offices located in Houston, Texas and San Diego, California.
STP is primarily a nationwide freight hauler. Its customer are comprised of major market
retailers particularly in the medical and pharmaceutical industry, the federal government, and
several state governments. STP operates a fleet of trucks and private cargo planes that it uses to
move “goods” belonging to its customers from one destination to another across the continental
United States. Its fleet of truck carriers are located in Lexington, Kentucky with it planes located
in Louisville, Kentucky.
STP carries and transports highly controlled, narcotics and scheduled prescription drugs,
toxic, radioactive, nuclear, and top secret materials from one facility belonging to its customer to
another. The method of transport depends on the type of cargo being hauled. In addition to
hauling/forwarding its customers products/goods, STP is required from time to time to store its
customer goods for brief periods of time. Two years ago STP began contracting with a number of
subcontractors hereafter referred to as either “limited joint partners (LJPs)” or “independent
subcontractor alliances (ISAs)” for the purpose of expanding its freight forwarding, storage, and
delivery service. Due to the confidential nature of the freight that it transports, STP vets its
employees, as well as any subcontractors (LJPs and ISAs) that it engages.
STP’s business objectives and goals include the confidential, safe and secure movement of
its customer goods, from the customer/distributor to its client, or from one of its customer’s
locations to another of the customer’s locations in a timely and efficient manner using costeffective
methods. Alternatively, STP may transfer this responsibility to one of its limited joint partners
(LJPs) or independent subcontractor alliances (ISAs), if it is more cost-effective and the income
differential is within acceptable limits. There are 3 LJPs with which STP had entered into contracts.
LJPs are corporate organizations in the same industry that offer essentially the same services as
STP, and who are generally competitors of STP. However, when the job requires resources that
exceed those of STP or its competitor, the two will enter into an agreement to jointly undertake
the contract together, and will together provide the same full range of services, with both entering
into the same contract or joint venture with the customer.
Independent subcontractor alliances (ISAs) differ from Limited Joint Partners (LJPs) in that a ISA
is not a direct competitor of STP. Rather, the ISA is a company th ...
Assignment 1 ERM RoadmapThe following material may be useful .docxtrippettjettie
Assignment 1: ERM Roadmap
The following material may be useful for the completion of this assignment. You may refer to the documents titled “Embracing Enterprise Risk Management: Practical Approaches for Getting Started” and “Developing Key Risk Indicators to Strengthen Enterprise Risk Management”, located at http://www.coso.org/-ERM.htm.
Imagine you are an Information Technology Manager employed by a business that needs you to develop a plan for an effective Enterprise Risk Management (ERM) program. In the past, ERM has not been a priority for the organization. Failed corporate security audits, data breaches, and recent news stories have convinced the Board of Directors that they must address these weaknesses. As a result, the CEO has tasked you to create a brief overview of ERM and provide recommendations for establishing an effective ERM program that will be used as a basis to address this area moving forward.
Write a three to four (3-4) page paper in which you:
1. Summarize the COSO Risk Management Framework and COSO’s ERM process.
1. Recommend to management the approach that they need to take to implement an effective ERM program. Include the issues and organizational impact they might encounter if they do not implement an effective ERM program.
1. Analyze the methods for establishing key risk indicators (KRIs).
1. Suggest the approach that the organization needs to take in order to link the KRIs with the organization’s strategic initiatives.
1. Use at least three (3) quality resources in this assignment (in addition to and that support the documents from the COSO Website referenced in this assignment). Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
1. Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA format.
The specific course learning outcomes associated with this assignment are:
1. Describe the COSO enterprise risk management framework.
1. Describe the process of performing effective information technology audits and general controls.
1. Use technology and information resources to research issues in information technology audit and control.
1. Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.
Bottom of Form
1.
How would you use the stages of the Systems Development Life Cycle (SDLC) to help Drewmobile Incorporated automate its currently manual “Submit Official Travel Requests & Vouchers Online” business task/activity? (see Chapter 13). Please craft a well-written and fluid essay exam response to address this question. Moreover, please use examples to illustrate your answer.
The automobile industry is always evolving. The modern automotive industry can no longer just rely on the economy demand, political backstops, or experienced markets t ...
Ways and Means of Better Fleet ManagementInfra Bazaar
Plant and equipment manager always face this herculean task of keeping the fleet in top order. The fleet should be ready to take up any tedious tasks at ease without any kind of vehicle/equipment break down. For this the challenge is to keep fleet age below 5 years. They are also under the pressure of using the budget optimally. Maintenance of old vehicles and purchase of new machinery are very expensive affair. Hence, planning in advance will help maintain proper productivity and keeping the fleet in good condition. A quarterly plan or even a monthly plan is required to assess the vehicle condition and their replacement.
Running head SIMPLIFIED PROJECT PLAN .docxrtodd599
Running head: SIMPLIFIED PROJECT PLAN 1
SIMPLIFIED PROJECT PLAN 2
Simplified Project Plan
Name
Institution
The project to be implemented involves the development of Bank Management Software and entails the use of the waterfall model. Selecting a methodology is essential since it gives a framework of the overall process and associated project documents as well as the deliverables that will control the project development cycle from start to close. The waterfall model ensures that the development phases flow seamlessly and is subdivided into separate sequential stages where the result of the preceding phase becomes the input of the succeeding phase.
In the waterfall model, the development team moves through the stages of development. The phases include; Analysis, Requirements Specification, Design, Coding, and Implementation, Testing and integration. The sequence flow from one phase to another in a top to bottom fashion. Theoretically, all the requirements are initially specified as well as the scope of the project. The app is designed according to the requirements where it is implemented and tested devoid of any modifications. The final product is then delivered to the customer.
Development phases for the project include:
· Requirements gathering and elicitation where the system requirement objectives are met. The user requirements for the system will entail Financial / Management Accounting, Treasury and Risk Management as well as Bank Communication Management.
· The system design phase will enable proper determination of the hardware and software requirements that describes the entire system architecture.
· The Implementation phase involves the development of application modules which are tested separately to establish their functionality.
· The Integration and Testing phase will entail the integration of the individual modules into a single system which is then tested as a single system. Also, user acceptance testing is done at this phase
· System implementation phase. This phase follows the successful integration and testing phase where it is deployed.
· The maintenance phase occurs after the system is implemented to correct or add new modules to meet customer’s changing needs or scope creep.
Simplified project plan for a Bank Management Software
Task Mode
Task Name
Duration
Start
Finish
Predecessors
Auto Scheduled
Bank Management Software Development
23 days
Wed 5/2/18
Fri 6/1/18
Auto Scheduled
Application conception and initiation
2 days
Wed 5/2/18
Thu 5/3/18
Auto Scheduled
Project plan
2 days
Wed 5/2/18
Thu 5/3/18
Auto Scheduled
Requirement analysis and specification
3 days
Fri 5/4/18
Tue 5/8/18
Auto Scheduled
Develop Financial / Management Accounting requirements
1 day
Fri 5/4/18
Fri 5/4/18
3
Auto Scheduled
Supply Chain Manag.
Similar to ITSP #2 Assignment HintsFirst, you will revise ITSP #1’s assignm.docx (20)
100 Original WorkZero PlagiarismGraduate Level Writing Required.docxchristiandean12115
This document provides instructions for a 1,250- to 1,400-word paper that is due on March 6, 2021. Students must choose between the topics of immigration, drug legislation, or three-strikes sentencing. For the selected topic, students must describe how each branch of the US government (executive, legislative, judicial) participates in the policy. The paper must follow APA formatting guidelines and include at least three peer-reviewed literature references, excluding sources like Wikipedia.
10.11771066480704270150THE FAMILY JOURNAL COUNSELING AND THE.docxchristiandean12115
10.1177/1066480704270150THE FAMILY JOURNAL: COUNSELING AND THERAPY FOR COUPLES AND FAMILIES / January 2005Lambert / GAY AND LESBIAN FAMILIES
❖ Literature Review—Research
Gay and Lesbian Families:
What We Know and Where to Go From Here
Serena Lambert
Idaho State University
The author reviewed the research on gay and lesbian parents and
their children. The current body of research has been clear and con-
sistent in establishing that children of gay and lesbian parents are as
psychologically healthy as their peers from heterosexual homes.
However, this comparison approach to research design appears to
have limited the scope of research on gay and lesbian families, leav-
ing much of the experience of these families yet to be investigated.
Keywords: gay men; lesbians; parenting; families
The relationships and family lives of gay and lesbian peo-ple have been the focus of much controversy in the past
decade. The legal and social implications of gay and lesbian
parents appear to have clearly affected the direction that
researchers in the fields of psychology and sociology have
taken in regard to these diverse families. As clinicians, educa-
tors, and researchers, counselors need to be aware of and
involved with issues related to lesbian and gay family life for
several reasons. First, our professional code of ethics charges
us with the ethical responsibility to demonstrate a commit-
ment to gaining knowledge, personal awareness, sensitivity,
and skills significant for working with diverse populations
(American Counseling Association, 1995; International
Association of Marriage and Family Counselors, n.d.). Coun-
selors are also in a unique position to advocate for diverse
clients and families in their communities as well as in their
practices but must possess the knowledge to do so effectively
(Eriksen, 1999). It is believed that work in this area not only
has the potential to affect the lives of our gay and lesbian cli-
ents and their children but also influences developmental and
family theory and informs public policies for the future
(Patterson, 1995, 2000; Savin-Williams & Esterberg, 2000).
This article will review the recent research regarding fami-
lies headed by gay men and lesbians. Studies reviewed in-
clude investigations of gay or lesbian versus homosexual par-
ents, sources of diversity among gay and lesbian parents, and
the personal and sociological development of the children of
gay and lesbian parents. Implications for counselors as well
as directions for future research will also be discussed.
GAY AND LESBIAN PARENTS
How Many Are Out There?
Unfortunately, accurate statistics regarding the numbers
of families headed by gay men and lesbians in our culture are
difficult to determine. Due to fear of discrimination in one or
more aspects of their lives, many gay men and lesbians have
carefully kept their sexual orientation concealed—even from
their own children in some cases (Huggins, 1989). Patterson
(2000) noted that it is es.
10.11771066480703252339 ARTICLETHE FAMILY JOURNAL COUNSELING.docxchristiandean12115
10.1177/1066480703252339 ARTICLETHE FAMILY JOURNAL: COUNSELING AND THERAPY FOR COUPLES AND FAMILIES / July 2003Fall, Lyons / ETHICAL CONSIDERATIONS
❖ Ethics
Ethical Considerations of Family Secret
Disclosure and Post-Session Safety Management
Kevin A. Fall
Christy Lyons
Loyola University—New Orleans
The ethical issues involved in the disclosure of family secrets in ther-
apy have been addressed in the literature, but the focus has typically
been on secrets disclosed in individual sessions. The literature
largely ignores the ethical issues surrounding in-session disclosure
and the concomitant liability of the family therapist for the post-ses-
sion well-being of the system’s members. This article explores types
of family secrets, provides a case example of in-session disclosure,
and presents ethical considerations and practice recommendations.
Keywords: family secrets; ethics; confidentiality; abuse; safety
A
family without secrets is like a two-year-old without
tantrums: a rarity. Virtually every family has secrets
involving academic problems, relationship dynamics, or even
various illegalities. Secrets permeate the family system
before therapy begins, but with the introduction of the thera-
pist, the system begins to change. The therapist ideally creates
an environment that challenges the boundaries and rules of
the system; this is the nature of therapy. As a result of the
sense of safety within the session, it is conceivable that a fam-
ily member may disclose information that has been hidden for
a wide variety of reasons. Any unearthing of hidden material
will create a disequilibrium within the system. Family thera-
pists are trained to handle the consequences of such a disclo-
sure in session and ethically lay the groundwork for timely
disclosures. Dealing with this disclosure and its impact on the
system often becomes the primary focus of the therapy, as the
perturbation caused by the disclosure can serve as a catalyst to
reorganize the system.
However, not all information is disclosed at the “perfect
time.” In fact, the idiosyncratic internal sensing of safety by
any member of the family may trigger a disclosure prema-
turely. Secrets are such an omnipresent dynamic in the life of
family systems that it seems unlikely that any family therapist
could avoid untimely disclosures. Even in these unpredict-
able moments, a disclosure creates a disequilibrium that can
be productive in the therapy process as the secret and the pro-
cess of maintaining the secret are worked through in an
atmosphere of trust and safety. The ethical question here is
two-fold: What is the therapist’s responsibility in preparing
the family members for the potential risks of counseling that
may arise from such disclosures, and what is the responsibil-
ity of the family therapist to maintain the safety of the mem-
bers after a disclosure?
Although the International Association of Marriage and
Family Counselors’ (IAMFC).
10.11770022427803260263ARTICLEJOURNAL OF RESEARCH IN CRIME AN.docxchristiandean12115
This document summarizes competing theories on whether the perceived risk of punishment deters criminally prone individuals from committing crimes. It discusses three main perspectives: 1) that all individuals are equally deterred regardless of criminal propensity, 2) that criminally prone individuals are less deterred due to their impulsivity and focus on immediate gratification, and 3) that criminally prone individuals are more deterred since socialized individuals act based on moral obligations rather than costs/benefits. The article then analyzes data from a longitudinal study in New Zealand to test the relationship between criminal propensity, perceived punishment risks, and criminal behavior.
10.11770022487105285962Journal of Teacher Education, Vol. 57,.docxchristiandean12115
10.1177/0022487105285962Journal of Teacher Education, Vol. 57, No. XX, XXX/XXX 2006Journal of Teacher Education, Vol. 57, No. XX, XXX/XXX 2006
CONSTRUCTING 21st-CENTURY TEACHER EDUCATION
Linda Darling-Hammond
Stanford University
Much of what teachers need to know to be successful is invisible to lay observers, leading to the view
that teaching requires little formal study and to frequent disdain for teacher education programs. The
weakness of traditional program models that are collections of largely unrelated courses reinforce this
low regard. This article argues that we have learned a great deal about how to create stronger, more ef-
fective teacher education programs. Three critical components of such programs include tight coher-
ence and integration among courses and between course work and clinical work in schools, extensive
and intensely supervised clinical work integrated with course work using pedagogies linking theory
and practice, and closer, proactive relationships with schools that serve diverse learners effectively
and develop and model good teaching. Also, schools of education should resist pressures to water
down preparation, which ultimately undermine the preparation of entering teachers, the reputation
of schools of education, and the strength of the profession.
Keywords: field-based experiences; foundations of education; student teaching; supervision; theo-
ries of teacher education
The previous articles have articulated a spectac-
ular array of things that teachers should know
and be able to do in their work. These include
understanding many things about how people
learn and how to teach effectively, including as-
pects of pedagogical content knowledge that in-
corporate language, culture, and community
contexts for learning. Teachers also need to un-
derstand the person, the spirit, of every child
and find a way to nurture that spirit. And they
need the skills to construct and manage class-
room activities efficiently, communicate well,
use technology, and reflect on their practice to
learn from and improve it continually.
The importance of powerful teaching is
increasingly important in contemporary soci-
ety. Standards for learning are now higher than
they have ever been before, as citizens and
workers need greater knowledge and skill to
survive and succeed. Education is increasingly
important to the success of both individuals and
nations, and growing evidence demonstrates
that—among all educational resources—teach-
ers’ abilities are especially crucial contributors
t o s t u d e n t s ’ le a r n i n g . F u r t h e r m o re , t h e
demands on teachers are increasing. Teachers
need not only to be able to keep order and pro-
vide useful information to students but also to
be increasingly effective in enabling a diverse
group of students to learn ever more complex
material. In previous decades, they were
expected to prepare only a small minority for
ambitious intellectual work, whereas they are
now expected to prep.
10.1 What are three broad mechanisms that malware can use to propa.docxchristiandean12115
10.1 What are three broad mechanisms that malware can use to propagate?
10.2 What are four broad categories of payloads that malware may carry?
10.3 What are typical phases of operation of a virus or worm?
10.4 What mechanisms can a virus use to conceal itself?
10.5 What is the difference between machine-executable and macro viruses?
10.6 What means can a worm use to access remote systems to propagate?
10.7 What is a “drive-by-download” and how does it differ from a worm?
10.8 What is a “logic bomb”?
10.9 Differentiate among the following: a backdoor, a bot, a keylogger, spyware, and a rootkit? Can they all be present in the same malware?
10.10 List some of the different levels in a system that a rootkit may use.
10.11 Describe some malware countermeasure elements.
10.12 List three places malware mitigation mechanisms may be located.
10.13 Briefly describe the four generations of antivirus software.
10.14 How does behavior-blocking software work?
10.15 What is a distributed denial-of-service system?
.
10.0 ptsPresentation of information was exceptional and included.docxchristiandean12115
10.0 pts
Presentation of information was exceptional and included all of the following elements: Identifies the role of concept analysis within theory development. Identifies the selected nursing concept. Identifies the nursing theory from which the selected concept was obtained. A nursing theory was used. Identifies the sections of the paper. Scholarly support from nursing literature was provided.
9.0 pts
Presentation of information was good, but was superficial in places and included all of the following elements: Identifies the role of concept analysis within theory development. Identifies the selected nursing concept. Identifies the nursing theory from which the selected concept was obtained. A nursing theory was used. Identifies the sections of the paper. Scholarly support from nursing literature was provided.
8.0 pts
Presentation of information was minimally demonstrated in the all of the following elements: Identifies the role of concept analysis within theory development. Identifies the selected nursing concept. Identifies the nursing theory from which the selected concept was obtained. A nursing theory was used. Identifies the sections of the paper. Limited scholarly support from nursing literature was provided.
4.0 pts
Presentation of information in one or two of the following elements fails to meet expectations: Identifies the role of concept analysis within theory development. Identifies the selected nursing concept. Identifies the nursing theory from which the selected concept was obtained. A nursing theory was used. Identifies the sections of the paper. Limited or no scholarly support from nursing literature was provided.
0.0 pts
Presentation of information is unsatisfactory in three or more of the following elements: Identifies the role of concept analysis within theory development. Identifies the selected nursing concept. Identifies the nursing theory from which the selected concept was obtained. A nursing theory was used. Identifies the sections of the paper. Limited or no scholarly support from nursing literature was provided.
10.0 pts
This criterion is linked to a Learning Outcome Definition/Explanation of Selected Concept
25.0 pts
Presentation of information was exceptional and included all of the following elements: Defines/explains the concept using scholarly literature (a dictionary maybe used for this section ONLY, and additional scholarly nursing references are required). Provides support from scholarly sources.
22.0 pts
Presentation of information was good, but was superficial in places and included all of the following elements: Defines/explains the concept using scholarly literature (a dictionary maybe used for this section ONLY, and additional scholarly nursing references are required). Provides support from scholarly sources.
20.0 pts
Presentation of information was minimally demonstrated in the all of the following elements: Defines/explains the concept using scholarly literature (a dictionary maybe used for thi.
10-K
1
f12312012-10k.htm
10-K
UNITED STATES
SECURITIES AND EXCHANGE COMMISSION
Washington, DC 20549
FORM 10-K
(Mark One)
R
Annual report pursuant to Section 13 or 15(d) of the Securities Exchange Act of 1934
For the fiscal year ended December 31, 2012
or
o
Transition report pursuant to Section 13 or 15(d) of the Securities Exchange Act of 1934
For the transition period from __________ to __________
Commission file number 1-3950
Ford Motor Company
(Exact name of Registrant as specified in its charter)
Delaware
38-0549190
(State of incorporation)
(I.R.S. Employer Identification No.)
One American Road, Dearborn, Michigan
48126
(Address of principal executive offices)
(Zip Code)
313-322-3000
(Registrant’s telephone number, including area code)
Securities registered pursuant to Section 12(b) of the Act:
Title of each class
Name of each exchange on which registered*
Common Stock, par value $.01 per share
New York Stock Exchange
__________
* In addition, shares of Common Stock of Ford are listed on certain stock exchanges in Europe.
Securities registered pursuant to Section 12(g) of the Act: None.
Indicate by check mark if the registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act. Yes R No o
Indicate by check mark if the registrant is not required to file reports pursuant to Section 13 or Section 15(d) of the Act. Yes o No R
Indicate by check mark if the registrant (1) has filed all reports required to be filed by Section 13 or 15(d) of the Securities Exchange Act of 1934 during the preceding 12 months (or for such shorter period that the registrant was required to file such reports), and (2) has been subject to such filing requirements for the past 90 days. Yes R No o
Indicate by check mark whether the registrant has submitted electronically and posted on its corporate Web site, if any, every Interactive Data File required to be submitted and posted pursuant to Rule 405 of Regulation S-T (§232.405 of this chapter) during the preceding 12 months (or for such shorter period that the registrant was required to submit and post such files). Yes R No o
Indicate by check mark if disclosure of delinquent filers pursuant to Item 405 of Regulation S-K (§229.405 of this chapter) is not contained herein, and will not be contained, to the best of registrant’s knowledge, in definitive proxy or information statements incorporated by reference in Part III of this Form 10-K or any amendment to this Form 10-K. R
Indicate by check mark whether the registrant is a large accelerated filer, an accelerated filer, a non-accelerated filer, or a smaller reporting company. See definitions of "large accelerated filer," "accelerated filer," and "smaller reporting company" in Rule 12b-2 of the Exchange Act. Large accelerated filer R Accelerated filer o Non-accelerated filer o Smaller reporting company o
Indicate by check mark whether the registra.
10-K 1 f12312012-10k.htm 10-K UNITED STATESSECURITIES AN.docxchristiandean12115
10-K 1 f12312012-10k.htm 10-K
UNITED STATES
SECURITIES AND EXCHANGE COMMISSION
Washington, DC 20549
FORM 10-K
(Mark One)
R Annual report pursuant to Section 13 or 15(d) of the Securities Exchange Act of 1934
For the fiscal year ended December 31, 2012
or
o Transition report pursuant to Section 13 or 15(d) of the Securities Exchange Act of 1934
For the transition period from __________ to __________
Commission file number 1-3950
Ford Motor Company
(Exact name of Registrant as specified in its charter)
Delaware 38-0549190
(State of incorporation) (I.R.S. Employer Identification No.)
One American Road, Dearborn, Michigan 48126
(Address of principal executive offices) (Zip Code)
313-322-3000
(Registrant’s telephone number, including area code)
Securities registered pursuant to Section 12(b) of the Act:
Title of each class Name of each exchange on which registered*
Common Stock, par value $.01 per share New York Stock Exchange
__________
* In addition, shares of Common Stock of Ford are listed on certain stock exchanges in Europe.
Securities registered pursuant to Section 12(g) of the Act: None.
Indicate by check mark if the registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act.
Yes R No o
Indicate by check mark if the registrant is not required to file reports pursuant to Section 13 or Section 15(d) of the Act.
Yes o No R
Indicate by check mark if the registrant (1) has filed all reports required to be filed by Section 13 or 15(d) of the Securities
Exchange Act of 1934 during the preceding 12 months (or for such shorter period that the registrant was required to file such
reports), and (2) has been subject to such filing requirements for the past 90 days. Yes R No o
Indicate by check mark whether the registrant has submitted electronically and posted on its corporate Web site, if any,
every Interactive Data File required to be submitted and posted pursuant to Rule 405 of Regulation S-T (§232.405 of this
Page 1 of 216F 12.31.2012- 10K
3/7/2019https://www.sec.gov/Archives/edgar/data/37996/000003799613000014/f12312012-10k.htm
chapter) during the preceding 12 months (or for such shorter period that the registrant was required to submit and post such
files). Yes R No o
Indicate by check mark if disclosure of delinquent filers pursuant to Item 405 of Regulation S-K (§229.405 of this chapter)
is not contained herein, and will not be contained, to the best of registrant’s knowledge, in definitive proxy or information
statements incorporated by reference in Part III of this Form 10-K or any amendment to this Form 10-K. R
Indicate by check mark whether the registrant is a large accelerated filer, an accelerated filer, a non-accelerated filer, or a
smaller reporting company. See definitions of "large accelerated filer," "accelerated filer," and "smaller reporting company" in
Rule 12b-2 of the Exchange Act. Large accelerated filer R Accelerated filer .
10 What does a golfer, tennis player or cricketer (or any othe.docxchristiandean12115
10 What does a golfer, tennis player or cricketer (or any other professional sportsperson) focus on to achieve high performance? They nearly always give the same answer: “Repeat my process (that is the process they have practised a million times) – replicate it under real pressure and trust in my ability” That’s why Matthew Lloyd throws the grass up under the roof at Etihad Stadium. It is why Ricky Ponting taps the bat, looks down,
looks up and mouths “watch the ball”. It’s
unnecessary for Matthew Lloyd to toss the
grass. There’s no wind under the roof – it’s
simply a routine that enables him to replicate
his process under pressure.
Ricky Pointing knows you have to watch the
ball. Ponting wants the auto pilot light in his
brain to fl ick on as he mutters “watch the ball”.
High performance in sport is achieved through focusing on your
processes, not the scores.
It is absolutely no different in local government. Our business
is governance and we need to be focusing very hard on our
governance processes. We need to learn these processes, modify
them when necessary, understand them deeply, repeat them
under pressure and trust in our capabilities to deliver. If we do
that, the scores will look after themselves.
I want to share with you my ten most important elements in
the governance process. Let me fi rst say that good governance is
the set of processes, protocols, rules, relationships and behaviours
which lead to consistently good decisions. In the end good
governance is good decisions. You could make lots of good
decisions without good governance. But you will eventually
run out of luck – eventually, bad governance process will lead
to bad decisions. Consistently good decisions come from good
governance processes and practices.
Good governance is not only a prerequisite for consistently
good decisions, it is almost the sole determinant of your
reputation. The way you govern, the ‘vibe’ in the community
and in the local paper about the way you govern is almost the
sole determinant of your reputation. Believe me, if reputation
matters to you, then drive improvements through good
governance.
So here are the ten core elements:
1. THE COUNCIL PLAN
An articulate council plan is a fundamental fi rst step to achieving
your goals. It is your set of promises to your community for a
four-year term.
Unfortunately, there are too many wrong plans:
• Claytons Plans – say too little and are too bland. Delete the
name of the council from these plans and you can’t tell whose
it is! There’s no ‘vibe’ at all.
• Agreeable Plans – where everyone gets their bit in the plan.
There’s no sense of priorities, everyone agrees with everything
in the plan and we save all the real fi ghts and confl icts to be
fought out one by one over the four-year term.
• Opposition-creating Plans – we don’t do this so often but we
sometimes ‘use the numbers’ to enable the dominant group of
councillors to achieve their goals and fail to a.
10 Research-Based Tips for Enhancing Literacy Instruct.docxchristiandean12115
10 Research-Based Tips
for Enhancing Literacy
Instruction for Students
With Intellectual
Disability
Christopher J. Lemons, Jill H. Allor, Stephanie Al Otaiba,
and Lauren M. LeJeune
Literacy
T
E
A
C
H
IN
G
E
xc
ep
ti
on
al
C
h
il
d
re
n
,
V
ol
.
49
,
N
o.
1
,
p
p
.
18
–3
0.
C
op
yr
ig
h
t
20
16
T
h
e
A
u
th
or
(s
).
D
O
I:
1
0.
11
77
/0
04
00
59
91
66
62
20
2
by guest on October 20, 2016tcx.sagepub.comDownloaded from
http://tcx.sagepub.com/
TEACHING EXCEPTIONAL CHILDREN | SEPTEMBER/OCTOBER 2016 19
In the past 2 decades, researchers
(often working closely with parents,
teachers, and other school staff
members) have conducted studies that
have substantially increased
understanding how to effectively teach
children and adolescents with
intellectual disability (ID) to read. This
research focus has been fueled by
increased societal expectations for
individuals with ID, advocacy efforts,
and legislative priorities (e.g.,
strengthened accountability standards).
Findings from this body of work
indicate that children and adolescents
with ID can obtain higher levels of
reading achievement than previously
anticipated (Allor, Mathes, Roberts,
Cheatham, & Al Otaiba, 2014). Recent
research also suggests that the historic
focus on functional reading (e.g., signs,
restaurant words) for this population of
learners is likely too limited of a focus
for many (Browder et al., 2009).
Research outcomes suggest that
integrating components of traditional
reading instruction (e.g., phonics,
phonemic awareness) into programs
for students with ID will lead to
increases in independent reading skills
for many (Allor, Al Otaiba, Ortiz, &
Folsom, 2014). These increased reading
abilities are likely to lead to greater
postsecondary outcomes, including
employment, independence, and
quality of life. Unfortunately, many
teachers remain unsure of how to best
design and deliver reading intervention
for students with ID.
We offer a set of 10 research-based
tips for special education teachers,
general education teachers, and other
members of IEP teams to consider when
planning literacy instruction for students
with ID in order to maximize student
outcomes. For each tip, we describe our
rationale for the recommendation and
provide implementation guidance. Our
Literacy Instruction and Support
Planning Tool can be used by team
members to organize information to
guide planning. Our aim is to provide
educators and IEP team members with a
framework for reflecting on current
reading practices in order to make
research-based adjustments that are
likely to improve student outcomes.
The Conceptual Model of Literacy
Browder and colleagues (2009) proposed
a conceptual model for early literacy
instruction for students with severe
developmental disabilities. We believe
their framework provides guidance for
designing and delivering literacy
instruction for all students wit.
10 Strategic Points for the Prospectus, Proposal, and Direct Pract.docxchristiandean12115
10 Strategic Points for the Prospectus, Proposal, and Direct Practice Improvement Project
Week Two Assignment Instructions DNP 820
Please read the instructions thoroughly
Tutor MUST have a good command of the English language
The Rubric must be followed, and all the requirements met
This is a thorough professor, and she has strict requirements
I have attached the PICOT and the first 10 points (DNP 815) assignment. This is a continuation of that assignment. Please read the attachments
The following needs to be addressed:
Please note the followings: The introduction and the literature review are complete and thorough. The problem statement is written clearly PICOT is clear and very good Sample:
· How will you determine the sample size?
· What are the inclusion/exclusion criteria of the subjects? Methodology: Why is the selected methodology is appropriate? Please justify!
· Data collection approach needs to be clear. How will you collect your data? What is needed here is to describe the process of collecting data form signing the informed consent until completing the measuring.
· Data analysis-What test will you use to answer your research question?
Clinical/PICOT Questions:
“In adult patients with CVC at a Clear Lake Regional Medical Center, does interventional staff education about hub hygiene provided to RN’s who access the CVC impact CLABSI rates compared to standard care over a one-month period?”
P: Patients with Central Venous Catheters
I: Staff re-education related to Hygiene of the hub
C: Other hospitals
O: Reduce probability of CLABSIs
T: Two months
“In Patients > 65 years of age with central line catheters at a Clear Lake Regional Medical Center, how does staff training of key personnel and reinforcement of central line catheter hub hygiene after its insertion, along with the apt cleansing of the insertion site, before every approach compared with other area hospitals, reduce the incidence of CLABSIs (Central Line Associated Blood-stream Infections) over a one-month period?”
P: Patients > 65 years of age with a Central line
I: Staff training and reinforcement of Central Catheter, Hub Hygiene
C: Other area hospitals
O: Reduce probability of CLABSIs
“In adult patients, with define CVC (CVC), does interventional staff education about hub hygiene provided to RN’s who access the CVC impact CLABSI rates compared to pre and post-intervention assessments
1. I used central Missouri as an example, replace with a description of your site.
2. While you might be interested in CLASBI rates as a primary variable, there are other patient outcomes that would also be important to consider
3. Ensure you can find validity and reliability measures on CLASBI rates if you cannot, we need to determine another question to help
4. How are your two comparison groups different, as they are currently stated the groups seem very much the same, could you state, standard care instead of pre and post intervention assessments?
5. One month is the longe.
10 Most Common Errors in Suicide Assessment/Intervention
Robert Neimeyer & Angela Pfeiffer
1. Avoidance of Strong Feelings – Diverting discussions away from powerful, intense
emotion and toward a more abstract or intellectualized exchange. These responses keep
interactions on a purely cognitive level and prevent exploration of the more profound
feelings of distress, which may hold the key to successful treatment. Do not retreat to
professionalism, advice-giving, or passivity when faced with intense depression, grief, or
fear.
• Do not analyze and ask why they feel that way.
• USE empathy! “With all the hurt you’ve been experiencing it must be impossible
to hold those tears in.”
• Tears and sobbing are often met with silence of tangential issues instead of
putting into words what the client is mutely expressing: “With all the pain you’re
feeling, it must be impossible to hold those tears in.”
• “I don’t think anyone really cares whether I live or die.” Helpers often shift to
discussing why/asking questions as opposed to reflecting emotional content.
2. Superficial Reassurance – trivial responses to clients’ expressions of acute distress and
hopelessness can do more harm than good. Rather than reassuring clients, these responses
risk alienating them and deepening their feelings of being isolated in their distress.
• Attempts to emphasize more positive or optimistic aspects of the situation: “But
you’re so young and have so much to live for!”
• Premature offering of a prepackaged meaning for the client’s difficulties: “Well
life works in mysterious ways. Maybe this is life’s way of challenging you.”
• Directly contradicting the client’s protest of anguish: “Things can’t be all that
bad.”
3. Professionalism – Insulating or protecting by distancing and detaching from the brutal,
exhausting realities of clients’ lives by seeking refuge in the comfortable boundaries of role
definition. The exaggerated air of objectivity/disinterest implies a hierarchical relationship,
which may disempower the client. Although intended to put a person at ease, this can come
across as disinterest or hierarchical. Empathy is a more facilitative response.
• “My thoughts are so awful I could never tell anyone” is often met with, “You can
tell me. I’m a professional” as opposed to the riskier, empathic reply.
4. Inadequate Assessment of Suicidal Intent – Implicit negation of suicide threat by
responding to indirect and direct expressions of risk with avoidance or reassurance rather
than a prompt assessment of the level of intent, planning, and lethality. Most common
among physicians and master’s level counselors – due to time pressures, personal theories
or discomfort with intense feelings.
• What they’ve been thinking, For how long, Specific plans/means, Previous
attempts
1
• “There’s nowhere left to turn” and “I’d be better off dead” should be met with
“You sound so miserable. Are y.
10 Customer Acquisition and Relationship ManagementDmitry .docxchristiandean12115
10 Customer Acquisition and Relationship Management
Dmitry Kalinovsky/iStock/Thinkstock
Patronage by loyal customers yields 65 percent of a typical business’ volume.
—American Management Association
Learning Objectives
After reading this chapter, you should be able to do the following:
• Identify how organizational growth is best achieved by an HCO, and state the effect of the product life cycle
on an organization’s revenues.
• Discuss several approaches that an HCO can use to attract new customers, or patients.
• Delineate the premises upon which customer relationship management is based.
• Explain the advantages of database marketing, and identify ways for an organization to use a marketing
database.
• Provide examples of how an HCO can effectively manage real and virtual customer interactions.
Section 10.1Organizational Growth
Introduction
This chapter focuses on how to attract and keep patients through understanding and meeting
their needs. The long-term success of an HCO depends on its ability to attract new patients
and turn them into loyal customers who not only return for needed services, but recommend
the HCO’s services to others. This is especially important because of the nature of the life cycle
for products and services, from their introduction to their decline. Attracting new customers
and keeping existing ones involves interacting internally and externally with patients, analyz-
ing data on current patients, and managing real and virtual interactions with patients. Manag-
ing relationships with patients helps to ensure that patients stay informed and feel connected
to the HCO through its internal and external customer relationship efforts.
10.1 Organizational Growth
Most organizations have growth as a basic goal. Growth means an increase in revenue and
a greater impact on the communities served. Growth also creates opportunities for staff to
advance and take on new responsibilities. While many activities can help an HCO grow, the
most important is the development of an effective marketing plan to provide a consistent
platform for the organization’s visibility and to brand the HCO as an attractive option for
medical services. The development of an effective marketing plan was stressed in Chapter 8
as a basic marketing need for an HCO: that is, to inform new and existing customers of the
organization’s services and to persuade them to continue using or to try using these services.
Product/Service Life Cycles
Like people, products and services have a life cycle. The term product life cycle refers to the
stages that a product or service goes through from the time it is introduced until it is taken
off the market or “dies.” The stages of the product life cycle, illustrated in Figure 10.1, usually
include the following descriptions:
• Introduction—The stage of researching, developing, and launching the product or
service.
• Growth—The stage when revenues are increasing at a fast rate.
• M.
10 ELEMENTS OF LITERATURE (FROM A TO Z) 1 PLOT (seri.docxchristiandean12115
10 ELEMENTS OF LITERATURE (FROM A TO Z)
1 PLOT (series of events which make-up a story)
A 5-POINT PLOT SEQUENCE:
Exposition: initial part of a story where readers are exposed to setting and characters.
Situation: event in the story which kicks the action forward and begs for an outcome.
Complication: difficulties faced by characters as they experience internal and external conflicts.
Climax: watershed moment when it becomes apparent that major conflicts will be resolved.
Resolution: (Denouement): tying up of the loose ends of the story.
B SUB-PLOTS: PLOTS BENEATH AND AROUND THE MAJOR PLOT.
Foreshadowing: hints and clues of plot.
Flashback: portion of a plot when a character relives a past experience.
Frame story: plot which begins in the present, quickly goes to the past for story, then returns.
Episodic plot: a large plot sequence that is made up of a series of minor plot sequences.
Plausibility: likelihood that certain events within a plot can occur.
Soap Opera: multiple stories told along the sequence and spaced to sustain continual interest.
2 POINT OF VIEW (eyes through which a story is told)
C First Person major (participant major): narrator is the major character in the story.
First Person minor (participant minor): narrator is a minor character in the story.
Third Person omniscient (non-participant omniscient): narrator is outside the story and capable of
seeing into the heart, mind and motivations of all characters.
Third Person limited (non-participant limited): narrator is outside the story and capable of seeing, at
most, into the heart, mind, and motivations of one character. Narrator is
objective if not omniscient.
3 SETTING (time and place of a story, both physical and psychological)
D Physical (external) Setting: the time and place of a story, general and specific.
Psychological (internal) Setting: mood, tone, and temper of story.
E Major Tempers: Romanticism: man is free to choose against moral, spiritual backdrops. If you make
good decisions, you will be rewarded. There is a God that is in control
Existentialism: man is free to choose absent backdrops other than his own. If he feels it is right, then it is
right.
Naturalism: man is largely trapped, a cog in the impersonal machinery. He has no real way of
changing his circumstances.
Realism: eclectic view, but leaning toward the naturalistic position. Sometimes good things happen to
bad people, and sometimes bad things happen to good people. That is just the way it is.
F Other Tempers: Classicism: Man is free, but appears to be trapped due to conflicting codes.
Transcendentalism: Offshoot of romanticism, nature is a window to divine.
Nihilism: Fallout of either extreme existentialism or naturalism. Life is horrible and painful. It
lacks meaning.
4 CONFLICT (nature of the problems faced)
G Four Universal Conflicts: Person versus self
Pe.
10 ers. Although one can learn definitions favor- able to .docxchristiandean12115
10
ers. Although one can learn definitions favor-
able to crime from law-abiding individuals,
one is most likely to learn such definitions
fiom delinquent friends or criminal family
A Theory of sociation members. with These delinquent studies typically others find is the that best as-
Differential predictor of crime, and that these delinquent others partly influence crime by leading the
individual to adopt beliefs conducive to
Association crime (see Agnew, 2000; Akers, 1998; Akers and Sellers, 2004; Waw, 2001 for summaries
of such studies).
Sutherland 's theory has also inspired
Edwin H. Sutherland dnd much additional theorizing in criminology.
Theorists have attempted to better describe
Donald R. Cressey the nature ofthose definitions favorable to vi-
olation of the law (see the next selection in
Chapter 11 by Sykes and Matza). They have
Before Sutherland developed his theory, attempted to better describe the processes by
crime was usually explained in t e r n ofmul- which we learn criminal behavior from oth-
tiple factors-like social class, broken homes, ers (see the description o f social learning the-
age, race, urban or rural location, and mental ory by Akers in Chapter 12). And they have
disorder. Sutherland developed his theory of drawn on Sutherland in an effort to explain
differential association in an effort to explain group differences in crime rates (see the Wolf-
why these various factors were related to gang and Ferracuti and Anderson selections
crime. In doing so, he hoped to organize and in this part). Sutherland's theory o f differen-
integrate the research on crime u p to that tial association, then, is one of the enduring
point, as well as to guide future research. classics in criminology (for excellent discus-
Sutherlandk theory is stated in the f o m o f sions ofthe current state o f differential asso-
nine propositions. He argues that criminal ciation theory, see Matsueda, 1988, and Waw,
behavior is learned by interacting with oth- 2001).
ers, especially intimate others. Criminals
learn both the techniques of committing
crime and the definitions favorable to crime References
from these others. The s k t h proposition> Agnew Robe*. '2000. "Sources of Mminality:
which f o r n the heart of the theory, states Strain and Subcultural Theories." In Joseph F.
that 'h person becomes delinquent because of Sheley (ed.), Criminology: A Contemporary ,
an excess of definitions favorable to law vio- Handbook, 3rd edition, pp. 349-371. Belmont,
lation over definitions unfavorable to viola- CA: Wadsworth.
tion oflaw."According to Sutherland, factors Akers, Ronald L. 1998. Social Learning and So-
such as social class, race, and broken homes cia1 Structure: A General Theory of Crime and
influence crime because they affect the likeli- Deviance. Boston: Northeastern University
hood that individuals willdssociate with oth- Press.
ers who present definitions favorable to Akers, Ronal.
10 academic sources about the topic (Why is America so violent).docxchristiandean12115
10 academic sources about the topic (Why is America so violent?)
*Address all 10 academic sources in the literature review
*What have they added to the literature?
*End literature review with "What has not been addressed is.... "and with "What I'm Addressing....." (I am addressing that overpopulation is the main reason America is so violent).
*Literature review should be a minimum of 2-2 1/2 pages
Attached are my 10 academic sources.
.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
Your Skill Boost Masterclass: Strategies for Effective Upskilling
ITSP #2 Assignment HintsFirst, you will revise ITSP #1’s assignm.docx
1. ITSP #2 Assignment Hints
First, you will revise ITSP #1’s assignment with my feedback
and it will precede ITSP #2’s assignment, on the same
document.
IT Strategies: There will be a minimum of one internal IT
strategy and two business-enabling IT strategies. They will not
be the same organizational strategic objectives you used for the
ITSP #1 assignment, nor are they the completion of any of the
systems in the IT Portfolio unless you justify how they align to
the corporate strategic business objectives. To make it very
clear, discuss the relationship between the strategies you
present with the corporate strategic business objectives.
Discuss how they will benefit RR and any external customers or
processes. (Per the assignment, internal and external strategies
are discussed in Chapter 9. For an explanation of internal and
external IT strategies, see the portion of the text just prior to
Table 9.2). Discuss how they relate to your IT vision and
advance how RR uses IT (How does it enhance RR’s
operations? How is RR becoming more effective in their
operations, how are they becoming more efficient and
productive through the use of IT? What are the CIO and staff
doing to put IT to better use?)
IT Portfolio: This must include the systems in the Inventory of
Current IT Projects from the ITSP #1 assignment and the
proposed project you will present in the next section. Utilize
the table that is provided and list the projects by functional
area.
Proposed Project: This will not be any of the projects presented
in the Current Inventory of IT Projects from the ITSP #1
assignment. You can scrap a current system (Fleet
Maintenance, Route Optimization/Freight Tracking) and
integrate a new solution, but considerable thought should be
made prior to making that decision. It can be a new solution
not being covered in the Current Inventory of IT Projects. The
2. project must support either the internal IT or business-enabling
strategy presented in section #1 of this assignment. (You can
propose a specific vendor package though it is not necessary.
However, if you are incorporating an integrated solution, you
should discuss the various features of the package that are
appropriate for the study.
Solution
s such as backups, training of employees, utilizing social media
and involving Human Resources are not appropriate solutions
for this assignment.) To ensure you are on the right track,
explain the relationship between your proposed project andthe
internal IT/business-enabling strategy.
· How Inventory System Software Can Help Reduce Costs –
BusinessBee, S.
Teczar:http://www.businessbee.com/resources/operations/how-
inventory-system-software-can-help-reduce-costs/
· Axon - Trucking Software: http://www.axonsoftware.com/
· Cheetah.com, Delivery and LTL Software | Cheetah Software
Systems: http://www.cheetah.com
Risk Management: Explain how the risk you present relates to
the case study to ensure your risk information relates to the case
study facts.
· Risk Management; Establishing an Enterprise Risk
3. Management (ERM) Framework:
http://riskarticles.com/establishing-an-enterprise-risk-
management-erm-framework/
Business Continuity Planning: Ensure you cover these
requirements: (1) note generic steps of BCP presented in
chapter 27, (2) who should be involved, (3) note the three most
important systems at RR that should incorporate a BCP plan and
justify your choices with explanations, and, (4) specific steps
that Carol can take to ensure those three systems will be
available for RR along with specific technologies used to ensure
their availability. You can integrate the generic steps (1) with
specific steps that Carol can take (4) into the same discussion.
· Business Continuity Planning
· Guide to Business Continuity Management, 3rd Edition,
Protiviti: http://resources.idgenterprise.com/original/AST-
0101215_Guide-to-BCM-Third-Edition-Protiviti.pdf
· Cantor Fitzgerald Story, Disaster Recovery After 9/11:
http://wps.prenhall.com/bp_laudon_essmis_6/21/5556/1422339.
cw/content/index.html
· Business Continuity: Disaster Recovery Is Not Business
Continuity:
http://www.datacenterknowledge.com/archives/2013/01/04/disas
ter-recovery-is-not-business-continuity/
· Ready.gov on Business Continuity:
4. http://www.ready.gov/business-continuity-planning-suite
External Research: The external resources should be different
than the ones presented for the ITSP #1 assignment.
Introductory Paragraphs: Any introductory paragraphs should
be presented thoroughly and not just simple statements like
“The table presented below shows the IT Portfolio”. Explain
and elaborate upon the content that is presented in the table.
2
March 28, 2016
6/7/2015 1
Case Study: Rusty Rims (RR) Distribution Company
Overview
RR is a regional transportation and distribution company in
operation for over 60 years. The company
serves major cities in the Mid-Atlantic region. They are
5. headquartered in Wilmington, Delaware and
have a staff of 400 employees including truck drivers. There are
6 distribution terminals (Philadelphia
PA, Baltimore MD, New York City, Washington DC, Newark
NJ and Wilmington DE) for consolidating
freight, and 100 delivery vehicles including 20 tractor/semi-
trailer units, 40 box trucks and 40 panel
vans.
The company operates in a highly competitive business
environment. Growth has been stagnant
because of a slow economy. John, the president of the company,
would like to see growth at 5% per
year. He would also like to see expenses cut by 5% to help fund
new initiatives. Current revenue is about
$39 million a year with profit running at 4%.
To familiarize yourself with commonly-used shipping terms in
6. the freight industry, visit this site and refer
to it as you read the case study and assignments:
http://www.shipnorthamerica.com/htmfiles/glossary/gloss_shipt
erms.html
Current Business Operations
RR operates 24 hours a day, 7 days a week. Sales personnel (12
people, two per terminal) visit
prospective customers to outline company capability, services
provided and costs. When a customer
decides to use RR they call the dispatch office with shipment
information. Usually they FAX a copy of the
bill (s) of lading to a terminal with information such as origin,
destination, product description, weight
and number of packages.
A dispatcher at a terminal makes a list of freight pickups and
sends a truck to get the freight. To do this
7. they use the routing system to determine the sequence of
pickups by zip code. They use local maps
within a zip code to map out the specific order of pickups since
there may be several in a zip code area.
They have a performance goal of 98% of freight picked up
within 24 hours of availability.
A driver follows the dispatch order for pickups. Many of the
drivers complain that the pickup order is not
efficient. When they pick up an order they sign for receipt and
either load the freight or guide the
customer’s forklift operators to arrange it properly in the truck.
After freight is picked up it is brought to the terminal where it
is unloaded and sorted by destination. A
dispatcher then prepares a delivery ticket (again using the
routing system) that is used to load a truck in
the proper sequence for delivery. Some trucks take freight from
8. one terminal to another while others
make local deliveries. About half of a terminal’s space is used
on any given night. Dispatchers have a
goal to turn freight around in the terminal overnight for next
day delivery.
When freight is sent out for delivery, the driver follows the
delivery ticket order. Often they are held up
at a delivery destination by traffic or by lack of available
unloading space. This can cause the driver to be
http://www.shipnorthamerica.com/htmfiles/glossary/gloss_shipt
erms.html
6/7/2015 2
late trying to make the day’s deliveries. Sometimes they get to a
destination and the facility is closed
and they bring the freight back to the terminal for delivery the
9. next day. It is unloaded and re-sorted by
destination. The dispatchers then add it to the next day’s
delivery tickets.
The major freight volumes are between New York, Philadelphia
and Baltimore (about 70% of total
volume). Trucks run at about 70% of capacity between terminals
overall. Local delivery volume is
heaviest in New York, followed by Baltimore and then
Philadelphia. Local delivery trucks operate at
about 80% full while pickups fill about half of the vehicles
space. Some customers pick up and/or drop
freight at a terminal with their own equipment.
Truck drivers communicate with the dispatchers using two-way
commercial radios. Some also carry
personal cell phones and use them if the radio is out of range. A
few drivers also carry GPS devices to
10. help locate addresses. In general the drivers are content with the
company. Pay and benefits are good
and they get overtime pay when deliveries run late. Complaints
are few and mostly center around either
the sequence of pickup and delivery of shipments or vehicle
maintenance.
The fleet is maintained at the main Wilmington maintenance
shop and at a smaller shop in Washington.
Either one can handle minor maintenance and preventative
work. Only Wilmington can perform major
engine and transmission work. Overall the fleet is in good
operating condition. All vehicles are on a
preventative maintenance schedule which places them out of
service two days a month, usually on
weekends. Maintenance scheduling is a challenge because it can
interfere with the steady flow of
shipments both between terminals and for local delivery. There
11. are no “extra” vehicles in the fleet.
Administration
The company management team consists of the President, Vice
President of Operations, Chief Financial
Officer (CFO), Chief Information Officer (CIO), Sales Manager,
and a Fleet Manager who is in charge of
maintenance and safety. They meet weekly to discuss
opportunities and issues and to plan for the
future. Except for the CIO, the management team has been in
place for many years
The president of the company just hired its first Chief
Information Officer (CIO), Carol, after the previous
IT Director retired. She comes from a nearby manufacturer who
is also a major customer. At that
company she was Deputy CIO and primarily responsible for
network operations and security.
12. At a recent meeting the management team decided to change the
strategic plan for the business in
order to meet growth and cost goals. They highlighted three new
strategies they want to employ to
increase profitability and grow the business. First, they desire
to provide warehousing services for
customers who want to reduce delivery time to their customers
by having product available locally.
Second, they want to improve the percent of loaded miles in
their fleet to reduce costs by coordinating
the pickup and delivery of freight at the same time in the same
geographic area. Third, they want to
track the whereabouts of freight both in the terminals and on the
trucks to provide customers with
accurate delivery dates and times.
13. 6/7/2015 3
In addition, the management team wants to ensure that the
company remains in compliance with all
applicable federal and state regulations. The ones they are most
concerned about are: (1) the Sarbanes
Oxley financial audit and reporting requirements; (2) a new
federal requirement to conduct a vehicle
safety check every 10,000; and (3) a Federal Motor Carrier
Safety Administration (FMCSA) reporting
requirement on the number hours per day for each driver (or
max per week, etc.). The CFO has been
charged with the overall project. He has asked Carol to help
with this effort by modernizing information
systems to support the new strategies. She has decided her first
step is to update the IT strategic plan to
link to the new strategies in the corporate plan. Second, she
14. wants to engage her customers in a
proactive way to first, identify and prioritize IT projects that
will help meet the new goals, and then
develop a set of requirements for each project. Third, she wants
to decide on the best approach to
modernize the information systems that will meet requirements
at a reasonable cost, and for this she
will need to make some changes to the IT organization.
Technology
RR is using a mix of older technology products for finance and
accounting, route optimization, freight
tracking and fleet maintenance. There are several projects
already in the IT portfolio competing for
resources. The CIO sees a major challenge in balancing
available funding, IT staff workload and project
prioritization. The project nearest completion is the adoption of
15. the Accurate Financials System to
replace the aging finance and accounting system. It will be
completed in six months. There are two other
projects under way, one for management reporting and one for a
mobile application that sales staff can
use to show potential customers information on the fleet,
distribution services available and freight
rates, including a comparison to the competition.
The route optimization and freight tracking system is very
important to the operations manager and
dispatchers. The current system allows the input of freight
origin and destination information. This is
taken from a bill of lading which contains a plethora of specific
information. When the dispatchers enter
the origins and destinations into the system they are grouped by
zip code. The dispatchers then decide
16. which zip codes will be loaded in a truck and in what sequence
for delivery. This takes several hours at
night to accomplish and must be done as quickly as possible so
trucks can be loaded and sent out in the
morning for delivery. Arranging shipment sequence within a zip
code is done by locating each address
on a map and entering it into the system in the best order.
Pickups are handled in a similar manner.
The fleet maintenance system contains information on each
vehicle in the fleet. It includes all vehicle
specifications, a summary of all repairs, a preventive
maintenance schedule and an inventory of parts on
hand. This information is entered by accounting clerks,
mechanics, purchasing clerks and anyone else
who has time to do data entry. It is not as time consuming as the
routing system but it contains
information critical to fleet reliability. The greatest challenge is
17. scheduling preventative maintenance
since it requires vehicles to be down for two days. The
dispatchers do not want the equipment taken out
of service because it causes planning headaches. The
relationship between dispatchers and
maintenance personnel is strained.
6/7/2015 4
IT Organization
When Carol was hired as CIO last month she took a close look
at the current staffing. The IT staff consists
of 22 people, seven of whom are programmers. The
programmers are charged with all systems
18. development and integration work for the company. They have
three projects in their current portfolio.
Their skill sets include SQL, .Net and C+ programming, and
Web design.
There are six helpdesk personnel who support the six
distribution terminals (one at each terminal). The
remaining staff includes 2 network engineers, a financial
systems specialist (an expert in Accurate
Financials), a computer security expert, two shift supervisors
and the CIO and her two personal
assistants.
The IT staff supports multiple locations. At the Wilmington
headquarters/terminal there are 15 servers
(they contain all software and data; one stores a backup copy of
the data) and 30 PCs for accounting,
marketing, IT, administration and management. The terminal
operations office has 5 PCs for dispatchers,
19. one for the maintenance office, one for parts and one for drivers
in the driver lounge. The other 5
terminals have 10 PCs each and connect to headquarters by a
virtual private network (VPN).
IT Portfolio
Accurate Financials- This new system will replace the current
finance and accounting system. It is an off-
the-shelf product that requires the owner to make modifications
to interface with other systems they
may own. Two programmers are working on the project. One is
setting up the database and loading the
software on servers. The other is learning about the system in
order to write an interface with the
routing system. A representative of Accurate will train the
accounting staff in its use. This will take about
two weeks.
20. Management Reporting System- Senior management wanted to
know financial information on a daily
basis. Two programmers have been working on a system to
compile the data in a format they can use.
They plan to extract information from Accurate Financials when
it is ready but for now have focused on
the current system. They will be done in two months.
Mobile Marketing App- The marketing manager asked for an
app that sales staff could use to show
potential customers information. This would include things like
fleet photos and specifications; pictures
of the six terminals and information about the distribution
services RR can provide; and a comparison of
their costs using sample shipments with rates from competitors
compared to RR costs. A programmer
and the web designer are working on the project. It will take
21. two more months to complete.
The current design and development process is best described
by the way it worked in the selection and
integration of Accurate Financials. The CFO asked the (former)
CIO to develop a new finance and
accounting system. The CIO interviewed large, respected
companies and, after comparing their
capability to the current system, chose Accurate Financials.
Two programmers were assigned and an
Accurate Financials specialist was hired to work between IT and
the finance office. The CIO receives
progress reports every two weeks.
6/7/2015 5
Situation
22. When Carol was hired she toured each terminal to see the IT
setup and understand local business
operations. It was important to her to know just how each
person used the systems. She spent time with
bookkeepers and accountants, dispatchers, drivers and terminal
management. Since she came from one
of RR’s customers she knew that customers could offer insight
into business improvements that would
be good for both companies. She visited one large customer in
each of the terminal’s area of service to
get feedback on how operations between them and RR could be
improved. Her goal was to see how she
could translate what she learned into systems improvements.
Interestingly the most complaints came from bookkeepers and
accountants. They said the system was
slow and data entry was tedious because accuracy was very
23. important. If they entered wrong
information, it could cause incorrect billing (rates are based on
weight and size), improper loading (the
wrong zip code could mean sending freight in the wrong
direction unless a dispatcher caught the error),
and more. They estimated current accuracy at about 95% but
they had no way of knowing for sure.
Further, they complained about financial reporting and their
ability to meet compliance requirements.
Reporting was mostly a manual process and data they needed
from the system was not easily accessed.
Most of them had resorted to keeping small ledgers at their desk
to track information they knew they
would need for reporting.
The dispatchers explained that routing wasn’t all that hard, just
time consuming. The routing system
24. grouped all of the shipments by zip code. They would take all of
the shipments in a zip code and look at
the weight and size (how much cubic space each one needed in a
truck), plot them on a map and then
put them in delivery sequence. They thought most trucks left the
loading dock full and that that the
drivers made adjustments in delivery sequence when needed.
Pickups were a bit more challenging.
Sometimes they sent a truck out just to pick up freight and bring
it back to the terminal. Other times
they contacted a driver to ask them to stop at a customer to pick
up a shipment while they were making
deliveries. Since they didn’t know exactly how much space was
available on the truck this was a hit or
miss situation. Drivers were left to decide if they could make it
work.
Drivers were the most outspoken, probably because no one ever
25. asked for their opinion. They were also
the happiest of employees (this might explain why they were
non-union). They liked being able to make
decisions on the go and they knew the customers very well. In
fact they could call some of them if they
were running late and the customer would stay open so they
could deliver or pick up a shipment. They
seemed to have favorite customers and often spent extra time
with them talking about common
interests. Generally they were good ambassadors for the
company.
Terminal managers were under constant pressure. Their main
goal was to get shipments into and out of
the terminal as quickly as possible. Delivery times were
measured and part of their performance plan.
They knew the company had established three new strategies
because they were explained in an email
26. they just got. Carol asked how they might provide warehousing
services. Most felt they had extra space
and could take on some storage but keeping track of the
shipments might be a problem. They had to do
6/7/2015 6
this manually and the bookkeepers were the ones to keep the
records. They felt more bookkeepers
would be needed but they didn’t know how many.
Carol also met with the maintenance and safety staff at the
Washington terminal. The maintenance
folks had a large workload and complained that they had a hard
time getting equipment in the shop for
preventative work. They did not know when equipment would
be available until the last minute so
27. scheduling was always a scramble because they needed to make
sure mechanics were available to do
the work. They had a lot of complaints about shifting work
hours and the effect it had on their personal
lives.
The safety manager expressed concerns over driver hours of
service. There are federal regulations that
limit drivers to 10 hours of driving at a time. Then they need to
take an 8 hour break. The problem was
tracking the driver’s hours to make sure they stayed within the
law. Dispatchers tried to help with this
when they scheduled pickups and deliveries but there was no
easy way to do it and the results were
often based on best guess. The safety manager who was
ultimately responsible for compliance had
drivers turn in their hours each day but this was always after the
28. fact.
Carol’s customer visits were eye-opening. Most of the
customers had automated inventory systems and
could easily track products from raw material to finished goods.
They knew exactly what they would ship
and when, usually several days ahead of time. Some customers
however needed near instantaneous
shipping. They wanted same-day pickup in a lot of cases and
fast delivery. In most cases they were all
able to produce electronic documents such as the bill of lading
and email or FAX it to RR.
During her interview for the CIO position, Carol was told that
the previous IT Director had left a good
foundation and that the staff seemed sufficient in number and
appeared to be very capable. However,
since RR is developing its strategies for the future, the staff
must be able to support the business
29. strategies as well as the IT strategies that Carol would develop.
One of the first things Carol did was to
interview each member of her staff. She discovered that the
roles and responsibilities tended to overlap
and that morale among her staff was very low. Carol also
interviewed the senior leadership of RR and
learned that her staff was not meeting their expectations for
service. The help desk was perceived as
being only somewhat competent and took much too long to
respond to problems. Application
developers were very slow in delivering systems, and when the
systems were finally delivered, they did
not reflect what the customers needed or wanted. Network
outages occurred too often from the users’
perspective. Finally, the Chief Financial Officer told Carol that
the IT costs need to be reduced.
30. Carol knew she had many challenges. She was determined to
identify essential projects and then
prioritize them for management review. The outcomes would
affect almost every aspect of the
business. Her IT portfolio was about to grow and her
organization will need to change to meet the
challenges.
Chapter Twenty-Seven: Business Continuity Planning
Dave McCandless
OVERVIEW
Sage wisdom tells us that "Life is what happens when you're
busy making plans." A more recent version of this same
sentiment can be politely phrased as "Stuff happens." No matter
how it is said, the message is clear: As we go on about our daily
business, both personal and professional, disruptive events will
take place that have the potential to substantially change what
we had planned for our future.
For business, undefined change is very likely a bad thing.
31. Business plans define key objectives that must be met for the
business to survive. Deviation from these plans will likely
result in higher costs and lower revenues, sometimes to the
point where the business must pause or even cease to exist.
Stable businesses exist because their leaders are able to
understand the nuances of whatever industry they are in—they
find the path and navigate the obstacles to success. The good
leaders show us everyday how they can manage what they can
control.
But what happens when that control is threatened? How do these
leaders react to sustain a business when faced with disruptive
events? How do they ensure continuity of the business plan to
be able to achieve their key objectives? Leaders make this
happen by creating a company culture that methodically plans
and executes to sustain business operations when faced with
disruptive challenges.
Business continuity planning (BCP) is the self-imposed
discipline that defines how well a business can sustain
operations when faced with disruptive events. As a CIO you
will be part of this process, since in the information age a
substantial number, if not all, of a company's business processes
will rely on IT systems. This chapter will give you insight into
how to navigate the journey that is the discipline of BCP.
DEFINING THE NEED FOR BCP
32. While leaders universally agree that continuity planning is a
vital component of strategic business process delivery, they
have widely varied opinions on how to define and justify the
actual function that is BCP. Successfully defining the problem
means creating a crisp yet persuasive value proposition that
business leadership will endorse and champion.
Why We Plan
If all went according to plan, we would not need alternatives.
No spare batteries for the flashlight. No spare flashlight. No
candles for when you cannot find the flashlight. And no matches
for the candles, since we no longer use candles. But things do
not go according to plan—which means we are stuck with
figuring out how to plan for events that happen that we cannot
predict.
This gap creates the challenge to create a collection of
manageable business processes that can lead a company through
the resolution of disruptive events. There is a clear choice of
words here: disruptive meaning we will know what to do when
disruptions happen, but we likely will not know when the
disruptions will occur. Words like unforeseen and unexpected
could both be interpreted as events for which the company was
not prepared. Disruptive means events that change the course of
the action, but if planning is complete, the corrective action is
defined and methodically initiated. Planning for the continuity
of operations becomes the exercise and includes all operational
33. areas of the organization. Any foreseeable disruptions need to
be defined and then analyzed for their impact and eventual
remediation. When completed, operational procedures are
updated to include these new changes. To ensure correctness,
recurring testing must take place. As an ongoing process, these
changes likely represent a tremendous cost to a business—for
many foreseen disruptive events that may never happen.
Which leads to the question: At what cost? How much
investment must be funneled into this process to ensure
continuity? Answering this fundamental question is the
responsibility of senior management, since they ultimately are
responsible for the ongoing operation of the business.
Management has the final say in what processes are critical to
ongoing operations. Through this leadership process,
management communicates to the organization what is
important and sets the expectation for all business and
operations leaders to find sustaining solutions. Without
agreement on what is important at the time of the disruption,
chaos is the likely outcome.
Taking an example from history, one of our great planned
achievements has been to send men to the moon and return them
safely to Earth. These two simple objectives drove an
unprecedented continuity planning process that sought to
uncover every foreseeable disruptive event in NASA's Gemini
and Apollo programs. This led to an unfathomable price tag.
34. What percentage of this cost is attributable to contingency
planning? Can we make the argument that any of the planning
or the subsequent redundant systems deployment was not
required to meet the objective? Certainly few of these
contingency systems were ever used, but would we ever have
sent men into space without them?
Executive strategy requires that a choice be made of what kind
of BCP an organization will embrace. It must start at the top.
Expecting the Unexpected
Earthquakes. Hurricanes. Global economic collapse. Loss of
network connectivity at a critical call center. These and
thousands of other events like them jeopardize delivery of a
company's global business every day, all day. With rigorous
planning followed by methodical execution, these events will
not impact the business—in fact, they may add value. A
Thursday afternoon blizzard will not be nearly as well received
in Chicago as is will be in Aspen.
The Web has shaped all of us to expect always available, fully
functional services. Online shopping available 24/7. Customer
support available anytime via a text message, mouse click, or
iPhone. Instantaneous e-mail and chat responses. To achieve
these service levels, companies are increasingly less tolerant of
outages and have expectations that outage durations will be
minimal.
Dwight Eisenhower, a master planner, once said: "Plans are
35. nothing; planning is everything." This concept is the basis for
BCP: An organization that has taken the time and committed the
resources to plan for the unexpected will have a greater chance
of surviving than one that has not. An untested strongbox full of
backup tapes, user manuals, and contact lists could very well be
useless the minute it is opened. Yet in many companies this is
exactly the expectation—that some magic "survival package"
will be ready when needed at a time of crisis.
Internal expectations for high availability are not unique;
requirements are also on the rise for companies to be able to
demonstrate externally the capability of resiliency in the face of
impact events. Each year, more pressure is created from
business partners and regulatory agencies to show documented
proof of a continuity plan and its subsequent successful test
execution. The regulated permission to stay in business may be
dependent on a thorough and successful BCP process.
Adding Business Value
Is it reasonable to make a case that a strong BCP process can
add business value? Is avoiding unavailability of the business a
strong enough argument to gather support for BCP? Or do we
also need to make the case for tangible business value?
Risk professionals can demonstrate that, yes, there are
sufficient examples of businesses that are severely impacted by
business interruption. But for business leaders who require more
convincing, there are ways to make a case for how BCP adds
36. tangible business value. The details are not found in widgets
sold or expenses reduced; they are accumulated over time via
reduced incidents of outages and consistent costs of operation.
PROCESS OF CONTINUITY PLANNING
Many methodologies exist that explain the BCP process. This
section covers the basic concepts common to each. Any
organization pursuing BCP needs to craft a process that matches
its specific business needs.
Commitment to the Process
The first step in BCP is critical—recognition by leadership that
the organization needs a BCP strategy and commitment of
resources to support it. Executive sponsorship not only ensures
the commitment but demonstrates to all employees the
importance of the BCP process. Sponsorship means delegating
the BCP responsibility to an internal team of professionals that
will deliver on the objectives.
How should the BCP team be created? To add the most value,
the team should include a mix of journeyman members of both
business and services parts of the business. Members should
also have previous exposure to a BCP implementation or be
provided with formal training. Finally, a team leader with solid
project delivery experience is needed, preferably an internal
resource with sufficient authority and finesse to make change
happen.
37. Assigning responsibility without proper authority will destine
the process to languish with no chance of success. Also
assigning "any available resource" demonstrates a lack of
commitment to complete the task right the first time through.
External experts can assist to make the process happen, but the
right internal staffing is crucial to success.
Defining the Objectives
Once BCP oversight is created, the next step engages the BCP
leadership team with the company executives to define what are
the strategies and priorities for the business. Some examples:
Online companies need their commerce web sites available
24/7; grocery stores that survive by just-in-time inventory need
the doors open and the supply trucks rolling in; airlines need
not just planes and crews readily available but decent weather
in which to fly them. Each of these companies has the same
goal—to keep the goods and services moving that bring in the
revenue. Yet each has vastly different requirements as to what
are the priority activities of the company.
The responsibility belongs to the senior management team to
define the operations that are important. These are not low-level
decisions about e-mail and enterprise resource planning; these
are high-level, what-is-important-to-the-business decisions.
Once these critical business operations are identified and their
priorities of importance are established, the process cascades
down the management chain to subsequent levels as details are
38. added. Each business team participates as needed to add depth
to the requirements. When finished, the company has a clearly
defined business process classification—a target list of business
priorities.
Of course, none of this planning can be done in a vacuum—BCP
needs to coexist with other risk mitigation processes. Viable
organizations will likely have risk management policies in
place, so BCP objectives and risk mitigation objectives need to
be in alignment. Often businesses already will have recognized
this need and will have created a framework to bring similar
processes under one objectives-defining umbrella.
Determining Impact
The next step involves the tasks to identify and qualify the
impact on the business processes posed by the disruptive events.
To begin, the analysis team must determine the various event
categories to consider and, for each type of event category, the
specific events themselves. For example, in the case of natural
disasters, the specific events could be floods and tornados. In
the case of malicious attacks to computing systems, the specific
events could be denial of service attacks, intrusion attacks, and
spam e-mail injection overload attacks. Businesses must assess
their own unique requirements to define events and categories.
Once all the event details are fully defined, each event is
rated—both for the magnitude of the potential disruption as well
as the likelihood of the event actually happening. The smaller
39. the disruptive impact, or the smaller the likelihood of
occurrence, or the smaller the importance of the impacted
capability means the overall business impact is low.
The common tool used in BCP to facilitate this process is the
business impact analysis (BIA). This inspection of each critical
business process will identify scenarios where interruptions or
failures may happen, the likelihood of them happening, and the
damage they will likely do to business operations when they
happen. The BIA will also establish how quickly a business
process can return to operation (recovery time objective), and
what levels of functionality and data availability must exist
within the business process (recovery point objective). Once
completed, the BIA provides a complete specification of
requirements on how to enhance the business processes that will
result in the most effective mitigation of impact of disruptive
events.
Knowing how to measure impact becomes an interesting
exercise. For example, in the area of IT, an interesting paradox
has emerged: Just how important is e-mail? Seldom does the
process of sending and receiving e-mail account for any
substantial amount of revenue, yet it is hard to imagine a
company's staff completing useful tasks if e-mail is not
available. But now consider business-to-business or business-to-
consumer messaging: Any company that relies on its internal e-
mail infrastructure for significant communication with
40. customers and partners substantially raises the impact potential
of loss of any part of this infrastructure and operation. So now
how important is e-mail? This is a good example of the kinds of
questions the BIA works to answer.
Creating the BC Strategy
Armed with the management priorities and the business impact
findings, the next process is to create a strategy for business
continuity that ensures ongoing business operations. Two
remediation types are possible: corrective remediation that
minimizes impact and restores operations, and preventive
remediation that expands operational capabilities to withstand
outages. Additionally, multiple strategies can be created that
will provide resumption of some aspects of business operations.
Equally possible is that the same impact can be resolved by
differing recovery solutions. Total cost of the various
possibilities will play a significant part in defining the strategy.
A quick analysis of alternate data center strategies is a good
example of how to apply these principles. Companies with a
single data center that rely on an outsourced provider for an
alternate data center have chosen to correct the disruption of the
loss of their only site by moving to the alternate site.
Companies with multiple data centers with integration of
systems and operations across sites have chosen to avoid or
prevent disruptions by managing transaction activities through
distribution. Which remediation type to choose is driven by a
41. compromise between business needs and available funding.
Creating the BCP strategy also means engaging the various
business units to elaborate on their technology dependencies.
Many business units may expect IT to own this investigation on
their behalf. However, this expectation is flawed, given that IT
only provides the platform and is in no position to judge the
critical importance of the various capabilities of business
systems.
Once the importance of all critical systems and their outage
impact are established, the final steps in creation of the strategy
are to define which systems are selected for operational and
technology changes. While simple in concept, this process
defines where the investments in the business should be made to
fulfill the requirements of the strategy.
Implementing the BC Strategy
The implementation process is the execution of the details
described in the strategy. Simply stated, this is the process that
implements value changes to existing operations and
infrastructure that will result in higher resiliency to impact
events. Up until this stage, all previous BCP activity is focused
on analysis. BCP implementation forces a change process and
creates the potential for disruption to these critical business
systems due to the change itself.
Implementation also includes other areas critical to the
business: updated emergency response procedures, the creation
42. or upgrade of an emergency operations center capability,
updated crisis management capabilities, and updated BCP
training and education procedures. A fully-defined BCP testing
process must be deployed and validated to ensure the changes
are implemented and will deliver the expected results.
Ongoing Plan Maintenance
The final step in the BCP process is to ensure that this strategic
planning exercise is not a one-time event but continues on
through regular and predictable execution. This ongoing process
will provide additional business value if continuous
improvement techniques are performed as part of year-to-year
program management.
It is very likely that new requirements will emerge as the BCP
process is in execution. Like any other large project, scope
creep can be assured. Testing with partners and outside
agencies? Review of test plans to meet BCP objectives? Review
of management objectives for comparison with BCP objectives
to ensure they are still in alignment? Adding new lines of
business or retiring old ones? Adjusting to substantial changes
to the market or customers? Many questions like these will
emerge during the execution of the analysis and deployment
processes.
Business processes will undergo constant change. New types of
disruptive events will emerge to threaten the business.
Executive objectives and priorities will change. The BCP
43. process must continue to adapt to these changes to avoid the
impacts of disruptive events.
STRATEGIC VALUE OF BCP
Measuring the business value of BCP is tricky. In the classic
sense, the question has been What is peace of mind worth? But
as the process of BCP becomes better understood, organizations
discover how the process creates value to distance them from
the competition.
Value before a Disruptive Event
In a world where every interconnected organization deploys
some amount of BCP, regulatory and certification agencies will
continue to require more resiliency capability before granting
permission to participate. For companies with strong BCP, this
process will prove to be a filter to slow weaker industry
competition, creating a competitive advantage.
Having the appropriate BCP processes in place at the right time
enables a company to focus on the core business. Having
insufficient BCP in place could mean diverting key resources to
the BCP process to bring it up to a minimal industry standard.
Perhaps the business intends this catch-up as part of the
strategic plan—a reasonable business strategy. But it raises an
interesting question: Without sufficient investment in the BCP
process, how would a company know what is a minimal
acceptable level of BCP, and how would it know when it has
44. caught up?
For companies that struggle with tracking the maturity of their
various business units and their interactions, a strong BCP
process can add management value. Since the basis of BCP is to
ensure continuity across the entire business, BCP participation
will identify business capabilities in need of improvement. This
leads to resiliency across the entire organization to withstand
impact events and create a healthier business process
environment.
Value after a Disruptive Event
As soon as a substantially disruptive event occurs, the first
reaction from all involved will be "Good thing we made the
investment in BCP." Of course, if there was minimal or no
investment in BCP, the reaction will be much different.
A well-crafted BCP process will go into execution
automatically—procedures will be followed and operations
teams will execute according to plan. Companies that have
planned well will be seen as strategic thinkers and will likely
see their brand value and possibly their financial position
improve due to their ability to sustain operations. Their
immediate and well-honed messages to customer, partners, and
the general public will instill a sense of respect and feeling that
"I want to be in business with this company." Not only will the
company sustain its current business, but in all likelihood it will
generate new business.
45. But the added value does not stop there. Disasters as impact
events may put businesses in various market segments or
geographic regions temporarily or permanently out of action.
Companies designed to adapt quickly can aggressively take on a
greater share of an existing market or get a foothold in a new
one. BCP in this case becomes an enabler of business
opportunity—what would have been lost opportunity is now
possible because of a previous commitment to BCP.
WHAT BCP IS NOT
Now that we have talked a bit about what BCP is, it is
worthwhile to spend some time on what it is not. There is often
confusion in the business world on the value of BCP. Those
companies that do not recognize the value will not understand
the discipline and will perpetuate the misconceptions.
BCP is Not Disaster Recovery
One aspect of BCP is the ability to recover from disasters, or
disaster recovery (DR). While the exact numbers will vary, the
industry consensus is that fewer than one in five business-
disruptive events are caused by disasters, such as hurricanes,
floods, and earthquakes. With 80 percent of the impact posed by
nondisasters, wouldn't a company be better off spending time on
nondisaster recovery (NDR)?
Ironically, no one ever asks about an NDR plan, nor do any CIO
peer-level discussions ever address the value of an NDR plan.
46. Even a recent Google search found zero results for "nondisaster
recovery plan" but over 400,000 results for "disaster recovery
plan."
This one area creates so much confusion in the industry that it
is worth addressing in detail: Disaster recovery is not business
continuity. Years ago in a less mature IT world, the
methodology was called DR. DR may be an integral part of
BCP, but only a small part, and depending on the nature of the
business, it may be a minor part of the BCP process. A future
CIO's best approach is to learn to use the terms BCP and DR
correctly. And when faced with a DR-centric organization, it
will make for quite an education challenge.
BCP is Not Insurance
As a business discipline, insurance is the end result of defining
a monetary value to an asset such that in the loss of that asset,
your insurance partner will pay you the agreed value of that
asset. The process of obtaining the insurance includes the
process for assigning value to the assets—which in turn implies
some discovery process for identifying of all the company's
assets, followed by the determination on which assets are
worthy of a declared a value.
While insurance may be part of contingency planning, the BCP
process is too important to the survival of the business to
relegate to another annual finish-and-forget-it process.
Insurance is normally a process the finance team uses to
47. mitigate the cost to replace key assets without incurring the
costs of the replacement.
True business leaders understand that BCP is not a loss
mitigation computation but a strategic business-sustaining
process that needs ongoing attention. They recognize that
business operations will have continuity procedures interwoven
into daily activities. They are willing to accept the cost of BCP
beyond that of simple asset replacement.
BCP is Not a Part-Time IT Job
Companies that expect to stay in business when faced with
disruptive events understand the need for BCP. Those that do
not understand the value will often do just enough to get by—
and that means doing what is minimally required to pass the
many audits imposed across the company's administrative
functions.
Take an example of a company with a web site as its primary
platform for business transactions that is suddenly faced with a
disruptive event. Most likely the IT team has created a solution
with the appropriate alternate site capabilities and 24/7 on-call
procedures for systems administration. But is the same true for
the customer service teams that support the customers: Do they
have alternate plans for e-mail, phone, chat, and other tools—
even a place to go to work—to execute their jobs? Are the
communications and marketing teams coordinated in advance to
be able to quickly and effectively get the word out about the
48. disruptive event? Does senior management have confidence that
the entire process will be put into motion with the same
effectiveness as normal daily operations?
Most small and many medium-size businesses choose not to
allocate sufficient funding to sustain an enterprise-wide BCP
process. Instead these companies may choose to have a minimal
few members of the IT team keep a current DR plan. This of
course creates BCP only if all your problems are planned
disasters and if the only impact to the business will be to IT.
EMERGING TECHNOLOGIES AND BCP
Each tick of the technology evolution clock brings IT planners a
variety of solutions available to them with the potential to
change the nature of systems recovery. BCP experts who for
decades practiced the concept of backup tape creation, off-site
media management, and emergency data center failure now have
a range of modern alternatives that will rewrite industry best
practices. Years from now even these cutting-edge capabilities
will seem archaic, but today they represent potential for
substantial value.
Virtualization
Enterprises large and small are reaping the benefits of using
tens or hundreds of standard computers to run thousands of
server images. This concept—creating fully encapsulated
application environments that are transient and adaptive across
49. hardware infrastructures—makes the process ideal to support
rapid recovery from the disruptive nature of impactful events.
Which is a better way to re-create a server: Spend hours
installing operating systems, then patches, the applications, then
more patches, then adjust configuration, or in minutes
instantiate another instance of the same server? And do so
anywhere in the global infrastructure? IT plans that incorporate
virtualization into daily operations will find that minor changes
to the process will simplify how the process expands to allow
fail-over and fail-back recovery operation activities between
multiple hot sites.
Systems management tools already exist that simplify the rapid
migration of workloads across data centers. Need to move
processing out of a data center threatened by a hurricane? Very
easy to accomplish if the enterprise core infrastructure is
already enabled for this capability.
As virtualization technologies mature, the product extensions
seen as unique to BCP will likely become transparent features
within product offerings. Planners will be able to use
configurations in the standard solutions to enable preventive
and corrective actions that kick in once disruptive events are
discovered—or, even better, anticipated.
Supernetworks
Gone are the days of high-cost, low-bandwidth networks.
Innovative communications technologies are driving new
50. methods for moving large quantities of data to multiple global
locations. Increasingly more intelligent data routing and
caching technologies allow for critical data to be replicated as
part of common business process to facilitate rapid remote site
recovery. As the concepts of "local" and "remote" blend,
planners will change the decision processes that have
traditionally defined global operations.
Cloud Computing
Cloud computing by its nature has the potential to change the
face of BCP for IT. The ability for business to quickly move its
computing resources across infrastructure capabilities the way
business travelers switch hotels creates massive flexibility
unheard of in the current world of event recovery.
Consider the current model for popular recovery services used
by the large providers. BC planners contract for emergency
services that match existing corporate infrastructures, with the
expectation that when the event happens, the corrective
recovery process goes into action. The actions taken are those
defined by the contract— an agreement that is infrequently
tested and comes with a specification that is very likely a
distant reflection of the company's current and ever-changing
production infrastructure.
The infrastructure-as-a-service and platform-as-a-service
models of cloud computing provide organizations new
opportunities for innovative partnerships that can be kept
51. current with the rate of change of the business needs. BC
planners will see an end to the countless hours focused on
network and server provisioning and will instead focus on how
to build application management and recovery solutions that
span a multitude of diverse service offerings.
As is the case with all disruptive technologies, early adopters
will be the guinea pigs that will flush out the problems for
everyone else. Cloud is no different—and in the world of BCP
where resiliency is everything, the evolution will take many
years.
De-Duplication
The massive glut of information—what we have and what we
have yet to create—has the potential to overwhelm
organizations that need this information to feed systems critical
to always-on business operations. Increased demand to push
data efficiently to distributed global locations has forced
companies to rethink how to manage the movement and
quantities of this data.
Fortunately, the data storage industry has within the past few
years created substantial innovation in data de-duplication, or
the process of removing duplicate bytes of data of images for
storage and transfer. These new duplicate-free image files
become a more efficient way to manage data copies—fewer
bytes to save to disk, copy to tape, or move across networks.
The value of de-duplication solutions will be recognized in the
52. efficiency of backup operations: Full backups that now take
days to complete are reduced to hours, and incremental backups
that take hours to complete are reduced to minutes. This creates
recovery scenarios such that site-to-site image copies will
complete in fractions of historical times, enabling remote-site
activities to start with reduced delay time. Coupling this
capability with other technologies like virtualization and cloud
computing, de-duplication provides BC planners the chance to
apply new thinking to process of solving recovery challenges.
SUMMARY
BCP has become synonymous with emergency response—the
ability of an organization to withstand the unexpected. BCP
creates a process that documents two critical capabilities of a
company:
1 The essential business processes that sustain ongoing
operations
2 The automatic response activities that will sustain these
business processes when the unexpected happens
BCP becomes the backbone process that breaks this knowledge
down until preparedness becomes just another brick in the
foundation for everyday operations.
Because companies will continue to build business solutions
based on IT technologies, CIOs will continue to be called on to
impart greater influence in their companies' BCP strategy.
53. Chapter Nine: Developing an IT Strategy
Mark Egan
HIGHLIGHT
Fred "Firefighter" Forsyth has been leading the IT organization
for his online commerce company for the past five years. Fred's
company provides e-commerce sites for organizations that
cannot afford to build their own sites and depends heavily on IT
to support its customers. His team works very long hours and
has gotten into a pattern of saving the day when users
experience issues with the company's systems.
Fred does not have time to develop a long-term IT strategy, and
since the company does not have a well-articulated business
strategy, he has never spent much time in this area. His boss has
raised systems reliability issues and customer complaints
several times, and Fred has countered that more money is
needed for IT and these problems will go away. Fred does
consider his team very good at responding to issues and earned
his nickname, "Firefighter", based on the countless times his
staff members have had to respond to emergencies. He rewards
his team for their rapid responses to these issues and feels his
company has developed a greater appreciation for his team's
abilities after the countless times they have responded to
54. systems outages.
Fred rolled into the office on Friday around 10 am after
spending most of the night dealing with a recurring network
issue that prevented customers from accessing their systems.
His boss called him into his office. Fred expected a hero's
welcome for resolving the network issue and wondered if he
was finally going to get that senior vice president promotion to
add to his CIO title. He was surprised when he was introduced
to the new IT leader who had just been hired and would be
focused on developing a long-term IT strategy for the company.
This chapter shows how to develop a strategy for your IT
organization and avoid getting overwhelmed with day-to-day
issues. Many CIOs get caught up in tactical issues and never
take the time to establish a future strategy for the organization.
The process is not new or difficult, but many CIOs fail to
devote the time to this area and end up like Fred.
OVERVIEW
Developing an IT strategy is critical for IT leaders. Unless your
organization has developed an understanding of your future
goals and objectives, you will not be successful in leading it
forward. In the same manner that you must first decide where
you want to live and build your dream house before engaging
the architect and building contractors, you need to develop a
future strategy in order to successfully build your IT
55. organization.
This chapter is written for someone who has never developed an
IT strategy in the past or needs to revise an existing strategy to
align with the company's future direction. We first review the
methodology you can use to develop your strategy and then go
through the actual steps necessary to complete the strategy. It is
important to note that this is a collaborative process between
the IT organization and its business partners. You must actively
engage them during the process and solicit their input during
the development of the strategy. The IT strategy should be
considered a component of an effective business strategy.
Finally, we recommend that your strategy is a living document
that is updated on a regular basis to support the evolving nature
of your business. If you decide to enter a new market, offer new
products or services, or change your business model, the IT
strategy must be revised to support the business.
IT STRATEGY METHODOLOGY
The methodology for creating your IT strategy consists of three
steps, and development of your improvement road map
encompasses three critical elements, as shown in Figure 9.1.
Figure 9.1: IT Assessment Methodology
The first step is to understand the current state of the IT
organization. Key questions for determining current state
56. include:
1 Has the organization been successful in meeting the needs of
the business?
2 Are the relations between the IT organization and its business
partners collaborative?
3 Does the business feel that investments in the IT organization
are providing the desired benefits?
It is important to take an objective view of how the organization
is operating today and not assume that things are going great.
Defining the future vision for the IT organization is the next
step. During this step, it is important to understand the future
business strategy and how the IT organization can enable the
business to achieve its goals. Interviews with key business
partners, such as product development and sales, are required to
understand their future direction and areas that technology can
assist. You should also conduct external research on how
leading companies in your industry are providing technology
solutions to support their business.
The final step is developing a road map to get you from where
you are today to your future vision. This includes taking into
account how much your company is willing to invest in the IT
organization, along with realistic estimates for the time required
to achieve your future state. We recommend that you develop a
six-quarter (18-month) IT road map. Six quarters are long
enough to make significant changes within the IT organization
57. and in your ability to deliver meaningful benefits to the
business. Note that your six-quarter road map will not be
stagnant and should be updated on a quarterly basis.
The critical elements of your strategy include people, process,
and technology. By far the most important is people:
· People means having the right team aligned with your business
partners. This is essential for your success and we recommend
that you devote considerable attention to this area. It is very
often the case that you do not have an effective team and need
to make some organizational changes. You need to take a hard
look at the organization and decide if the team needs any
upgrades to achieve your future vision. These upgrades may
include hiring more senior-level staff, addressing skill-set gaps,
or conducting additional training.
· Process can be thought of as glue that holds together the
people and technology elements of your strategy. Frameworks
such as the Information Technology Infrastructure Library
(ITIL) and Control Objectives for Information and Related
Technology (COBiT) exist with best practices for managing an
IT organization. You need to evaluate the process maturity of
your organization and determine whether you need to make
improvements in this area. Staff members often resist processes
and view them as bureaucracy; however, as you grow your
organization, you can no longer operate effectively without
basic processes like incident, problem, and change controls in
58. place. □ Technology is the remaining element of your strategy.
Often CIOs spend an inordinate amount of their time in this area
and do not give adequate attention to people and process.
· Technology is certainly important, considering the fact that
the IT organization is expected to provide automation
capabilities for the company; however too many CIOs get
enamored with technology and focus primarily on this area to
the detriment of the others. Key elements of your strategy
include solutions that are flexible, cost effective, and can scale
to meet future demands of the business.
We now walk through this methodology in greater detail and
describe how it can be used to develop your IT strategy.
Step 1: Assess the Current State of Your IT Organization
When assessing the current state of your IT organization, we
encourage you to take a very objective view and expect to
identify many areas of improvement. If you are an incumbent
CIO, it is very easy to think that things are going well in your
organization based on how hard you and the staff are working.
You may well need to bring in a senior consultant to assist in
the assessment. Newly hired CIOs have an easier time of taking
an outsider's view of how well things are operating and
identifying areas of improvement. Regardless of the situation,
most IT organizations have areas that can be improved, and this
is the time for a careful review.
Examples of key questions that should be answered during this
59. assessment include:
1 Are current business needs being met?
2 Is the expected return on investments in technology being
achieved?
3 Is the project portfolio aligned with business objectives?
4 Where does the technology directly touch your customers?
5 Does the current organizational structure create barriers or
inefficiencies?
6 Are the skill mix and staffing levels in place sufficient?
7 Are third-party resources being applied effectively?
8 Are outsourcing opportunities identified and leveraged?
9 Is your spending in line with that of your peers? What are
your cost drivers?
10 Is there an effective process for approving, managing, and
overseeing projects?
11 What is the vendor/partner selection and management
process?
12 How do you assess business risk and put risk mitigation
programs in place?
13 Are standard development processes defined and adhered to?
14 What gaps exist in the architecture?
15 How are new technologies evaluated and deployed?
16 Will systems scale with corporate growth plans?
17 How are new technologies evaluated and deployed?
We encourage you to spend a lot of time with your business
60. partners to understand their future strategies and discuss how
technology can assist in achieving their goals. We recommend
that you interview your key business partners and ask these
open-ended questions:
· Tell me about your business and plans over the next one to
two years.
· Do you have any strategy documents that I can review?
· How well is the IT organization serving your business today?
· Do you have any suggestions on how we can improve our
services?
The goal is to spend the majority of time in these meetings
listening and learning more about your partners' current
challenges and potential areas that technology can assist. A
word of caution: If you ask for feedback, be prepared to hear
about things that are not working well within IT today, and use
this information to identify areas of improvement.
Communication is very important during this process. We
recommend that you summarize the results of your discussions
in an e-mail to your business partners to validate what you
heard and explain what you intend to do to improve things. The
end result of this phase is to summarize your current state.
Table 9.1 provides an example that you can use.
Table 9.1: IT Assessment Summary Example
Open table as spreadsheet
IT Element
61. Current State
Rating
Corrective Actions
People
Very complex IT organizational model
Red
Simplify IT organization model and align to business partners.
Inexperienced staff responsible for applications functions
Hire experienced IT leader who can build a management team.
Business partners unsure whom to contact for IT services
Clarify IT roles and business partner engagement process.
Process
No formal process to review and prioritize IT requests
Yellow
Establish executive-level governance board.
Limited management metrics on effectiveness of IT group
Develop small number of IT performance metrics.
Basic IT processes, such as change control, not in place
62. Adopt process framework, such as ITIL, as overall
methodology.
Technology
Systems instability and staff focused on day-to-day activities
Yellow
Develop overall IT architecture to guide future investments.
Limited business intelligence capabilities exist today
Invest in business intelligence for competitive advantage.
Recent security issues and no formal risk management program
in place
Hire experienced security leader and develop security program.
Red, yellow, and green ratings can be used to highlight areas of
improvement in simple terms that your business partners can
understand. Do not use a lot of technical jargon, as this will
confuse everyone and limit the effectiveness of this assessment.
Based on the results of your current-state assessment, we are
ready to proceed to the next step of defining your future state.
Step 2: Define Your Future Vision
When defining your future vision, you need to strike a balance
between a bold, forward-looking strategy for your organization
63. and something that you can reasonably deliver in the next two
to three years. The overall vision for your organization should
not really change over time, and your strategies should be
focused on major deliverables that you plan to accomplish over
the next couple of years. This is the time to reach out externally
to understand industry best practices for similar companies that
you can implement for your business. Too often CIOs are
internally focused. Now is the time to reach out to your peers,
industry analysts, consultants, and vendors to understand the
possibilities that exist for your company.
Major components of your future vision should include:
· IT vision statement
· Key business strategies that the IT organization will assist the
company in achieving
· Major IT strategies that you plan to employ over the next
couple of years to assist business partners in achieving their
business strategies
An example of an IT vision statement might be: "Company X
business partners are delighted with the services provided by
the IT organization." This vision will not change over time, and
staff members within the organization will strive to provide
excellent services to their business partners.
It is important to understand your company's future business
strategies in order to identify areas in which the IT organization
can provide the most value. If these strategies are published,
64. you can validate your understanding during interviews with
members of the management team. Otherwise, you will need to
draft your understanding based on these conversations. Key
business strategies for your organization might include:
· Grow the business 30 percent over the coming year by
introducing two new product lines.
· Improve customer satisfaction and achieve highest industry
rating as measured by independent survey.
· Reduce costs by 25 percent through selective outsourcing and
supply chain management.
From an IT perspective, it is important to have IT align with
these business strategies and demonstrate how the organization
is adding value and contributing to the business goals. Note that
it is possible that the company may not have well-articulated
goals; this may make it harder to demonstrate how the IT
organization is enabling the business. In either case, your IT
strategies should contribute to one or more of these areas:
increase revenue, improve customer satisfaction, reduce costs,
and meet compliance requirements.
Major IT strategies fall into two categories: internal IT and
business enabling. Internal IT strategies might include IT
organizational structure, technology refresh, governance, or
process improvements. Examples of business-enabling strategies
would be specific initiatives that would assist the sales
organization to grow the business, help the product development
65. organization develop products quicker, or cost-savings
initiatives through automation of tasks that are performed
manually today.
Provide management with alternative proposals, usually based
on level of investment and desired time frame, to achieve the
future vision. IT is competing with many other investment
priorities. You need to be realistic regarding the level of
resources the company can devote to this area. Table 9.2 shows
a high-level framework that you can provide to management to
determine your investment strategy.
Table 9.2: IT Investment Alternatives Framework
Open table as spreadsheet
Alternative
Major Programs
Time Frame
Estimated Incremental Costs
Business Benefits
Aggressive implementation
Hire third-party integrator to accelerate IT strategy
implementation.
Reorganize IT under experienced leader.
Establish IT governance board to oversee program.
12 months
$10–20 M
Improve IT performance in shortest time frame possible.
66. Will require considerable shift in business priorities and IT
funding.
Accelerated implementation
Hire third party to assist in IT program implementation.
Continue with existing IT leadership and reevaluate
management team.
Provide business executives regular updates on IT program.
18–24 months
$5–10 M
Improve IT performance with minor shift in business priorities
and funding.
Incremental improvements
Leverage third parties in selected areas.
Maintain status quo with existing IT leader and management.
Formalize program and provide regular updates on progress at
lower levels in organization.
24–36 months
$1–2 M
Least costly alternative. No shift in existing business priorities
or funding.
When generating alternatives, start with your existing
organization and budget, and provide management with an
estimate of how long it will take to achieve your future vision.
Your second and third alternatives can add additional resources
and/or shorten the expected time frame. This is an iterative
67. process and a great opportunity to spend more time with your
business partners to ensure that you understand their business
requirements and how the IT organization can enable the
organization to be successful. Once you have locked down the
investment envelope and desired time frame to achieve your
future vision, you are in a position to develop a more detailed
implementation road map.
Step 3: Develop Improvement Road Map
The improvement road map is how you take your future vision
for the IT organization and convert it into reality. Based on
your investment envelope, you need to flesh out the individual
elements of your strategy. These strategies fall into the three
elements that we discussed previously: people, process, and
technology. Each of these elements will have three to five
individual strategies that will comprise your overall IT strategy.
Next we review each of these elements in more detail.
People
As discussed previously, people are the most difficult area and
the one that we recommend you devote considerable time and
attention to. Having a great IT team that is well organized and
aligned with the business is essential for success. For this
reason, consider structuring your organization like the business.
For example, if you are functionally organized with global
leaders of sales, product development, and so on, we
recommend that your IT organization have teams that support
68. these functions. However, if you have a line-of-business
structure with general managers, we recommend that you have
IT groups aligned with these businesses. Your goal is to make it
very easy for your business partners to do business with the IT
organization, including knowing whom to contact for assistance.
IT governance is another critical area that needs to be
established in order for an IT organization to be successful.
Demands for IT requests always exceed the company's ability to
fund this area, and a fair and consistent process needs to be
established. It is critical to establish an IT governance board, IT
steering committee, or other mechanism for business leaders to
evaluate major IT initiatives and determine which ones are the
most important for the company. These groups should be cross-
functional and include senior-level staff members who can make
investment decisions for the company. Critical objectives for
these groups include oversight of the major IT programs and
approval of future IT investments, and meetings should be held
on a monthly or quarterly basis. Of equal importance is the
governance that is put in place beneath this executive level to
execute to the direction provided by the business leaders.
Typically, this working-level group is supported by the
establishment of a program management office and
accompanying methodologies and processes.
Staff development and training is another area that should be
included in your overall strategy. Because the IT field changes
69. rapidly, programs need to be put in place to ensure that your
staff members are trained on the latest developments. If this
area is overlooked, IT organizations either have to use
consultants or continuously hire new staff with current skills.
Included in this area is the need for individual development
plans for staff members and documented succession planning
for key executive and management roles. Finally, one word of
caution: Beware of a strategy that overemphasizes staffing your
key positions with internal resources only. Although such a
strategy may have worked well for prior IT generations, today's
IT world is moving far too quickly to be able to rely only on
resources who have been brought up through company ranks. An
appropriate mix is suggested to ensure that new thinking is
introduced into your organization when and where needed.
IT sourcing is another area that you need to include in your
overall strategy. No organization can be good at everything, and
you need to analyze what you view as your core competencies,
areas in which you will spend the time to hire and develop
skilled staff. Examples of skills that we recommend you always
keep in house would be architecture, business analysis, vendor
management, and program management. Context skills are those
that you should consider for outsourcing to third parties.
Applications maintenance, quality assurance, and help desk
functions are examples of functions that you may want to
outsource. Keep in mind that each company will have unique
70. requirements. You need to go through core/context analysis to
determine your company's sourcing strategy.
These are a few examples of people strategies that you should
consider for your IT strategy. Each organization is different and
will have unique areas that need to be developed. As mentioned,
the people area is the hardest one to perfect. Hire the best staff
possible, and keep them closely aligned with your business
partners. Do not compromise in this area or be pressured to
accept less effective staff since your success relies heavily on
having the right team in place.
Process
Process is the glue that binds the people with the technology to
ensure that the overall IT organization works effectively. Many
IT organizations do not spend enough time in this area, seeing it
as slowing things down or downright boring. Process should be
viewed like brakes on a car, which are provided to allow the car
to go faster, not slower. When approaching overall IT
processes, consider following a framework such as ITIL. This
framework has a catalog of standard processes, such as change
management and problem management, that should be adopted
by your organization. The infrastructure organization, in
particular, needs to pay close attention to processes, and
following this framework can speed up the adoption cycle. If
your team or clients are not ready for ITIL terminology, many
ITIL concepts can be adopted in advance of a full-blown ITIL
71. implementation. Start by setting up ITIL training for IT
leadership and some of your most forward-thinking business
partners.
Focus on a couple of processes at a time since it takes a while
for the organization to adopt them in their day-to-day
operations. Typically, an internal IT program should be
established that prioritizes the processes needed and launches
focused projects in a staggered fashion to ensure optimal
adoption and minimize disruption.
IT investments are often one of the largest capital expenses in
the company, along with facilities, and processes need to be put
in place to ensure that these investments are carefully
evaluated. The IT leader should partner closely with the finance
organization to ensure that business cases are developed for
proposed IT projects and return on investment (ROI) analysis
has been performed. IT projects are competing for scarce
resources with other investments within the company, such as
the decision to open a new office. The business has many
competing priorities and IT projects should follow the same
ROI analysis as IT investments. Too often departments that are
very vocal about their needs, without adequate business
justification, get all the attention (projects); checks and
balances need to be in place for these investments.
Development of critical metrics to measure the overall
effectiveness of the IT organization is essential to demonstrate
72. that the organization is improving over time. Service
organizations, such as IT, can be viewed as merely cost centers.
Metrics can be used to identify areas of investment along with
key drivers for these expenses. For example, the help desk may
be spending an inordinate amount of time supporting a given
department with e-mail issues and may determine that some
training is required. The majority of applications development
staff members may be spending time on an end-of-life finance
application while ignoring requests for a sales application that
can generate additional revenue. At the very least, you should
establish a typical best practices operations review process.
Each of your direct reports should identify the top three
performance metrics that are critical to their success and present
these metrics over time with clear goals identified for each one.
These metrics should be compiled into a single report and
reviewed monthly. Each missed goal should result in a
remediation plan.
Communication is another area to which many IT organizations
do not devote the necessary time and resources. Technical staff
members are not always the best communicators and can easily
confuse business partners with technical jargon. This can lead
to bad relations between the organizations, and a decline in the
level of cooperation. Hiring a communications staff within IT or
soliciting help from the corporate communications organization
can assist in this area. Implementing new technology will
73. require changes to how the business is operating, and human
nature does not always embrace change. Clear, crisp
communications inside and outside of the IT organization can
help in this area and facilitate change within the organization. A
top-notch communications manager will implement a variety of
mechanisms, such as business partner and department-wide
meetings and newsletters, to ensure that expectations are clear
and well managed with your business partner and internal IT
staff.
These are a few examples of processes that you should consider
for your organization. Implementation of a continuous
improvement program can help to drive the overall process
maturity within the organization. Your continuous improvement
program should identify those processes that are critical to
running an effective IT organization for your company and track
progress toward achieving your ultimate goals. Keep in mind
that these programs will require time, and management focus
and discipline are necessary for them to be successful.
Technology
Technology is the final element of your strategy and an area
that some IT organizations overemphasize. Do not
underestimate the ability of technology to assist in the
transformation of the business; however, first you must ensure
that you have the right people and processes in place. One of
the first areas to address is an overall technical architecture for
74. the company. Just as an architect develops blueprints of a house
for a builder, an IT architecture serves as the broad basis for
deployment of technology. Your architecture should encompass
these areas: business architecture, data architecture,
applications architecture, and technical/ infrastructure
architecture.
Business architecture covers business goals, business functions
or capabilities, and business processes and roles. This
architecture is direction-setting for the business and should
drive all other architecture development. Business functions and
business processes are often mapped to the applications and
data they need in order to operate. Keep in mind that this
information may not exist for your organization, and you may
need to draft your understanding of the company's business
architecture based on interviews with business leaders. From a
pragmatic perspective, it may be easier to focus on a few key
areas of the business, such as order to cash, and identify how
process simplification and automation can assist the business
achieve future goals.
Data architecture is very important. Be prepared for multiple
sources of key information, such as customers, products, and
employees, and poor data quality that must be addressed before
new systems can be implemented. Identifying business owners
for data is important to ensure that you can clean up data and
keep it clean on an ongoing basis. These data owners are often
75. referred to as data stewards, and they play a key role in systems
projects. If they do not already exist, partner with the
appropriate business leaders to develop key integrated data
sources, such as customer and vendor master files.
Applications architecture includes all the major business
applications that are used to run your business. These systems
are often separated into back-office enterprise resource planning
and front-office portals and customer relationship management
(CRM) systems. Portals and CRM systems support the revenue-
generating activities of the company. This is an area to which
you should try to devote more IT resources. Investments in
these systems can provide the highest ROI, and IT organizations
should attempt to place a great focus on this area.
Technical/infrastructure can be viewed as the "plumbing" that
everything runs on and includes the hardware, network, and
voice technology. These systems need to be scaled to support
future business growth and resilient to ensure they are available
24 hours a day. Recent trends are headed toward renting
infrastructure resources via cloud technology and paying for
resources only when required. Infrastructure investments can be
costly. IT organizations are encouraged to develop a balanced
strategy of investing in critical infrastructure that cannot be
easily purchased as a service and relying on third parties for the
remainder.
The technology section of your IT strategy will be very
76. company specific. Your focus should be on identifying areas in
which technology can have the highest impact on the business
and quickly delivering solutions. Technology evolves very
quickly. IT organizations need to constantly evaluate new
offerings to determine if they can be of use. Further, keep an
eye on end-of-life systems and technology, and ensure that you
develop upgrade plans that will allow you to provide continuous
support of these systems.
Improvement Road Map Summary
Your IT road map should consist of a series of individual
strategies that you intend to deliver over time. Strategies that
you might include for your company are:
· People: IT organization, IT governance, sourcing, staff
development and training
· Process: ITIL implementation, metrics and reporting,
investment analysis, and communications
· Technology: Business, data, applications, and infrastructure
architecture; company-specific technology initiatives such as
sales force automation; technology refresh initiatives
The template in Figure 9.2 can be used to summarize each of
these individual strategies in a consistent and easy-to-read
format.
Figure 9.2: IT Strategy Example: Organizational Structure
Each of your strategies will have a long-term objective, along
77. with specific milestones that you plan to accomplish in the area.
For example, your IT organization strategy may include an
overall objective to be customer focused and include several
milestones, such as a reorganization and training required to
meet that objective. It is important to strike a balance between
identifying all the key strategies for your organization and
focusing on a limited number of areas that you can expect to
improve over the next one to two years.
The summary of your strategy is your overall IT road map and
includes the expected time frame to deliver your strategy.
Recommendations in this area include organizing your road map
by key business partners, such as sales and marketing, and using
a six-quarter time frame. Six quarters provides adequate time to
deliver programs that may take more than one year to complete
and provides visibility into the organization's longer-term
strategy. Figure 9.3 provides an IT road map example.
Figure 9.3: Six-Quarter Road Map Example
Note the legend that identifies projects that are
approved/proposed, along with project that have been delayed
from their original delivery date. Most IT organizations should
be able to summarize their strategy in two pages. This road map
can be an effective vehicle for management discussions on IT
programs. The IT road map should be viewed as a living
document and updated on a regular basis.
78. Final IT Strategy Document
The final IT strategy must be easily understood by management
and must address critical business objectives. Guidelines for
developing the document include:
· Highly graphical
· Management summary of one page
· Overall document is 25 pages or less
· Include bold recommendations on sweeping changes you plan
to make in order to transform the organization over the next two
to three years
Your IT strategy should establish aggressive but achievable
plans that you are committing to deliver. The costs associated
with your recommendations are going to be significant and
normally will require board approval, so you must deliver on
these commitments. You need to keep a high level of
communications during this time frame and test your
recommendations during the development process to improve
management acceptance. Finally, you must ensure that the key
objectives are understood by the entire IT team and that your
management's objectives are tied to successful delivery.
Whenever you have the opportunity to address large groups of
staff members, reinforce the strategy and key priorities.
SUMMARY
Developing an IT strategy is the most effective way of
79. communicating with your business partners about how you
intend to support their business strategies. The day-today
pressures of running an IT organization can easily divert team
attention to tactical activities, and people can lose focus on
delivering business value. This chapter provides a three-step
process of assessing where the IT organization is today,
defining your future vision, and developing an improvement
road map. IT leaders need to allocate time each year for their
teams to go through this process and ensure that the
organization has a clear path going forward. Resist the urge to
go into firefighting mode and solve today's problems. In
partnership with key business leaders, today's CIO needs to be
bold and establish a vision for his or her organization and lead
teams going forward in order to be successful and add maximum
value to the organization.
3/28/2016 1
Rusty Rims IT Strategic Plan, Part 2
80. Before you begin this assignment, be sure you have read the
“Rusty Rims Case Study” and the feedback
you received on your IT Strategic Plan Part 1 assignment. Also,
be sure you have read the chapters in
the textbook that have been assigned to this point.
Purpose of this Assignment
This assignment gives you the opportunity to apply the course
concepts to complete the development of
an Information Technology Strategic Plan (ITSP) to support the
strategic direction of Rusty Rims
Distribution Company (RR). This assignment specifically
addresses the following course outcomes to
enable you to:
technology governance and
management
ment
81. and governance to make, defend,
and justify an IT decision
IT Strategic Plan for Rusty Rims Distribution Company
For the previous assignment, you developed Part 1 of an IT
Strategic Plan for RR. For this assignment,
you will incorporate any needed changes resulting from the
feedback you received on your Part 1
assignment and you will add Part 2. Part 2 will include an IT
project that you are proposing that RR
undertake. This new project will be included in the IT Portfolio
section of Part 2, and will be further
described in a future assignment, the “IT Decision Paper.” The
entire ITSP will be submitted as a single
document for this assignment.
Assignment
First, you should make any changes to your Part 1 assignment,
82. as indicated in the feedback you received.
Then, you will develop Part 2 of the ITSP for Rusty Rims, using
the outline below, and add it to Part 1. A
single, complete ITSP, with both Parts 1 and 2 will be submitted
for this assignment. Note that Part 2
includes a project you are proposing that RR undertakes. In
addition to the course materials, at least
one external resource (resource other than those provided in the
class) must be used. Two or more
cited references will earn top credit. Use a separate References
page to list just the
references you have cited. Remember to use the APA formatting
rules and correctly cite and reference
your sources with APA format. Use the Grading Rubric to be
sure you have covered everything. Submit
your paper as a Microsoft Word document, or a document that
can be read using Word, with your last
name included in the filename.
83. Please use this outline to build Part 2 of your IT Strategic Plan.
Use the numbering and headings shown
below.
Part Two
1. IT Strategies - Write at least three IT strategies (four or more
will earn top credit) and explain
how they align to one or more of the business strategies,
including the compliance requirements,
articulated in the Case Study. If these business strategies were
not included in your Part 1
paper, you should add these strategies into Part 1 prior to
submitting this assignment. When the
full ITSP is submitted for this assignment, there should be a
clear link between the business
strategies in Part 1 and the IT Strategies in Part 2. Provide at
least one internal IT strategy and
two business-enabling IT strategies and identify each as either
and internal or business-enabling
84. 3/28/2016 2
strategy. Refer to Chapter 9. For an explanation of internal and
external IT strategies, see the
portion of the text just prior to Table 9.2.
2. IT Portfolio – As stated in the textbook, Chapter 9: “The
summary of your strategy is your
overall IT road map and includes the expected time frame to
deliver your strategy.
Recommendations in this area include organizing your road map
by key business partners, such
as sales and marketing, and using a six-quarter time frame. Six
quarters provides adequate time
to deliver programs that may take more than one year to
complete and provides visibility into the
85. organization's longer-term strategy.” Although the roadmap
shown in Figure 9.3 identifies
projects that are approved/proposed, along with projects that
have been delayed from their
original delivery date; for purposes of this assignment, only the
projected timeframes to develop
the projects are required. Create a roadmap, similar to the one
in the textbook, Chapter 9,
Figure 9.3. The table below is similar to Figure 9.3; it shows
the five functional areas of an
example company and two systems for each area. To develop
your roadmap, use a table like the
one below; you can copy the table, insert the functional areas
and systems that are discussed in
the Case Study, and use ‘insert shape – rectangle’ to insert the
bars showing the timeframes for
development of each. The functional areas and projects in
development, and their timeframes
should be extracted from the Case Study. Be sure to include an
86. introductory paragraph to
explain the table that will follow.
Projects by
Functional Area Qtr. 1 Qtr. 2 Qtr. 3 Qtr. 4 Qtr. 5 Qtr. 6
Sales
Sales Force Automation
Online Quoting
Product Development
Collaboration – Wikis, Blogs
Showcase Company Products
Marketing
Customer Experience
Marketing Analytics
Finance
87. Business Intelligence
Global Payroll
Technical Support
Network Upgrade
Data Center Move
3. Proposed Project: Next, you will propose a new IT project to
support at least one of the
strategies in section 1 above, and include it in the Table above.
Use a different color font to
indicate this new project and insert it with the appropriate
functional area in your table. In
Section 3, describe how your proposed project will supplement
the current IT development
projects in supporting the business of RR. In a future
assignment, you will use this project to
develop an “IT Decision Paper”; therefore, you should look at
88. that assignment to be sure the
project you propose will be appropriate for that assignment as
well. (You can propose a
specific vendor package though it is not necessary. However, if
you are incorporating
an integrated solution, you should discuss the various features
of the package that
are appropriate for the study.