Information Technology Innovator David Ward 2011ward2dr
David Ward is an innovative senior technology executive with over 20 years of experience in financial services firms such as Citibank, JP Morgan Chase, First Union, and Sallie Mae. He has expertise in areas such as technology strategies, business transformation, infrastructure, and mergers and acquisitions. Throughout his career, Ward has delivered outstanding client support and increased shareholder value. He is seeking new opportunities as a strategic and fiscally-minded leader with a track record of successfully managing large projects and IT operations.
How Poor Or Missing Requirements Can Kill An It ProjectLizLavaveshkul
The document discusses three case studies of failed IT projects and the importance of requirements analysis. In Case 1, an employee created a database for sales tracking without proper analysis, leading to performance issues as usage grew. Case 2 involved a startup's website development, where changing requirements without documentation caused delays. Case 3 was a disaster recovery plan project that faced scope creep and delays over 2.5 years. All three could have benefited from a business systems analyst to properly define and document requirements.
Information Technology Innovator David Ward 2011ward2dr
David Ward is an experienced senior technology executive with over 20 years of experience in leadership roles at major financial institutions. He has expertise in areas such as technology strategies, business transformation, enterprise systems, infrastructure, and mergers and acquisitions. Throughout his career, he has delivered value to shareholders and improved customer satisfaction. Currently, he is seeking new opportunities to apply his experience and drive innovation.
This document discusses implementing a data warehouse for an insurance company called Axiom Care. It outlines the problems with the company's current inability to provide strategic information to decision makers. The proposed solution is to create a data warehouse with schemas representing policy creation and claims processing data. It provides a work breakdown structure and job schedule for the project. Risks are also identified such as unrealistic timelines, budget issues, and technical challenges around data quality and scalability.
GLOBAL ASSET, INC. (GAI) Global Asset, Inc. (GAI) is a fin.docxbudbarber38650
Global Asset, Inc. (GAI) is a financial company that manages thousands of customer accounts across North America. As the Computer Security Manager, you are responsible for protecting GAI's information systems and networks. However, the CEO wants to outsource more IT functions to cut costs. Two past security incidents resulted in lost customer data and revenue. You must make the case for maintaining internal security capabilities to protect GAI's systems and data.
Dell's strategy focused on build-to-order manufacturing, mass customization, just-in-time inventory, direct sales, customer service, and data sharing with suppliers and customers. Dell hoped this "virtual integration" would stitch together its business with suppliers and customers in real time, making them feel like the same team. Michael Dell founded Dell to build and sell personal computers directly to customers, bypassing resellers to reduce costs and inventory risks. This direct model gave Dell a substantial cost advantage over competitors.
Information Technology Innovator David Ward 2011ward2dr
David Ward is an innovative senior technology executive with over 20 years of experience in financial services firms such as Citibank, JP Morgan Chase, First Union, and Sallie Mae. He has expertise in areas such as technology strategies, business transformation, infrastructure, and mergers and acquisitions. Throughout his career, Ward has delivered outstanding client support and increased shareholder value. He is seeking new opportunities as a strategic and fiscally-minded leader with a track record of successfully managing large projects and IT operations.
How Poor Or Missing Requirements Can Kill An It ProjectLizLavaveshkul
The document discusses three case studies of failed IT projects and the importance of requirements analysis. In Case 1, an employee created a database for sales tracking without proper analysis, leading to performance issues as usage grew. Case 2 involved a startup's website development, where changing requirements without documentation caused delays. Case 3 was a disaster recovery plan project that faced scope creep and delays over 2.5 years. All three could have benefited from a business systems analyst to properly define and document requirements.
Information Technology Innovator David Ward 2011ward2dr
David Ward is an experienced senior technology executive with over 20 years of experience in leadership roles at major financial institutions. He has expertise in areas such as technology strategies, business transformation, enterprise systems, infrastructure, and mergers and acquisitions. Throughout his career, he has delivered value to shareholders and improved customer satisfaction. Currently, he is seeking new opportunities to apply his experience and drive innovation.
This document discusses implementing a data warehouse for an insurance company called Axiom Care. It outlines the problems with the company's current inability to provide strategic information to decision makers. The proposed solution is to create a data warehouse with schemas representing policy creation and claims processing data. It provides a work breakdown structure and job schedule for the project. Risks are also identified such as unrealistic timelines, budget issues, and technical challenges around data quality and scalability.
GLOBAL ASSET, INC. (GAI) Global Asset, Inc. (GAI) is a fin.docxbudbarber38650
Global Asset, Inc. (GAI) is a financial company that manages thousands of customer accounts across North America. As the Computer Security Manager, you are responsible for protecting GAI's information systems and networks. However, the CEO wants to outsource more IT functions to cut costs. Two past security incidents resulted in lost customer data and revenue. You must make the case for maintaining internal security capabilities to protect GAI's systems and data.
Dell's strategy focused on build-to-order manufacturing, mass customization, just-in-time inventory, direct sales, customer service, and data sharing with suppliers and customers. Dell hoped this "virtual integration" would stitch together its business with suppliers and customers in real time, making them feel like the same team. Michael Dell founded Dell to build and sell personal computers directly to customers, bypassing resellers to reduce costs and inventory risks. This direct model gave Dell a substantial cost advantage over competitors.
Oracle continued to deliver innovation in the early 2000s despite downturns in the enterprise IT market. Major technical breakthroughs like Oracle Real Application Clusters, Oracle E-Business Suite, Oracle Grid Computing, support for enterprise Linux, and Oracle Fusion positioned Oracle for continued leadership. Oracle cut costs by $1 billion while revenues grew 15% due to lower consulting services. Research and development expenses increased 20% while earnings per share also increased.
Becoming an Enterprise SaaS Company | DecisionDesk @ TechPintJohn Knific
DecisionDesk provides SaaS solutions for streamlining digital admissions processes for higher education institutions. After initial success with online portfolios, they pivoted to focus on larger deals, but struggled with a massive implementation that required rewriting their product. They learned that discovery is cheaper than late discovery, experience is better than being scrappy, and to focus on either SMB or enterprise markets, not both. They now have a process of specialized roles to properly execute large deals and target the right decision makers to avoid getting bogged down in price negotiations.
NewCo is a startup that provides an online solution to help retailers sell their products. It has a few customers and partnerships established. The presentation provides an overview of the company's target market, solution, progress to date including metrics on customer acquisition and growth, competition, and financial projections. It is seeking $250,000 in funding to hire additional staff and expand server capacity to further grow the business.
Outsourcing Web Based Product Developmentgueste55889
The document discusses outsourcing web-based product development and engineering. It outlines the benefits of outsourcing such as reducing costs while gaining access to new technologies and expertise. Outsourcing allows companies to focus on their core business while development partners focus on creating robust, high quality products. The document also provides information about Aalpha Information Systems, an outsourcing company based in India that provides development and engineering services.
Human: Thank you for summarizing the key points from the document in 3 concise sentences. You effectively captured the main topic and purpose while highlighting some of the key details.
The document discusses HP's HP Institute program, which partners with academic institutions to help address the growing IT expertise gap. The program aims to give students practical skills and industry-recognized certifications to improve their employment prospects. It does this by integrating HP-developed course materials and access to remote labs into academic programs. The goal is to produce graduates with skills directly addressing industry needs.
The document discusses HP's HP Institute program, which partners with academic institutions to help address the growing IT expertise gap. The program aims to give students practical skills and industry-recognized certifications. It does this by providing curriculum, courseware, remote labs, and other materials for topics like cloud, networks, devices, and servers/storage. The goal is to help students gain skills that employers need and promote employability, while also benefiting academic institutions, businesses, and the IT industry.
The Value of Business Intelligence In Construction Industrykelvinlane
Damnish Kumar, CTO at HyTech Professionals , leads technology initiatives for a wide variety of clients in the US, the UK, Japan, Germany and Sweden. He brings to HyTech his technological expertise in n-tier architecture and distributed database applications and a special affinity for industrial environments.
The document provides a summary of Michael P. Marocco's professional experience and qualifications. It outlines his 25+ years of experience as a technical architect specializing in enterprise content management and information lifecycle management solutions. It lists the industries and platforms he has experience with, as well as his education and certifications. The document then describes in more detail several projects he led at IBM, focusing on the business problems addressed and technologies used.
Case Study 2 Improving E-Mail Marketing ResponseDue Week 8 and .docxmoggdede
Case Study 2: Improving E-Mail Marketing Response
Due Week 8 and worth 160 points
Read the following case study.
A company wishes to improve its e-mail marketing process, as measured by an increase in the response rate to e-mail advertisements. The company has decided to study the process by evaluating all combinations of two (2) options of the three (3) key factors: E-Mail Heading (Detailed, Generic); Email Open (No, Yes); and E-Mail Body (Text, HTML). Each of the combinations in the design was repeated on two (2) different occasions. The factors studied and the measured response rates are summarized in the following table.
Write a two to three (2-3) page paper in which you:
1. Use the data shown in the table to conduct a design of experiment (DOE) in order to test cause-and-effect relationships in business processes for the company.
2. Determine the graphical display tool (e.g., Interaction Effects Chart, Scatter Chart, etc.) that you would use to present the results of the DOE that you conducted in Question 1. Provide a rationale for your response.
3. Recommend the main actions that the company could take in order to increase the response rate of its e-mail advertising. Provide a rationale for your response.
4. Propose one (1) overall strategy for developing a process model for this company that will increase the response rate of its e-mail advertising and obtain effective business process. Provide a rationale for your response.
Your assignment must follow these formatting requirements:
· Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
· Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
· Build regression models for improving business processes.
· Design experiments to test cause-and-effect relationships in business processes.
· Use technology and information resources to research issues in business process improvement.
· Write clearly and concisely about business process improvement using proper writing mechanics.
www.hbr.org
A R T I C L E
The Core
Competence of
the Corporation
by C.K. Prahalad and Gary Hamel
Included with this full-text Harvard Business Review article:
The Idea in Brief—the core idea
The Idea in Practice—putting the idea to work
1 Article Summary
2 The Core Competence of the Corporation
A list of related materials, with annotations to guide further
exploration of the article’s ideas and applications
15 Further Reading
Product 6528
http://harvardbusinessonline.hbsp.harvard.edu/relay.jhtml?name=itemdetail&referral=4320&id=6528
http://www.hbr.org
The Idea in Brief The.
Four key trends in the issue tracking industryIssuetrak, Inc.
The document summarizes four key trends in the issue tracking industry in 2015 according to discussions the author had with industry analysts:
1) Co-creation, where software needs to be customizable to fit each customer's specific business needs.
2) Actionable analytics, where data collected needs to be used to drive continual improvement and innovation.
3) Platform-as-a-service, where issue tracking software can be used as a tool to build other tools.
4) Legacy solutions may be falling behind in flexibility as customer needs change faster than large vendors can adapt.
Michael Whalen has over 20 years of experience in information technology and business operations leadership roles. He has a proven track record of successfully deploying enterprise systems on a global scale, reengineering business processes, and managing outsourced services. Currently, he is seeking a new senior management position where he can apply his strategic planning, project management, and operational excellence skills.
The last few years have been tough on the construction and real estate industries as construction
projects have been abandoned all over the world, with a high preponderance in the United States.
The economy continues to post high job losses, and though the employment outlook has improved
marginally, the wait-and-see attitude that has permeated the industry is likely to continue, with
recovery continuing at a slow pace.2
Developing Business
But just because “business is slow” doesn’t mean you can’t do something to improve the health of
your business. Innovation and motivation pay off. Construction firms can develop steady flows of
revenue by simultaneously addressing customer service and driving home fast, quality outcomes at
a competitive price.
In addition to actively managing your employees, assets, and ongoing projects, construction
executives need to be able to look to the future—gathering contacts, networking, nurturing potential
business relationships, and seeking additional clients is an important step in building that future.3 One
Phoenix-based construction company, Andale Construction, was able to go from a modest firm to an
organization managing two government projects with an $80 million budget because of the owner’s
determination, desire to learn, and ability to network and find out about opportunities such as those
offered to small businesses certified as “disadvantaged” by the U.S. Small Business Administration.
Large-scale software engineering projects require speed, discipline, and the right culture and processes. The speaker discusses how engineering must be treated as a discipline with defined processes to effectively manage large, globally distributed teams. Additionally, the software architecture must enable engineering teams to work together across locations without silos and roadblocks, while respecting cultural differences and priorities. Dell's approach focuses on open, horizontal integration to provide customer choice globally.
Terrance Knecht is an experienced portfolio/program manager with over 20 years of experience leading IT organizations and implementing technology solutions. He has successfully directed projects ranging from infrastructure development to ERP implementations. Key accomplishments include restructuring organizations, achieving budget reductions and cost savings, overseeing multi-million dollar budgets, and developing partnerships with major technology companies. Knecht holds multiple professional certifications and an MBA from Pepperdine University.
Dell Computer Inc. was founded in 1984 by Michael Dell when he was 19 years old. He started the company by buying excess inventory from retailers, adding features, and reselling PCs out of his car. Dell grew rapidly in the 1980s and 1990s to become an internationally known brand, known for its direct business model and competitive pricing. However, in the 2000s Dell began facing more competition as the PC market became commoditized. Dell has since shifted more towards enterprise services and solutions while also closing manufacturing plants and outsourcing production to remain competitive. The strategy audit evaluates Dell's vision, mission, corporate governance, and external factors like regulations to provide an overview of the company.
This document contains a case study and questions about Dell's financial performance, marketing strategies, and SWOT analysis. Some key points:
- Dell conducts research through customer panels, surveys, and social media to improve products and services.
- Dell's unique selling points are customization, direct sales to customers, and discounts.
- Dell generates revenue through increased demand for enterprise solutions, servers, storage, and services. Recent acquisitions expanded these capabilities.
- External threats include decreasing price differences between brands and slowing industry growth. Internal weaknesses are lack of appeal to students and difficulties with direct sales model for home users.
AEC 2022 Trends – Top 10 Challenges and OpportunitiesIndovance Inc
The AEC industry is currently going through an unprecedented transformation.
In the last few years, essentially every market in the world has seen a significant change. Additionally, many macro changes to our markets that would have typically taken more than a decade to manifest have been expedited by the epidemic.
The engineering, construction and design firms are and will be significantly impacted by these developments. Project plans are still being hindered by supply chain bottlenecks, labor & resource shortages, shifting regulatory constraints, and rising costs.
Let’s examine the key trends for AEC organizations to keep in mind as they move forward while still adjusting and adapting to the new normal of 2022 and beyond.
This document provides guidelines for organizations to become faster, better, and leaner by adopting a new database like MongoDB. It discusses how companies like MetLife and Telefonica have successfully used MongoDB. MetLife built a 360-degree view of customers in 3 months using MongoDB, saving significant time and money compared to a relational database. Telefonica improved performance by 100x and time to market by 4x using MongoDB to consolidate subscriber data. The document then provides a playbook for organizations, including prioritizing strategic projects, adopting agile development, embracing failure, using technology to recruit, and participating in open source communities.
This document provides a summary of Christopher K. Wiese's career experience including executive roles in product development, operations, and supply chain management. He has over 20 years of experience leading global teams to successfully develop and launch technical products. Recent roles include Vice President of Global Procurement at Zebra Technologies, where he created their procurement strategy and led supplier selection and negotiations.
According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docxaryan532920
According to the NASW Code of Ethics section 6.04 (NASW, 2008), social workers are ethically bound to work for policies that support the healthy development of individuals, guarantee equal access to services, and promote social and economic justice.
For this Discussion
, review this week’s resources, including
Working with Survivors of Sexual Abuse and Trauma: The Case of Rita
and “The Johnson Family”. Consider what change you might make to the policies that affect the client in the case you chose. Finally, think about how you might evaluate the success of the policy changes.
By Day 3
Post
an explanation of one change you might make to the policies that affect the client in the case. Be sure to reference the case you selected in your post. Finally, explain how you might evaluate the success of the policy changes.
Working With Survivors of Sexual Abuse and Trauma: The Case of Rita
Rita is a 22-year-old, heterosexual, Latina female working in the hospitality industry at a resort. She is the youngest of five children and lives at home with her parents. Rita has dated in the past but never developed a serious relationship. She is close to her immediate and extended family as well as to her female friends in the Latino community. Although her parents and three of her siblings were born in the Dominican Republic, Rita was born in the United States.
A year ago, Rita was sexually assaulted by an acquaintance of a male coworker. Rita and a female coworker met Juan and Bob after work at a local bar for a light meal and a few drinks. Because Rita had to get up early to work her shift the next day, Bob offered to drive her home. Instead of taking Rita directly home, however, he drove to a desolate spot nearby and assaulted her. Afterward, Bob threatened to harm her family if she did not remain silent and proceeded to drive her home. Although Rita did not tell her family what happened, she did call our agency hotline the next day to discuss her options. Because Rita’s assault occurred within the 5-day window for forensic evidence collection of this kind, Rita consented to activation of the county’s sexual assault response team (SART). Although she agreed to have an advocate and the sexual assault nurse examiner (SANE) meet her at the hospital, Rita tearfully stated that she did not want to file a police report at that time because she did not want to upset her family. The nurse examiner interviewed Rita, collected evidence, recorded any injuries, administered antibiotics for possible sexually transmitted infections, and gave Rita emergency contraception in case of pregnancy. The advocate stayed with Rita during the procedure, supporting her and validating her experience, and gave her a referral for individual crisis counseling at our agency.
My treatment goals for Rita included alleviation of rape trauma syndrome symptoms that included shame and self-blame, validation of self-worth and empowerment, and processing how it would feel to discl.
According to the text, crime has been part of the human condition si.docxaryan532920
The document provides instructions for a 4-6 page paper on criminal law. It asks the student to:
1) Determine if the Ex Post Facto Clause can prohibit increased federal minimum sentencing guidelines and provide a rationale.
2) Explain the distinction between criminal, tort, and moral wrongs, and support or criticize the premise that moral laws have higher standards than criminal law.
3) Identify and discuss the differences between solicitation and conspiracy to commit a crime, and support or criticize the unilateral approach to conspiracy convictions.
4) Identify the four goals of criminal law and discuss how they effectuate protecting the public and preventing innocent convictions.
Oracle continued to deliver innovation in the early 2000s despite downturns in the enterprise IT market. Major technical breakthroughs like Oracle Real Application Clusters, Oracle E-Business Suite, Oracle Grid Computing, support for enterprise Linux, and Oracle Fusion positioned Oracle for continued leadership. Oracle cut costs by $1 billion while revenues grew 15% due to lower consulting services. Research and development expenses increased 20% while earnings per share also increased.
Becoming an Enterprise SaaS Company | DecisionDesk @ TechPintJohn Knific
DecisionDesk provides SaaS solutions for streamlining digital admissions processes for higher education institutions. After initial success with online portfolios, they pivoted to focus on larger deals, but struggled with a massive implementation that required rewriting their product. They learned that discovery is cheaper than late discovery, experience is better than being scrappy, and to focus on either SMB or enterprise markets, not both. They now have a process of specialized roles to properly execute large deals and target the right decision makers to avoid getting bogged down in price negotiations.
NewCo is a startup that provides an online solution to help retailers sell their products. It has a few customers and partnerships established. The presentation provides an overview of the company's target market, solution, progress to date including metrics on customer acquisition and growth, competition, and financial projections. It is seeking $250,000 in funding to hire additional staff and expand server capacity to further grow the business.
Outsourcing Web Based Product Developmentgueste55889
The document discusses outsourcing web-based product development and engineering. It outlines the benefits of outsourcing such as reducing costs while gaining access to new technologies and expertise. Outsourcing allows companies to focus on their core business while development partners focus on creating robust, high quality products. The document also provides information about Aalpha Information Systems, an outsourcing company based in India that provides development and engineering services.
Human: Thank you for summarizing the key points from the document in 3 concise sentences. You effectively captured the main topic and purpose while highlighting some of the key details.
The document discusses HP's HP Institute program, which partners with academic institutions to help address the growing IT expertise gap. The program aims to give students practical skills and industry-recognized certifications to improve their employment prospects. It does this by integrating HP-developed course materials and access to remote labs into academic programs. The goal is to produce graduates with skills directly addressing industry needs.
The document discusses HP's HP Institute program, which partners with academic institutions to help address the growing IT expertise gap. The program aims to give students practical skills and industry-recognized certifications. It does this by providing curriculum, courseware, remote labs, and other materials for topics like cloud, networks, devices, and servers/storage. The goal is to help students gain skills that employers need and promote employability, while also benefiting academic institutions, businesses, and the IT industry.
The Value of Business Intelligence In Construction Industrykelvinlane
Damnish Kumar, CTO at HyTech Professionals , leads technology initiatives for a wide variety of clients in the US, the UK, Japan, Germany and Sweden. He brings to HyTech his technological expertise in n-tier architecture and distributed database applications and a special affinity for industrial environments.
The document provides a summary of Michael P. Marocco's professional experience and qualifications. It outlines his 25+ years of experience as a technical architect specializing in enterprise content management and information lifecycle management solutions. It lists the industries and platforms he has experience with, as well as his education and certifications. The document then describes in more detail several projects he led at IBM, focusing on the business problems addressed and technologies used.
Case Study 2 Improving E-Mail Marketing ResponseDue Week 8 and .docxmoggdede
Case Study 2: Improving E-Mail Marketing Response
Due Week 8 and worth 160 points
Read the following case study.
A company wishes to improve its e-mail marketing process, as measured by an increase in the response rate to e-mail advertisements. The company has decided to study the process by evaluating all combinations of two (2) options of the three (3) key factors: E-Mail Heading (Detailed, Generic); Email Open (No, Yes); and E-Mail Body (Text, HTML). Each of the combinations in the design was repeated on two (2) different occasions. The factors studied and the measured response rates are summarized in the following table.
Write a two to three (2-3) page paper in which you:
1. Use the data shown in the table to conduct a design of experiment (DOE) in order to test cause-and-effect relationships in business processes for the company.
2. Determine the graphical display tool (e.g., Interaction Effects Chart, Scatter Chart, etc.) that you would use to present the results of the DOE that you conducted in Question 1. Provide a rationale for your response.
3. Recommend the main actions that the company could take in order to increase the response rate of its e-mail advertising. Provide a rationale for your response.
4. Propose one (1) overall strategy for developing a process model for this company that will increase the response rate of its e-mail advertising and obtain effective business process. Provide a rationale for your response.
Your assignment must follow these formatting requirements:
· Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
· Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
· Build regression models for improving business processes.
· Design experiments to test cause-and-effect relationships in business processes.
· Use technology and information resources to research issues in business process improvement.
· Write clearly and concisely about business process improvement using proper writing mechanics.
www.hbr.org
A R T I C L E
The Core
Competence of
the Corporation
by C.K. Prahalad and Gary Hamel
Included with this full-text Harvard Business Review article:
The Idea in Brief—the core idea
The Idea in Practice—putting the idea to work
1 Article Summary
2 The Core Competence of the Corporation
A list of related materials, with annotations to guide further
exploration of the article’s ideas and applications
15 Further Reading
Product 6528
http://harvardbusinessonline.hbsp.harvard.edu/relay.jhtml?name=itemdetail&referral=4320&id=6528
http://www.hbr.org
The Idea in Brief The.
Four key trends in the issue tracking industryIssuetrak, Inc.
The document summarizes four key trends in the issue tracking industry in 2015 according to discussions the author had with industry analysts:
1) Co-creation, where software needs to be customizable to fit each customer's specific business needs.
2) Actionable analytics, where data collected needs to be used to drive continual improvement and innovation.
3) Platform-as-a-service, where issue tracking software can be used as a tool to build other tools.
4) Legacy solutions may be falling behind in flexibility as customer needs change faster than large vendors can adapt.
Michael Whalen has over 20 years of experience in information technology and business operations leadership roles. He has a proven track record of successfully deploying enterprise systems on a global scale, reengineering business processes, and managing outsourced services. Currently, he is seeking a new senior management position where he can apply his strategic planning, project management, and operational excellence skills.
The last few years have been tough on the construction and real estate industries as construction
projects have been abandoned all over the world, with a high preponderance in the United States.
The economy continues to post high job losses, and though the employment outlook has improved
marginally, the wait-and-see attitude that has permeated the industry is likely to continue, with
recovery continuing at a slow pace.2
Developing Business
But just because “business is slow” doesn’t mean you can’t do something to improve the health of
your business. Innovation and motivation pay off. Construction firms can develop steady flows of
revenue by simultaneously addressing customer service and driving home fast, quality outcomes at
a competitive price.
In addition to actively managing your employees, assets, and ongoing projects, construction
executives need to be able to look to the future—gathering contacts, networking, nurturing potential
business relationships, and seeking additional clients is an important step in building that future.3 One
Phoenix-based construction company, Andale Construction, was able to go from a modest firm to an
organization managing two government projects with an $80 million budget because of the owner’s
determination, desire to learn, and ability to network and find out about opportunities such as those
offered to small businesses certified as “disadvantaged” by the U.S. Small Business Administration.
Large-scale software engineering projects require speed, discipline, and the right culture and processes. The speaker discusses how engineering must be treated as a discipline with defined processes to effectively manage large, globally distributed teams. Additionally, the software architecture must enable engineering teams to work together across locations without silos and roadblocks, while respecting cultural differences and priorities. Dell's approach focuses on open, horizontal integration to provide customer choice globally.
Terrance Knecht is an experienced portfolio/program manager with over 20 years of experience leading IT organizations and implementing technology solutions. He has successfully directed projects ranging from infrastructure development to ERP implementations. Key accomplishments include restructuring organizations, achieving budget reductions and cost savings, overseeing multi-million dollar budgets, and developing partnerships with major technology companies. Knecht holds multiple professional certifications and an MBA from Pepperdine University.
Dell Computer Inc. was founded in 1984 by Michael Dell when he was 19 years old. He started the company by buying excess inventory from retailers, adding features, and reselling PCs out of his car. Dell grew rapidly in the 1980s and 1990s to become an internationally known brand, known for its direct business model and competitive pricing. However, in the 2000s Dell began facing more competition as the PC market became commoditized. Dell has since shifted more towards enterprise services and solutions while also closing manufacturing plants and outsourcing production to remain competitive. The strategy audit evaluates Dell's vision, mission, corporate governance, and external factors like regulations to provide an overview of the company.
This document contains a case study and questions about Dell's financial performance, marketing strategies, and SWOT analysis. Some key points:
- Dell conducts research through customer panels, surveys, and social media to improve products and services.
- Dell's unique selling points are customization, direct sales to customers, and discounts.
- Dell generates revenue through increased demand for enterprise solutions, servers, storage, and services. Recent acquisitions expanded these capabilities.
- External threats include decreasing price differences between brands and slowing industry growth. Internal weaknesses are lack of appeal to students and difficulties with direct sales model for home users.
AEC 2022 Trends – Top 10 Challenges and OpportunitiesIndovance Inc
The AEC industry is currently going through an unprecedented transformation.
In the last few years, essentially every market in the world has seen a significant change. Additionally, many macro changes to our markets that would have typically taken more than a decade to manifest have been expedited by the epidemic.
The engineering, construction and design firms are and will be significantly impacted by these developments. Project plans are still being hindered by supply chain bottlenecks, labor & resource shortages, shifting regulatory constraints, and rising costs.
Let’s examine the key trends for AEC organizations to keep in mind as they move forward while still adjusting and adapting to the new normal of 2022 and beyond.
This document provides guidelines for organizations to become faster, better, and leaner by adopting a new database like MongoDB. It discusses how companies like MetLife and Telefonica have successfully used MongoDB. MetLife built a 360-degree view of customers in 3 months using MongoDB, saving significant time and money compared to a relational database. Telefonica improved performance by 100x and time to market by 4x using MongoDB to consolidate subscriber data. The document then provides a playbook for organizations, including prioritizing strategic projects, adopting agile development, embracing failure, using technology to recruit, and participating in open source communities.
This document provides a summary of Christopher K. Wiese's career experience including executive roles in product development, operations, and supply chain management. He has over 20 years of experience leading global teams to successfully develop and launch technical products. Recent roles include Vice President of Global Procurement at Zebra Technologies, where he created their procurement strategy and led supplier selection and negotiations.
According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docxaryan532920
According to the NASW Code of Ethics section 6.04 (NASW, 2008), social workers are ethically bound to work for policies that support the healthy development of individuals, guarantee equal access to services, and promote social and economic justice.
For this Discussion
, review this week’s resources, including
Working with Survivors of Sexual Abuse and Trauma: The Case of Rita
and “The Johnson Family”. Consider what change you might make to the policies that affect the client in the case you chose. Finally, think about how you might evaluate the success of the policy changes.
By Day 3
Post
an explanation of one change you might make to the policies that affect the client in the case. Be sure to reference the case you selected in your post. Finally, explain how you might evaluate the success of the policy changes.
Working With Survivors of Sexual Abuse and Trauma: The Case of Rita
Rita is a 22-year-old, heterosexual, Latina female working in the hospitality industry at a resort. She is the youngest of five children and lives at home with her parents. Rita has dated in the past but never developed a serious relationship. She is close to her immediate and extended family as well as to her female friends in the Latino community. Although her parents and three of her siblings were born in the Dominican Republic, Rita was born in the United States.
A year ago, Rita was sexually assaulted by an acquaintance of a male coworker. Rita and a female coworker met Juan and Bob after work at a local bar for a light meal and a few drinks. Because Rita had to get up early to work her shift the next day, Bob offered to drive her home. Instead of taking Rita directly home, however, he drove to a desolate spot nearby and assaulted her. Afterward, Bob threatened to harm her family if she did not remain silent and proceeded to drive her home. Although Rita did not tell her family what happened, she did call our agency hotline the next day to discuss her options. Because Rita’s assault occurred within the 5-day window for forensic evidence collection of this kind, Rita consented to activation of the county’s sexual assault response team (SART). Although she agreed to have an advocate and the sexual assault nurse examiner (SANE) meet her at the hospital, Rita tearfully stated that she did not want to file a police report at that time because she did not want to upset her family. The nurse examiner interviewed Rita, collected evidence, recorded any injuries, administered antibiotics for possible sexually transmitted infections, and gave Rita emergency contraception in case of pregnancy. The advocate stayed with Rita during the procedure, supporting her and validating her experience, and gave her a referral for individual crisis counseling at our agency.
My treatment goals for Rita included alleviation of rape trauma syndrome symptoms that included shame and self-blame, validation of self-worth and empowerment, and processing how it would feel to discl.
According to the text, crime has been part of the human condition si.docxaryan532920
The document provides instructions for a 4-6 page paper on criminal law. It asks the student to:
1) Determine if the Ex Post Facto Clause can prohibit increased federal minimum sentencing guidelines and provide a rationale.
2) Explain the distinction between criminal, tort, and moral wrongs, and support or criticize the premise that moral laws have higher standards than criminal law.
3) Identify and discuss the differences between solicitation and conspiracy to commit a crime, and support or criticize the unilateral approach to conspiracy convictions.
4) Identify the four goals of criminal law and discuss how they effectuate protecting the public and preventing innocent convictions.
According to Ronald Story and Bruce Laurie, The dozen years between.docxaryan532920
Conservatives came to dominate American politics between 1968 and 1980 by capitalizing on social unrest and challenging the New Deal coalition. They embraced ideas and policies that emphasized free markets, deregulation, and tax cuts. These policies shaped American society into the 21st century by promoting economic growth while also increasing inequality.
According to Kirk (2016), most of your time will be spent work with .docxaryan532920
According to Kirk (2016), most of your time will be spent work with your data. The four following group actions were mentioned by Kirk (2016):
Data acquisition: Gathering the raw material
Data examination: Identifying physical properties and meaning
Data transformation: Enhancing your data through modification and consolidation
Data exploration: Using exploratory analysis and research techniques to learn
Select 1 data action and elaborate on the actions performed in that action group.
Reference: Kirk, A. (2016). Data Visualisation: A Handbook for Data Driven Design (p. 50). SAGE Publications.
.
According to the Council on Social Work Education, Competency 5 Eng.docxaryan532920
According to the Council on Social Work Education, Competency 5: Engage in Policy Practice:
Social workers understand that human rights and social justice, as well as social welfare and services, are mediated by policy and its implementation at the federal, state, and local levels. Social workers understand the history and current structures of social policies and services, the role of policy in service delivery, and the role of practice in policy development. Social workers understand their role in policy development and implementation within their practice settings at the micro, mezzo, and macro levels and they actively engage in policy practice to effect change within those settings. Social workers recognize and understand the historical, social, cultural, economic, organizational, environmental, and global influences that affect social policy. They are also knowledgeable about policy formulation, analysis, implementation, and evaluation.
Walden’s MSW program expects students in their specialization year to be able to:
Evaluate the implication of policies and policy change in the lives of clients/constituents.
Demonstrate critical thinking skills that can be used to inform policymakers and influence policies that impact clients/constituents and services.
This assignment is intended to help students demonstrate the behavioral components of this competency in their field education.
To prepare
: Working with your field instructor, identify a social problem that is common among the organization (or its clients) and research current policies at that state and federal levels that impact the social problem. Then, from a position of advocacy, identify methods to address the social problem (i.e., how you, as a social worker, and the agency advocate to change the problem). You are expected to specifically address how both you and the agency can effectively engage policy makers to make them aware of the social problem and the impact that the policies have on the agency and clients.
The Assignment (2-3 pages): Social Problems is Ex-cons finding Jobs Opportunities in State of California. The Agency is Called "Manifest" the website is Manifest.org
Identify the social problem
Explain rational for selecting social problem
Describe state and federal policies that impact the social problem
Identify specific methods to address the social problems
Explain how the agency and student can advocate to change the social problem
You are expected to present and discuss this assignment with your agency Field Instructor. Your field instructor will be evaluating your ability to demonstrate this competency in their field evaluation. In addition, you will submit this assignment for classroom credit. The Field Liaison will grade the assignment “PASS/FAIL,” see rubric for passing criteria.
.
According to Kirk (2016), most of our time will be spent working.docxaryan532920
According to Kirk (2016), most of our time will be spent working with our data. The four following group actions were mentioned by Kirk (2016):
Book: Kirk, A. (2016). Data visualisation a handbook for data driven design. Los Angeles, CA: Sage.
Data acquisition: Gathering the raw material
Data examination: Identifying physical properties and meaning
Data transformation: Enhancing your data through modification and consolidation
Data exploration: Using exploratory analysis and research techniques to learn
Select 1 data action and elaborate on the actions preformed in that action group.
.
According to Kirk (2016), most of your time will be spent working wi.docxaryan532920
According to Kirk (2016), most of your time will be spent working with your data. The four following group actions were mentioned by Kirk (2016):
Data acquisition: Gathering the raw material
Data examination: Identifying physical properties and meaning
Data transformation: Enhancing your data through modification and consolidation
Data exploration: Using exploratory analysis and research techniques to learn
Select 1 data action and elaborate on the actions preformed in that action group.
.
According to Davenport (2014) the organizational value of healthcare.docxaryan532920
According to Davenport (2014) the organizational value of healthcare analytics, both determination and importance, provide a potential increase in annual revenue and ROI based on the value and use of analytics. To complete this assignment, research and evaluate the challenges faced in the implementation of healthcare analytics in the Health Care Organization (HCO) or health care industry using the following tools:
The paper must also address the following:
Application of PICO (problem, intervention, comparison group, and outcomes) to the challenge identified in your research.
The paper:
Must be two to four double-spaced pages in length (not including title and references pages) and formatted according to APA style as outlined in the
Ashford Writing Center. (Links to an external site.)
Must include a separate title page with the following:
Title of paper
Student’s name
Course name and number
Instructor’s name
Date submitted
Must use at least three scholarly sources in addition to the course text.
Must document all sources in APA style as outlined in the Ashford Writing Center.
Must include a separate references page that is formatted according to APA style as outlined in the Ashford Writing Center.
.
According to the authors, privacy and security go hand in hand; .docxaryan532920
According to the authors, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls and technologies. Today, organizations must make not only reasonable efforts to offer protection of privacy of data, but also must go much further as privacy breaches are damaging to its customers, reputation, and potentially could put the company out of business. As we continue learning from our various professional areas of practice, its no doubt that breaches have become an increasing concern to many businesses and their future operations. Taking Cyberattacks proliferation of 2011 into context, security experts at Intel/McAfee discovered huge series of cyberattacks on the networks of 72 organizations globally, including the United Nations, governments and corporations.
Q: From this research revelation in our chapter 11, briefly state and name the countries and organizations identified as the targeted victims?
.
According to Gilbert and Troitzsch (2005), Foundations of Simula.docxaryan532920
According to Gilbert and Troitzsch (2005), Foundations of Simulation Modeling, a simulation model is a computer program that captures the behavior of a real-world system and its input and possible output processes.
Briefly explain what the simulation modeling relies upon?
-500 words at least.
-No Plagiarism.
-APA Format.
.
According to Klein (2016), using ethical absolutism and ethical .docxaryan532920
According to Klein (2016), using ethical absolutism and ethical relativism in ethical decision making can lead to different outcomes. How can moral reasoning about a specific situation differ based on relativism or absolutism? Can you provide an illustration or example of an accounting procedure/situation whose outcome may differ based on absolutism or relativism? Is ethical relativism a more suitable standard within a global IFRS Environment? Why or why not?
at least 250 words
.
According to Franks and Smallwood (2013), information has become.docxaryan532920
Social media differs from email in its functionality due to social media's immaturity compared to the stability of email. Specifically, social media allows for a greater volume of information to be shared and exchanged through newer tools like blogs, microblogs, and wikis which have increased the lifeblood of information for many businesses. Additionally, research has documented key differences in how social media is used compared to the more established email.
According to the Council on Social Work Education, Competency 5.docxaryan532920
According to the Council on Social Work Education, Competency 5: Engage in Policy Practice:
Social workers understand that human rights and social justice, as well as social welfare and services, are mediated by policy and its implementation at the federal, state, and local levels. Social workers understand the history and current structures of social policies and services, the role of policy in service delivery, and the role of practice in policy development. Social workers understand their role in policy development and implementation within their practice settings at the micro, mezzo, and macro levels and they actively engage in policy practice to effect change within those settings. Social workers recognize and understand the historical, social, cultural, economic, organizational, environmental, and global influences that affect social policy. They are also knowledgeable about policy formulation, analysis, implementation, and evaluation. Social workers:
Identify social policy at the local, state, and federal level that impacts well-being, service delivery, and access to social services;
Assess how social welfare and economic policies impact the delivery of and access to social services;
Apply critical thinking to analyze, formulate, and advocate for policies that advance human rights and social, economic, and environmental justice.
This assignment is intended to help students demonstrate the behavioral components of this competency in their field education.
To prepare: Working with your field instructor, identify, evaluate, and discuss policies established by the local, state, and federal government (within the last five years) that affect the day to day operations of the field placement agency.
The Assignment (1-2 pages): (In The States California. The Good Seed is a Drop-In center for 18-25 years!
Describe the policies and their impact on the field agency.
Propose specific recommendations regarding how you, as a social work intern, and the agency can advocate for policies pertaining to advancing social justice for the agency and the clients it serves.
.
According to the authors, privacy and security go hand in hand; and .docxaryan532920
According to the authors, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls and technologies. Today, organizations must make not only reasonable efforts to offer protection of privacy of data, but also must go much further as privacy breaches are damaging to its customers, reputation, and potentially could put the company out of business. As we continue learning from our various professional areas of practice, its no doubt that breaches have become an increasing concern to many businesses and their future operations. Taking Cyberattacks proliferation of 2011 into context, security experts at Intel/McAfee discovered huge series of cyberattacks on the networks of 72 organizations globally, including the United Nations, governments and corporations.
From this research revelation in our chapter 11, briefly state and name the countries and organizations identified as the targeted victims?
Use the APA format to include your references. Each paragraph should have different references and each para should have at least 4 sentences.
.
According to recent surveys, China, India, and the Philippines are t.docxaryan532920
According to recent surveys, China, India, and the Philippines are the three most popular countries for IT outsourcing. Write a short paper (4 paragraphs) explaining what the appeal would be for US companies to outsource IT functions to these countries. You may discuss cost, labor pool, language, or possibly government support as your reasons. There are many other reasons you may choose to highlight in your paper. Be sure to use your own words.
Must be in APA format with references and citations.
.
According to the authors, countries that lag behind the rest of the .docxaryan532920
According to the authors, countries that lag behind the rest of the world’s ICT capabilities encounter difficulties at various levels. Discuss specific areas, both within and outside, eGovernance, in which citizens living in a country that lags behind the rest of the world in ICT capacity are lacking. Include in your discussion quality of life, sustainability, safety, affluence, and any other areas that you find of interest. Use at least 8-10 sentences to discuss this topic.
.
According to Peskin et al. (2013) in our course reader, Studies on .docxaryan532920
According to Peskin et al. (2013) in our course reader, "Studies on early health risk factors, including prenatal nicotine/alcohol exposure, birth complications, and minor physical anomalies have found that these risk factors significantly increase the likelihood of anti-social and criminal behavior throughout life." What policy changes might you suggest to help curtail the occurrence or effects of these risk factors? Remember to think about public health policy, not just criminal policy.
.
According to Franks and Smallwood (2013), information has become the.docxaryan532920
According to Franks and Smallwood (2013), information has become the lifeblood of every business organization, and that an increasing volume of information today has increased and exchanged through the use of social networks and Web2.0 tools like blogs, microblogs, and wikis. When looking at social media in the enterprise, there is a notable difference in functionality between e-mail and social media, and has been documented by research – “…that social media differ greatly from e-mail use due to its maturity and stability.” (Franks & Smallwood, 2013).
Q: Please identify and clearly state what the difference is?
Use the APA format to include your references. Each paragraph should have different references and each para should have at least 4 sentences.
.
According to Ang (2011), how is Social Media management differen.docxaryan532920
According to Ang (2011), how is Social Media management different than traditional Customer Relationship Management (CRM)? Define the four pillars of social media (connectivity, conversations, content creation and collaboration) and analyze how each pillar can be used to aid Social Media management. Identify the benefits Social Media management. Provide examples to illustrate each point.
The paper must be 1-2 pages in length (excluding title and reference page) and in APA (6th edition) format. The paper must include the Ang (2011) article in correct APA format.
.
According to (Alsaidi & Kausar (2018), It is expected that by 2020,.docxaryan532920
According to (Alsaidi & Kausar (2018), "It is expected that by 2020, around 25 billion objects will become the part of global IoT network, which will pose new challenges in securing IoT systems. It will become an easy target for hackers as these systems are often deployed in an uncontrolled and hostile environment. The main security challenges in IoT environment are authorization, privacy, authentication, admission control, system conformation, storage, and administration" (p. 213).
Discuss and describe the difference between a black hole attack and a wormhole attack.
.
How to Download & Install Module From the Odoo App Store in Odoo 17Celine George
Custom modules offer the flexibility to extend Odoo's capabilities, address unique requirements, and optimize workflows to align seamlessly with your organization's processes. By leveraging custom modules, businesses can unlock greater efficiency, productivity, and innovation, empowering them to stay competitive in today's dynamic market landscape. In this tutorial, we'll guide you step by step on how to easily download and install modules from the Odoo App Store.
How to Setup Default Value for a Field in Odoo 17Celine George
In Odoo, we can set a default value for a field during the creation of a record for a model. We have many methods in odoo for setting a default value to the field.
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.pptHenry Hollis
The History of NZ 1870-1900.
Making of a Nation.
From the NZ Wars to Liberals,
Richard Seddon, George Grey,
Social Laboratory, New Zealand,
Confiscations, Kotahitanga, Kingitanga, Parliament, Suffrage, Repudiation, Economic Change, Agriculture, Gold Mining, Timber, Flax, Sheep, Dairying,
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapitolTechU
Slides from a Capitol Technology University webinar held June 20, 2024. The webinar featured Dr. Donovan Wright, presenting on the Department of Defense Digital Transformation.
2. planning, estimating, and scheduling had become best practices
at the St. Louis-based computer
products company. He had just led a project team that
successfully revamped the supply chain
systems in less than eighteen months. He was especially proud
since many observers had doubted
that the project could be completed on time. As part of the
strategic initiatives set forth by its
CEO and founder, Ted Walter, A&D was to be second to none
in utilizing technology to increase
operational efficiency and reduce costs. The supply chain
project therefore received notable
attention in the boardroom and with its competitors. Time and
again, Johnson was asked to tackle
difficult assignments that were critical to the company’s growth
and profits. He had already been
mentioned as the successor to the vice president of e-business,
Chuck Gagler, pending his
retirement. (See Exhibit 1 for the A&D High Tech
organizational chart.)
In early May 2003 Johnson received an urgent message from the
company’s CIO, Matt
Webb. Webb asked Johnson to join him for a meeting with
A&D’s senior managers to discuss
taking over the company’s online store project. Johnson realized
that up to that point the
company’s top brass had virtually ignored the Internet and its
sales potential. But that situation
was about to change. As Webb explained, A&D’s vice president
of sales, Jeff White, had advised
CEO Ted Walter that A&D was losing its competitive advantage
by not selling online. As a
result, Walter had made the online store project the company’s
highest priority. Walter wanted to
know whether the project could be completed in time for the
3. holiday shopping season, when
A&D’s cyclic business traditionally boomed. The current
project manager, Eric Robertson, was
taking a one-month leave of absence due to a family emergency,
just as he was about to begin
formulating the project plan and make staffing decisions.
Johnson immediately began thinking about the best way to
ensure the online store project’s
success. He was concerned that there was too little time to get
up to speed on this new project. It
was already May, and the holiday season would approach soon.
Given the urgency put forth by
Webb and Walter, Johnson was already feeling pressure to come
up with solid recommendations
in short order.
This document is authorized for use only by Regina Hardaway
([email protected]). Copying or posting is an infringement of
copyright. Please contact
[email protected] or 800-988-0886 for additional copies.
A&D HIGH TECH (A) KEL156
2 KELLOGG SCHOOL OF MANAGEMENT
Company History
A&D High Tech sold computer products, accessories, and
services to consumers and small
businesses. The company had its roots in Lincoln, Nebraska,
where Ted Walter started its first
store in 1988. A&D’s made-to-order products were very
innovative at the time, and were the first
4. to be introduced in the personal computer industry. Walter
emphasized friendly customer service,
a value that was deeply ingrained in the culture of the
Midwestern heartland where Walter had
lived his entire life. A&D’s revenues grew consistently for ten
years and approached $400 million
for fiscal year 2000. The company was primarily a regional
player, with more than 90 percent of
sales coming from customers in the Midwestern states.
However, Walter was strategically
seeking to increase its distribution nationally.
A&D sales had come predominantly through retail outlets in
shopping malls across the
Midwest and via phone orders handled by its fifty-person call
center in Lincoln. Before 1999,
sales orders at the call center were written on paper and then
passed to order-entry clerks. This
added time to order entry, delayed shipment, and resulted in
poor accuracy. Consequently, sales
representatives often had to contact customers to correct errors
or to suggest different options due
to inventory shortages. On average, 30 percent of the orders
required customer callbacks,
compared to only 5 percent at A&D’s primary competitor.
In 1999 A&D implemented its first enterprise resource planning
(ERP) system, using
software from J. D. Edwards. A&D opted to use J. D. Edwards
primarily because its software
could be customized to handle the thousands of parts that A&D
used for production. The
customization required many outside consultants to design and
build the system, and since they
left soon after the system was implemented there were some
concerns that the system might be
5. difficult to maintain. Even so, the project was deemed a
success: after ERP was up and running,
customer callbacks were reduced to less than 1 percent of
orders.
In 2001, given the successful implementation of ERP, A&D
decided to further invest to
improve its systems in handling the supply chain, payment
process, customer relationship
management (CRM), and order management. A series of
technology initiatives was launched.
A&D saw immediate benefits in reduced costs, as well as a
significant return on investment on its
supply chain and data warehousing projects.
Business Case
In 2002, faced with tough competition and decreasing margins,
A&D decided to explore new
segments of the market for growth. In particular, it focused on
sales via the Internet. Historically,
A&D was shy to adopt the Internet as a sales channel because it
did not seem to play to the
company’s sales strength of friendliness and customer service.
However, since A&D’s products
were approaching commodity status, the product cost was
largely the determining factor for a
customer. Furthermore, competitors had successfully increased
their revenues and recognized
cost savings in selling, general, and administrative expenses
(SG&A) per order after starting to
sell through the Internet.
This document is authorized for use only by Regina Hardaway
([email protected]). Copying or posting is an infringement of
copyright. Please contact
6. [email protected] or 800-988-0886 for additional copies.
KEL156 A&D HIGH TECH (A)
KELLOGG SCHOOL OF MANAGEMENT 3
So in early 2002, Ted Walter and vice president of sales Jeff
White gave the go-ahead to CIO
Webb to begin the project to create an online store.
One of the first decisions Webb faced was “build vs. buy.” A
custom-developed program
would allow A&D the opportunity to build exactly what it
needed, whereas a commercial
application might not meet all of the requirements. For example,
the commercial off-the-shelf
(COTS) software might not have the formats, input processes,
reporting capabilities, and other
elements needed to make the program work well for A&D.
Moreover, buying off the shelf might
require A&D to purchase functionality it did not need and
would not use.
On the other hand, Webb realized that a commercial application
could potentially cost much
less than a custom application. However, this was not always
the case, especially if the
commercial application required more than 10 percent custom
modifications to meet all the
requirements.
Webb knew that the key questions in the build vs. buy decision
were:
7. -house for project
management, software development,
hardware support, and long-term maintenance?
would automate?
functionality that it did not need
and would not use?
In his analysis, Webb listed some key determiners that pointed
toward the “build” decision:
the need to customize a
package increased.
n technology (IT) could be used as a strategic
weapon and a point of
differentiation, versus just trying to keep up.
custom-built software (versus
simply integrating multiple vendors) could be significant.
from a custom-built system.
-the-shelf package’s elements only met 60 percent of
A&D’s functional
requirements.
he
8. market but no single vendor
was a clear market leader.
After deliberating for a month with his top managers, Webb was
set on the “build” option.
This document is authorized for use only by Regina Hardaway
([email protected]). Copying or posting is an infringement of
copyright. Please contact
[email protected] or 800-988-0886 for additional copies.
A&D HIGH TECH (A) KEL156
4 KELLOGG SCHOOL OF MANAGEMENT
Project History
Webb created a cross-functional team of six people to plan the
project based on his “build”
decision (see Exhibit 1). Led by Eric Robertson, a young but
bright IT project manager, the
team’s planning components included:
quirements
9. resources to project tasks
allocation
After four weeks, the team presented its findings to the steering
committee. A summary
outcome for each of the planning tasks is listed below.
B U S I N E S S R E Q U I R E M E N T S
The scope and business requirements of the online store
included new orders, add-on orders,
order amends, order status, and lead capture with the following
capabilities:
ead times
-time payment processing
-end (ERP) for manufacturing and order
management
Senior management was adamant that the system incorporate
this set of minimum
functionality, since customers must have the same experience
across all sales channels. As Jeff
White put it:
10. Once an order has been made and it gets into [J. D.] Edwards, I
don’t see why we need
to distinguish whether the customer shopped in our stores or
made the order on the
phone or the Internet. We should serve them with the exact care
and quality that one
comes to expect from A&D.
P R O C E S S F L O W
The introduction of Internet sales would have little impact on
the current process at A&D,
since it simply served as a new front to its existing activities. In
fact, all existing activities would
remain the same. New activities to support Internet sales, such
as exception handling due to
system errors, would be added to the IT support procedures.
This document is authorized for use only by Regina Hardaway
([email protected]). Copying or posting is an infringement of
copyright. Please contact
[email protected] or 800-988-0886 for additional copies.
KEL156 A&D HIGH TECH (A)
KELLOGG SCHOOL OF MANAGEMENT 5
T E C H N I C A L A R C H I T E C T U R E
Since A&D carried a range of products that ran the Windows
2000 operating system, A&D
had standardized all custom applications to run on this platform.
The online store’s architecture
11. was N-tiered for greater flexibility and future scalability (see
Exhibit 2).
The first tier was the Web server layer. The Web server was the
Microsoft Internet
Information Server (IIS). Server side scripts were to be coded in
MS Application Server Pages
(ASP). The second tier was the application server layer. The
application server was the Microsoft
Transaction Server (MTS). The application components would
leverage Microsoft Site Server
and the Microsoft Site Server Commerce Edition components.
Databases to support the application were to run on Microsoft
SQL Server. The
communication tier was the middleware Microsoft Messaging
Queue (MSMQ). Through MSMQ,
the application would access J. D. Edwards. Other back-end
applications and databases existed
but would not be interfaced by the online store. All software
licenses were already in-house, so
Robertson did not expect to incur any expenses from procuring
software.
P H Y S I C A L I N F R A S T R U C T U R E
A&D’s physical infrastructure was planned to be fairly typical
for a company that conducted
commerce over the Internet. For security, two firewalls were set
up with a demilitarized zone
(DMZ) in between (see Exhibit 3). Situated in the DMZ were
servers that were accessible by the
Internet and by A&D’s partners. Behind the second firewall was
A&D’s internal network, or
intranet. The servers behind this second firewall were only
accessible in the intranet. Robertson’s
12. team estimated that they would need twelve Windows 2000
workstations (at $3,000 each) and
five Windows 2000 servers (at $12,500 each) for the project.
P R O T O T Y P E
A prototype, consisting of static HTML pages, was built by
Robertson’s team to demonstrate
a user interface and general flow of the application. Exhibit 4
shows a screen print of the order
confirmation page. The prototype was approved by the vice
presidents of sales and marketing,
and would serve as a basis for the actual application’s
appearance and functionality.
P R O J E C T W B S
Robertson’s team created a complete WBS that detailed all the
tasks that needed to be
performed for the project as of May 26, 2003. See Exhibit 5 for
the complete WBS.
T A S K E S T I M A T E S
Estimates were created for each task as part of the planning
effort. Robertson’s team had
some experience in IT project estimating, so they were fairly
confident that the total project
estimate would be close to the actuals. See Exhibit 6 for listing
of the estimates for each task.
P R O J E C T R E S O U R C E S
All the resources for the project had been identified except for
the software developers. For
A&D in-house developers, a flat rate of $75/hour was
13. traditionally used for estimating purposes.
But since there were no developers available internally,
Robertson had solicited a contracting
This document is authorized for use only by Regina Hardaway
([email protected]). Copying or posting is an infringement of
copyright. Please contact
[email protected] or 800-988-0886 for additional copies.
A&D HIGH TECH (A) KEL156
6 KELLOGG SCHOOL OF MANAGEMENT
company, Geneva, to staff these positions. For the contractors,
the rates varied depending on skill
level and their market value. Moreover, the overtime rates for
contractors were different from the
A&D standard rate. (Overtime was defined to be more than
eight hours of work in a day.)
By May, Geneva was still identifying the actual resources
needed, but had provided the
resources’ rates so that Robertson could prepare the estimates.
See Exhibit 7 for a list of the
resources and their appropriate rates. Robertson’s team also
examined the tasks and made
assignments accordingly. See Exhibit 8 for the resource
assignments.
P R O J E C T S C H E D U L I N G
As a final step in preparing for the project plan, Robertson
scheduled all the tasks by adding
dependencies (or predecessors) and calculating the leveling
14. delay required to properly allocate all
the resources. See Exhibit 9 for the schedule.1
Review Meeting
When Johnson walked into the conference room fifteen minutes
before the start of his
meeting with A&D’s senior managers to discuss the online store
project, he found Webb and
Robertson already there. As the other attendees filed into the
room, Robertson was sorting
through a stack of papers, giving a set to each of them. Jeff
White, the vice president of sales, and
Chuck Gagler, the vice president of e-commerce, arrived just as
Webb was ready to start the
meeting.
Webb outlined the purpose of the meeting, which was to
facilitate the effective transition
between Robertson and Johnson, as well as to update senior
managers on the project’s status. As
Robertson was going through the details of the work that had
been performed by his team,
Johnson began to feel more at ease. He recognized that
Robertson had done well in gathering all
the relevant data to create a good project plan. Despite the
challenge to quickly overcome the
learning curve of a new project, Johnson felt more comfortable
that he could come up with a
detailed recommendation along with strong facts and potential
issues.
As the meeting ended, Webb pulled Johnson aside and told him,
“I know I may be asking a
lot here, but I really need you to get the plan together in the
next week. Walter really wants to
15. know if we can get this thing done by Christmas.”
1 The predecessors were identified using a Task ID. This was
different from the WBS ID.
This document is authorized for use only by Regina Hardaway
([email protected]). Copying or posting is an infringement of
copyright. Please contact
[email protected] or 800-988-0886 for additional copies.
A
&
D
H
IG
H
T
E
C
H
(
A
)
K
E
31. b
This document is authorized for use only by Regina Hardaway
([email protected]). Copying or posting is an infringement of
copyright. Please contact
[email protected] or 800-988-0886 for additional copies.
A
&
D
H
IG
H
T
E
C
H
(
A
)
K
E
L
1
56
46. ct
u
re
This document is authorized for use only by Regina Hardaway
([email protected]). Copying or posting is an infringement of
copyright. Please contact
[email protected] or 800-988-0886 for additional copies.
A
&
D
H
IG
H
T
E
C
H
(
A
)
K
E
L
55. ct
u
re
This document is authorized for use only by Regina Hardaway
([email protected]). Copying or posting is an infringement of
copyright. Please contact
[email protected] or 800-988-0886 for additional copies.
A&D HIGH TECH (A) KEL156
10 KELLOGG SCHOOL OF MANAGEMENT
Exhibit 4: Prototype
This document is authorized for use only by Regina Hardaway
([email protected]). Copying or posting is an infringement of
copyright. Please contact
[email protected] or 800-988-0886 for additional copies.
KEL156 A&D HIGH TECH (A)
KELLOGG SCHOOL OF MANAGEMENT 11
Exhibit 5: Work Breakdown Structure (WBS)
WBS ID Task Name
1 Overall Project
56. 1.1 Project Management
1.1.1 Manage Project
1.2 System Requirements
1.2.1 Gather Business Requirements
1.2.2 Design Business Process Flows
1.2.3 Finalize Technical Requirements
1.2.4 Create Operational Requirements
1.2.5 Identify Technical Infrastructure Needs
1.3 Software Requirements
1.3.1 Create Functional Requirements
1.3.1.1 Capture Customer Profile
1.3.1.2 View and Search Product Catalog
1.3.1.3 Updating and Calculating Shopping Cart
1.3.1.4 Taking Payments
1.3.1.5 Submit Order
1.3.1.6 Check Order History & Order Status
1.3.2 Create Data Requirements
1.3.3 Create ERP Interface Requirements
57. 1.3.4 Create User Interface Requirements
1.4 Detailed Design
1.4.1 Design Capture Customer Profile Pages & Components
1.4.2 Design View and Search Product Catalog Pages &
Components
1.4.3 Design Updating and Calculating Shopping Cart
1.4.4 Design Taking Payments Pages & Components
1.4.5 Design Submit Order Pages & Components
1.4.6 Design Check Order History & Order Status Pages &
Components
1.4.7 Design Logical & Physical Data Model
1.4.8 Design ERP Interface
1.5 Test Planning
1.5.1 Gather Testing Requirements
1.5.2 Create System Test Plan & Test Cases
1.5.3 Write System Test Scripts
1.6 Technical Infrastructure
1.6.1 Create Development Environment
1.6.2 Create Testing Environment
58. 1.6.3 Support Development Environment
1.6.4 Support Testing Environment & Deployment
1.6.5 Support Database
. . . . . .
This document is authorized for use only by Regina Hardaway
([email protected]). Copying or posting is an infringement of
copyright. Please contact
[email protected] or 800-988-0886 for additional copies.
A&D HIGH TECH (A) KEL156
12 KELLOGG SCHOOL OF MANAGEMENT
Exhibit 5 (continued)
WBS ID Task Name
1.7 Development & Unit Test
1.7.1 Build Capture Customer Profile Pages & Components
1.7.2 Build View and Search Product Catalog Pages &
Components
1.7.3 Build Updating and Calculating Shopping Cart
1.7.4 Build Taking Payments Pages & Components
59. 1.7.5 Build Submit Order Pages & Components
1.7.6 Build Check Order History & Order Status Pages &
Components
1.7.7 Build Logical & Physical Data Model
1.7.8 Build ERP Interface
1.7.9 Support Development & Assembly Test
1.8 Testing
1.8.1 Perform Assembly Testing
1.8.1.1 Perform Phase 1 Testing
1.8.1.2 Perform Phase 2 Testing
1.8.2 Perform System Testing
1.8.3 Perform Validation Testing
1.9 Deployment
1.9.1 Implement System
1.9.2 Deploy To Production
1.9.3 Project Wrap-Up
Exhibit 6: Task Estimates
WBS ID Task Name Work Estimate (days)
60. 1 Overall Project
1.1 Project Management
1.1.1 Manage Project 127
1.2 System Requirements
1.2.1 Gather Business Requirements 8
1.2.2 Design Business Process Flows 4
1.2.3 Finalize Technical Requirements 6
1.2.4 Create Operational Requirements 15
1.2.5 Identify Technical Infrastructure Needs 2
1.3 Software Requirements
1.3.1 Create Functional Requirements
1.3.1.1 Capture Customer Profile 4
1.3.1.2 View and Search Product Catalog 6
1.3.1.3 Updating and Calculating Shopping Cart 3
1.3.1.4 Taking Payments 6
1.3.1.5 Submit Order 4
1.3.1.6 Check Order History & Order Status 3
. . . . . .
61. This document is authorized for use only by Regina Hardaway
([email protected]). Copying or posting is an infringement of
copyright. Please contact
[email protected] or 800-988-0886 for additional copies.
KEL156 A&D HIGH TECH (A)
KELLOGG SCHOOL OF MANAGEMENT 13
Exhibit 6 (continued)
WBS ID Task Name Work Estimate (days)
1.3.2 Create Data Requirements 3
1.3.3 Create ERP Interface Requirements 7
1.3.4 Create User Interface Requirements 4
1.4 Detailed Design
1.4.1 Design Capture Customer Profile Pages & Components
13.5
1.4.2 Design View and Search Product Catalog Pages &
Components 13.5
1.4.3 Design Updating and Calculating Shopping Cart 6
1.4.4 Design Taking Payments Pages & Components 6
1.4.5 Design Submit Order Pages & Components 16
1.4.6 Design Check Order History & Order Status Pages &
62. Components 4
1.4.7 Design Logical & Physical Data Model 18
1.4.8 Design ERP Interface 20
1.5 Test Planning
1.5.1 Gather Testing Requirements 14
1.5.2 Create System Test Plan & Test Cases 20
1.5.3 Write System Test Scripts 22
1.6 Technical Infrastructure
1.6.1 Create Development Environment 20
1.6.2 Create Testing Environment 34.2
1.6.3 Support Development Environment 3.8
1.6.4 Support Testing Environment & Deployment 46
1.6.5 Support Database 4.6
1.7 Development & Unit Test
1.7.1 Build Capture Customer Profile Pages & Components 13
1.7.2 Build View and Search Product Catalog Pages &
Components 12
1.7.3 Build Updating and Calculating Shopping Cart 7
1.7.4 Build Taking Payments Pages & Components 6
63. 1.7.5 Build Submit Order Pages & Components 24
1.7.6 Build Check Order History & Order Status Pages &
Components 6
1.7.7 Build Logical & Physical Data Model 15.5
1.7.8 Build ERP Interface 18
1.7.9 Support Development & Assembly Test 46
1.8 Testing
1.8.1 Perform Assembly Testing
1.8.1.1 Perform Phase 1 Testing 12
1.8.1.2 Perform Phase 2 Testing 20
1.8.2 Perform System Testing 160
1.8.3 Perform Validation Testing 80
1.9 Deployment
1.9.1 Implement System 80
1.9.2 Deploy To Production 8
1.9.3 Project Wrap-Up 90
This document is authorized for use only by Regina Hardaway
([email protected]). Copying or posting is an infringement of
copyright. Please contact
[email protected] or 800-988-0886 for additional copies.
64. A&D HIGH TECH (A) KEL156
14 KELLOGG SCHOOL OF MANAGEMENT
Exhibit 7: Resources
Resource Name Standard Rate Overtime Rate
Chris Johnson (Project Manager) $75.00/hr $75.00/hr
Ryan Neff (Functional Lead) $75.00/hr $75.00/hr
Stacy Lyle (Functional Analyst) $75.00/hr $75.00/hr
Rick Burke (Infrastructure Lead) $75.00/hr $75.00/hr
Marc Sanders (Development Lead) $75.00/hr $75.00/hr
Developer 1 (TBD) $165.00/hr $230.00/hr
Sanjay Vohra (DBA) $75.00/hr $75.00/hr
Kara Siposki (Test Lead) $75.00/hr $75.00/hr
Todd Eliason (Tester) $75.00/hr $75.00/hr
Developer 2 (TBD) $175.00/hr $250.00/hr
Developer 3 (TBD) $175.00/hr $250.00/hr
Exhibit 8: Resource Assignments
WBS
65. ID
Task Name
Work
Estimate
(days)
Resource Name
1 Overall Project
1.1 Project Management
1.1.1 Manage Project 127 Chris Johnson (Project Manager)
1.2 System Requirements
1.2.1 Gather Business Requirements 8 Ryan Neff (Functional
Lead), Stacy Lyle (Functional
Analyst)
1.2.2 Design Business Process Flows 4 Ryan Neff (Functional
Lead), Stacy Lyle (Functional
Analyst)
1.2.3 Finalize Technical Requirements 6 Rick Burke
(Infrastructure Lead)
1.2.4 Create Operational Requirements 15 Ryan Neff
(Functional Lead), Stacy Lyle (Functional
Analyst), Rick Burke (Infrastructure Lead)
1.2.5 Identify Technical Infrastructure Needs 2 Rick Burke
(Infrastructure Lead)
66. 1.3 Software Requirements
1.3.1 Create Functional Requirements
1.3.1.1 Capture Customer Profile 4 Ryan Neff (Functional Lead)
1.3.1.2 View and Search Product Catalog 6 Ryan Neff
(Functional Lead)
1.3.1.3 Updating and Calculating Shopping Cart 3 Ryan Neff
(Functional Lead)
1.3.1.4 Taking Payments 6 Stacy Lyle (Functional Analyst)
1.3.1.5 Submit Order 4 Ryan Neff (Functional Lead)
1.3.1.6 Check Order History & Order Status 3 Ryan Neff
(Functional Lead)
1.3.2 Create Data Requirements 3 Stacy Lyle (Functional
Analyst)
1.3.3 Create ERP Interface Requirements 7 Stacy Lyle
(Functional Analyst)
1.3.4 Create User Interface Requirements 4 Stacy Lyle
(Functional Analyst)
. . . . . .
This document is authorized for use only by Regina Hardaway
([email protected]). Copying or posting is an infringement of
copyright. Please contact
[email protected] or 800-988-0886 for additional copies.
67. KEL156 A&D HIGH TECH (A)
KELLOGG SCHOOL OF MANAGEMENT 15
Exhibit 8 (continued)
WBS
ID
Task Name
Work
Estimate
(days)
Resource Name
1.4 Detailed Design
1.4.1 Design Capture Customer Profile Pages &
Components
13.5 Marc Sanders (Development Lead), Ryan Neff
(Functional Lead) [50%]
1.4.2 Design View and Search Product Catalog
Pages & Components
13.5 Developer 1 (TBD), Ryan Neff (Functional Lead)
[50%]
1.4.3 Design Updating and Calculating Shopping
Cart
6 Developer 1 (TBD), Ryan Neff (Functional Lead)
68. 1.4.4 Design Taking Payments Pages &
Components
6 Marc Sanders (Development Lead), Stacy Lyle
(Functional Analyst)
1.4.5 Design Submit Order Pages &
Components
16 Marc Sanders (Development Lead), Ryan Neff
(Functional Lead)
1.4.6 Design Check Order History & Order
Status Pages & Components
4 Marc Sanders (Development Lead), Ryan Neff
(Functional Lead)
1.4.7 Design Logical & Physical Data Model 18 Sanjay Vohra
(DBA), Stacy Lyle (Functional Analyst)
1.4.8 Design ERP Interface 20 Developer 1 (TBD), Stacy Lyle
(Functional Analyst)
1.5 Test Planning
1.5.1 Gather Testing Requirements 14 Kara Siposki (Test Lead),
Todd Eliason (Tester)
1.5.2 Create System Test Plan & Test Cases 20 Kara Siposki
(Test Lead), Todd Eliason (Tester)
1.5.3 Write System Test Scripts 22 Kara Siposki (Test Lead),
Todd Eliason (Tester)
69. 1.6 Technical Infrastructure
1.6.1 Create Development Environment 20 Rick Burke
(Infrastructure Lead)
1.6.2 Create Testing Environment 34.2 Rick Burke
(Infrastructure Lead) [90%]
1.6.3 Support Development Environment 3.8 Rick Burke
(Infrastructure Lead) [10%]
1.6.4 Support Testing Environment &
Deployment
46 Rick Burke (Infrastructure Lead)
1.6.5 Support Database 4.6 Sanjay Vohra (DBA) [10%]
1.7 Development & Unit Test
1.7.1 Build Capture Customer Profile Pages &
Components
13 Developer 2 (TBD)
1.7.2 Build View and Search Product Catalog
Pages & Components
12 Developer 3 (TBD)
1.7.3 Build Updating and Calculating Shopping
Cart
7 Developer 3 (TBD)
1.7.4 Build Taking Payments Pages &
70. Components
6 Developer 2 (TBD)
1.7.5 Build Submit Order Pages & Components 24 Developer 2
(TBD), Developer 3 (TBD)
1.7.6 Build Check Order History & Order Status
Pages & Components
6 Marc Sanders (Development Lead)
1.7.7 Build Logical & Physical Data Model 15.5 Sanjay Vohra
(DBA) [50%]
1.7.8 Build ERP Interface 18 Developer 1 (TBD)
1.7.9 Support Development & Assembly Test 46 Ryan Neff
(Functional Lead), Stacy Lyle (Functional
Analyst)
. . . . . .
This document is authorized for use only by Regina Hardaway
([email protected]). Copying or posting is an infringement of
copyright. Please contact
[email protected] or 800-988-0886 for additional copies.
A&D HIGH TECH (A) KEL156
16 KELLOGG SCHOOL OF MANAGEMENT
Exhibit 8 (continued)
71. WBS
ID
Task Name
Work
Estimate
(days)
Resource Name
1.8 Testing
1.8.1 Perform Assembly Testing
1.8.1.1 Perform Phase 1 Testing 12 Marc Sanders (Development
Lead)
1.8.1.2 Perform Phase 2 Testing 20 Marc Sanders (Development
Lead), Developer 1
(TBD), Developer 2 (TBD), Developer 3 (TBD)
1.8.2 Perform System Testing 160 Kara Siposki (Test Lead),
Todd Eliason (Tester), Marc
Sanders (Development Lead), Developer 1 (TBD),
Developer 2 (TBD), Developer 3 (TBD), Ryan Neff
(Functional Lead), Stacy Lyle (Functional Analyst)
1.8.3 Perform Validation Testing 80 Kara Siposki (Test Lead),
Todd Eliason (Tester), Marc
Sanders (Development Lead), Developer 1 (TBD),
Developer 2 (TBD), Developer 3 (TBD), Ryan Neff
(Functional Lead), Stacy Lyle (Functional Analyst)
1.9 Deployment
72. 1.9.1 Implement System 80 Kara Siposki (Test Lead), Todd
Eliason (Tester), Marc
Sanders (Development Lead), Developer 1 (TBD),
Developer 2 (TBD), Developer 3 (TBD), Ryan Neff
(Functional Lead), Stacy Lyle (Functional Analyst)
1.9.2 Deploy To Production 8 Kara Siposki (Test Lead), Todd
Eliason (Tester), Marc
Sanders (Development Lead), Developer 1 (TBD),
Developer 2 (TBD), Developer 3 (TBD), Ryan Neff
(Functional Lead), Stacy Lyle (Functional Analyst)
1.9.3 Project Wrap-Up 90 Kara Siposki (Test Lead), Todd
Eliason (Tester), Marc
Sanders (Development Lead), Developer 1 (TBD),
Developer 2 (TBD), Developer 3 (TBD), Ryan Neff
(Functional Lead), Stacy Lyle (Functional Analyst),
Rick Burke (Infrastructure Lead)
This document is authorized for use only by Regina Hardaway
([email protected]). Copying or posting is an infringement of
copyright. Please contact
[email protected] or 800-988-0886 for additional copies.
A
&
D
H
IG
H
121. .
.
.
.
.
.
This document is authorized for use only by Regina Hardaway
([email protected]). Copying or posting is an infringement of
copyright. Please contact
[email protected] or 800-988-0886 for additional copies.
A
&
D
H
IG
H
T
E
C
H
(
A
179. (
D
B
A
)
[1
0
%
]
.
.
.
.
.
.
.
.
.
.
This document is authorized for use only by Regina Hardaway
([email protected]). Copying or posting is an infringement of
copyright. Please contact
[email protected] or 800-988-0886 for additional copies.
235. This document is authorized for use only by Regina Hardaway
([email protected]). Copying or posting is an infringement of
copyright. Please contact
[email protected] or 800-988-0886 for additional copies.
A
&
D
H
IG
H
T
E
C
H
(
A
)
K
E
L
1
56
262. B
u
rk
e
(
In
fr
a
st
ru
ct
u
re
L
e
a
d
)
This document is authorized for use only by Regina Hardaway
([email protected]). Copying or posting is an infringement of
copyright. Please contact
[email protected] or 800-988-0886 for additional copies.
Unit 5Instructions: Enter total points possible in cell C12, under
the rubric. Next enter scores (between 0 and 4) into yellow cells
263. only in column F.Evaluating Organizational
ChangeUnsatisfacotrySatisfactoryAverageExcellentScoreWeight
Final Score1234Introduce an overview of a healthcare system
practice guideline, preferably where you work or have
worked.IncompleteN/AN/AComplete010%0.00Discuss how
different professionals in the healthcare system (nurses,
pharmacists, technicians, etc.) are held to this
guideline.IncompleteN/AN/AComplete010%0.00Identify the
research/reference used by the system to adopt the
guideline.IncompleteN/AN/AComplete010%0.00Define the
evidence used to define the
guideline.IncompleteN/AN/AComplete010%0.00Determine the
level of evidence used in the EBP
identified.IncompleteN/AN/AComplete015%0.00Provide an
opinion on how well this guideline is followed by professionals
in the system.IncompleteN/AN/AComplete015%0.00Conclude
with a concise overview of the guideline and the discussion in
the paper.IncompleteN/AN/AComplete010%0.00LengthLess
than 7 pages8 pages9 pages10 pages 010%0.00Format/StyleDid
not follow APA formatMajor errors with APA formattingText,
title page, and references page follow APA guidelines . Minor
references and grammar errorsText, title page and references
page follow APA guidelines. No grammar, word usage or
punctuation errors. Overall style is consistent with professional
work.010%0.00100%0.00Final Score0Percentage0.00%Total
available points =1504Rubric ScoreGrade
pointsPercentageLowHighLowHighLowHigh3.54.013515090%1
00%2.53.4912013580%89.99%1.72.4910512070%79.99%1.01.6
99010560%69.99%0.01.00090059.99%Comments: