SlideShare a Scribd company logo
1 of 12
Project Deliverable 2: Business Requirements 1
Project Deliverable 2: Business Requirements 3
Project Deliverable 2: Business Requirements
Jessica Hill
Dr. Jan Felton
CIS 590: Directed Research Project
February 1, 2015
Table of Contents
1 Business
Requirements…………………………………………………………
…….………3
1.1 Project
Overview………………………………………………………………
…….........3
1.2 Background including current
process…………………………………………….3
1.3
Scope……………………………………………………………
…………………3
1.3.1 Scope of
Project……………………………………………………….........4
1.3.2 Constraints and
Assumptions……………………………………….............5
1.3.3.
Risks…………………………………………………………………..
........5
1.3.4. Scope Control
………………………………………………………………5
1.3.5. Relationship to Other Systems/Projects
……………………………………6
1.3.6. Definition of Terms (if
applicable)………………………………………...6
1.1 Project Overview
This project is an information Technology project that was
requested by WebFOCUS Company. The project is a
development of a secure website that offers online
advertisements, sharing, collection and storage of visual tools.
The Website should be hosted in a cloud environment and
should provide database functions for use in data warehousing
1.2 Background including current process
WebFOCUS was developed in order to generate profit through
online advertisements as well as offshoring and outsourcing of
business operations. Currently the business uses the relational
database analysis. The company’s website in operated on both
Windows and Mac OS X operating systems. In order to enhance
virtualization, the company is seeking cloud computing services
as well as data warehousing for data analysis purposes.
The project goals include;
a. Generation of profit through the charges on advertisement
b. Integration of database and operating systems in employee
management.
c. Outsourcing work at a reduced cost (Olsen, 2006)
d. Developing a secure network infrastructure
e. The use of cloud computing to handle and share data
Tasks
a. Develop a website for advertisement
b. Install security measures
c. Integrate the website with cloud computing functionalities
d. Develop the outsourcing functionalities within the website
1.3 Scope
The scope of this project involves the determination and
documentation of the project goals, deliverable, tasks, the cost
and the deadlines.
1.3.1 Scope of the Project
Project Deliverables:
Scope Statement: This statement outlines the major activities to
be carried out within the time allocated for the project. The
scope statement’s goal is the financial analysis and financial
documents regarding the operation of the project. The cost
incurred and the revenue generated can be compared to observe
the progress of the project.
Progress Reports: These include the process and the stages at
which the project is undergoing. For the development of secure
network infrastructure, the progress report deliverables would
be network firewall types, authentication keys, as well as the
passwords and the antivirus installed on the network.
Issues Reports: These are updates concerning the progress of
the project and errors encountered. It also includes any
adjustments that would be necessary in order for the system to
achieve its goals.
1.3.2. Constraints, and assumptions.
Constraints: These are guidelines that should be adhered to.
They include: project completion (1month), cost (must not
exceed $500.000), and the hardware vendor must be either
Microsoft Inc. or Apple Inc.
Assumptions: In this project, the possible assumptions are: the
organization’s network bandwidth is able to support the website
advertisement, the stakeholders would make decisions in the
next meeting and finally, the server hardware should be
separated between DMZ and internal servers.
1.3.3. Risks
Risks prevent the achievement of the project objectives. The
possible risks in this project include; user commitment, single
point failure in the existing environment, and the project
delivery date, thus it may not serve its purpose as intended.
1.3.4. Scope Control
For successful project implementation, all stakeholders involved
will have to understand the objectives and the project
deliverable in order to understand the means for processing a
scope change request. Changes in project scope can be
controlled by frequent communication with the company. The
developers can also outline their methods of project
development and submit them to the client for adjustments and
recommendations before any development begins. Adjustments
can be made based on time, cost, functionality and the interface
of the website to be designed.
1.3.5. Relationship to other Systems
Integration of Database and Data Warehousing, Cloud
Technology and Virtualization, and Network Infrastructure and
Security.
The integration of the advertisement with other systems is very
important. This is because it is a single website with several
functional tools. The database must be integrated with data
warehousing. Data warehousing offers merged data in
multidimensional assessments. It also provides Online
Analytical Processing (OLAP) tools which assist in interactive
and effective data analysis in a multidimensional space
(Elmasri, & Navathe, 2011).
Virtualization is the software separating physical infrastructure
in order to make numerous devoted resources. It is the
technology that powers cloud computing and should be
integrated together within the website. It would allow for the
installation of the OS X operating system and the Windows
operating system.
Security should be integrated within the network infrastructure
of the website to prevent unsecure access, virus attacks, and
cyber theft. It should have secure passwords and firewalls
(Elmasri, & Navathe, 2011).
1.3.6. Definition of Terms (if applicable)
1. Access Rights- Rights for using a vendor's online collection
or database defined by a license, or other contractual and/or co-
operative agreement.
2. Data Warehouse- a system which is used in reporting and
analysis of data. Data warehouses are central repositories of
integrated data from one or more disparate sources (Elmasri, &
Navathe, 2011).
3. Database- A collection data that is electronically stored with
a mutual user interface and software for the retrieval and
manipulation of data (Elmasri, & Navathe, 2011).
4. Digital Advertisement- The use of the internet in creating
awareness in the company’s website.
5. Firewall- A system that prevents unauthorized access to or
from a private network. Firewallscan be implemented in
hardware and software as well as the website itself (Elmasri, &
Navathe, 2011).
6. Network Infrastructure- Part of the IT infrastructure often
established in most enterprise IT environments (Elmasri, &
Navathe, 2011).
7. Network Security- are the requirements and rules accepted by
a network administrator to avoid and control unauthorized
access, misuse, modification, or denial of a computer network
and network-accessible resources (Elmasri, & Navathe, 2011).
8. Offshoring- the relocation of a business process by a
company from one nation to another. It is mainly the
operational processes, such as manufacturing, and accounting
that are offshored (Oslen, 2006).
9. Outsourcing. The allocation of specific business processes to
an external service provider (Olsen, 2006).
10. Visualization- means of reducing IT expenses while
boosting efficiency and agility.
References:
Elmasri, R. & Navathe, S (2011). Fundamentals of database
systems. Addison-Wesley.
Olsen, K.B (2006). “Productivity impacts of Offshoring and
Outsourcing: A Review”, OECDScience, Technology and
Industry Working Papers, 2006/1, OECD Publishing.
1
Project Deliverable 1: Project Plan Inception
Jessica Hill
Dr. Jan Felton
CIS 590: Directed Research Project
January 18, 2015
Background Information
WebFOCUS is an innovative internet based company that
acquires its funds from a small group of shareholders and
entrepreneurs. The corporation came into existence in March of
2010. The company went live with close beta. Later, they
opened registration through email request. This company
provides users with a facility to display what they are about.
The users can create, manipulate, sort, upload and manage
images with the internet based company. It is a personalized
display place for media content (Divitini, & Brasethvik, 1999).
The company offers facilities of visual
discovery. It also provides sharing, collecting and storage of
visual tools. The user creates a board and then selects an item,
website or page and pins it to the board. The client can save and
share these pins. These boards can be used to make projects or
to merge data and pictures together (Divitini, & Brasethvik,
1999). The company manages it’s working with
the help of operational systems and the data of the users is
maintained through relational databases. A user creates a
personal pin board where he displays images of his interest and
information about the images displayed and is maintained in the
database of the company for future reference (Divitini, &
Brasethvik, 1999).
Details of Business Activities of the Company
Business activities are carried out in order to generate profit.
One of the means of making profit includes charging
advertisers. The company places off sponsored pins on category
pages or individual profiles which influences other users.
Advertisers pay for such pins. The company carries out branded
campaigns. Several
brands create pages and place their products which represent
their brands. Thus, revenue is generated through the respective
brands. There are companies like Outbrain which provide aid to
publishers in making money. This is done by directing visitors
to other sites. The company makes profit through charging the
e-commerce partners too (Divitini, & Brasethvik, 1999).
Revenue can easily be collected by charging for the
company’s membership or for transactions. The company offers
a special section of its site which acts like a marketplace. The
internet based company creates a customer to the customer
marketplace. In this case, it acts like a medium of
communication between two consumers and charges fees for it.
The customer can sell their products to other customers by
using this medium. The internet
based company can also make earnings by generating its own
products. The company receives basic information of the
demands of customers through their pins. It can generate its
own services for fulfilling the needs of customers and charge
them for it. Turnover is also generated by charging business to
business partners. Data can be packaged and sell to advertisers
and retailers who care about the needs of customers.
Speculations on Outsourcing and Offshoring Opportunities
Opportunities are outsourced when the company can get them
done at a lesser cost. When outsourcing is done, the company
only pays a fraction of amount for it and the pain of fulfilling
the task under the given payment is what customer bears. It also
gives opportunity of having a following workforce which never
ends (Olsen, 2006). When work
is outsourced, a wide-ranging documentation of the software
should be made. This way, the customer will be able to give
best results on the work taken under consideration. Before
outsourcing any project, the company should always explain to
its staff the reason why it is being outsourced. This will ease
any doubt about the project to the staff. The
company should make provisions for retaining its employees
with outsourcing. If a company has a reputation in outsourcing
then lesser employees sign up for it. Hence, employees with
skills in high demand should be retained at any cost. When
deciding for outsourcing, the work should be monitored. If it is
not done, then the company will have no basic knowledge of the
project (Olsen, 2006).
It is also difficult to manage globally distributed
employees. The workers belong to different geographic
locations and cultures which makes it difficult to manage them.
Also in case of natural disasters, no guarantee of work is
assured. Offshoring is the
phenomenon in which groups from different locations of world
combine and work out together. It helps in the way that the time
difference of working groups at different geographic locations
can be both advantageous and disadvantageous (Olsen, 2006).
When one group is asleep, the other can continue working.
On the other hand, it can lead to communication differences
which can be created when there is an urgent need to discuss
some part of project. Offshoring also accounts for problems
such as that of cultural differences and language barrier.
The teams under
offshoring have lives of their own. Their environmental
differences can lead to different assumptions being made by
different teams which can hinder the growth of the work.
Generally, high turnover is not easy with offshoring
opportunities. If the offshore group is good at one thing, it does
not ensure that it will carry out all the other works also with
same efficiency (Olsen, 2006).
Offshoring can also generate hidden costs for the
company when giving out such opportunities. The hidden cost
here includes: cost of telephone calls, web-based meetings
which are an essential requirement of any project work, and
video conferences, which can be needed in order to facilitate
efficient conversation (Olsen, 2006).
Data in offshoring also gets lost due to translation. The
language barrier generates a need for efficient translation. This
process takes time which results in loss of data which would
have been essential for project development (Olsen, 2006).
Current Information System
The operational systems used by WebFOCUS to support its
business include Microsoft Windows and Linux. Microsoft
Windows is a powerful tool that provides an effective graphical
user interface which makes working easy for its users. On the
other hand, Linux is an open source operating system which can
be circulated and customized by anyone. The
company uses relational databases to store files. This works on
the basis of the relational model. The data is arranged in tables
in the form of rows and columns and can easily be sorted with
the help of a unique key meant for each row. The relational
database works on CODD’s rules and uses structured query
language for carrying out queries in database and for
maintaining data too (Elmasri & Navathe, 2011).
Data warehouses are used for
accumulation and analysis of data. The extract-transform-load
based data warehouse is used by company. It uses staging and
data integration techniques. It maintains history of data and
improves data quality. Data from multiple sources in integrated
in a data warehouse. It also provides a single general data
model for storage of entire data (Elmasri & Navathe, 2011).
Cloud
computing is the technique in which several remote servers and
software networks are interconnected. It facilitates the central
storage of data. It also provides access to computer services and
resources online. According to requirement, the company can
build up private, public, or hybrid cloud for the same.
A private cloud is operated
only for a single organization either internally or in an external
mode. A public cloud provides services over a public network.
A hybrid cloud is an integration of two or more clouds together.
These clouds are individual in nature but are bound together in
some manner (Elmasri & Navathe, 2011).
Virtualization enables the facility to run on
many virtual environments. The company uses it through Linux
in which a visitor can run in the environment provided by the
existing software (Elmasri & Navathe, 2011).
Network infrastructure and security is
ensured with the help of different factors such as: firewall,
multiple levels of authentication and application security, which
is achieved with the help of secure coding techniques and
antivirus software. Intrusion
detection systems can also be installed in order to prevent the
entry of unauthorized users. Such systems generate an alarm
when an unauthorized person tries to enter the premises of the
secure zone (Elmasri & Navathe, 2011).
References:
Divitini, M., & Brasethvik, T. (1999). Internet-based
organizational memory and knowledge
management. D. G. Schwartz (Ed.). IGI Global.
Elmasri, R. & Navathe, S (2011). Fundamentals of database
systems. Addison-Wesley.
Olsen, K.B (2006). “Productivity impacts of Offshoring and
Outsourcing: A Review”,
OECDScience, Technology and Industry Working Papers,
2006/1, OECD Publishing.
Project Deliverable 2 Business Requirements1Project Deliverab.docx

More Related Content

Similar to Project Deliverable 2 Business Requirements1Project Deliverab.docx

Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015Syed Ubaid Ali Jafri
 
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxTerm Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxmanningchassidy
 
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woerm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woeleanorabarrington
 
Running Head System Proposal .docx
Running Head System Proposal                                     .docxRunning Head System Proposal                                     .docx
Running Head System Proposal .docxagnesdcarey33086
 
Cyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comCyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comPrescottLunt386
 
REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docx
REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docxREAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docx
REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docxcatheryncouper
 
Falcon Security Essay
Falcon Security EssayFalcon Security Essay
Falcon Security EssayJennifer Wood
 
Raju 5.7 java
Raju 5.7 javaRaju 5.7 java
Raju 5.7 javaRaju G P
 
Project 6 - Cloud Computing Security PolicyThis week you will pr.docx
Project 6 - Cloud Computing Security PolicyThis week you will pr.docxProject 6 - Cloud Computing Security PolicyThis week you will pr.docx
Project 6 - Cloud Computing Security PolicyThis week you will pr.docxanitramcroberts
 
Analyzing The Audit Statement Provided By The Information...
Analyzing The Audit Statement Provided By The Information...Analyzing The Audit Statement Provided By The Information...
Analyzing The Audit Statement Provided By The Information...April Charlton
 
Citrix Virtual Desktop Handbook
Citrix Virtual Desktop HandbookCitrix Virtual Desktop Handbook
Citrix Virtual Desktop HandbookNuno Alves
 
Supply Chain Network Design Essay
Supply Chain Network Design EssaySupply Chain Network Design Essay
Supply Chain Network Design EssayTracy Berry
 
IT 8003 Cloud ComputingGroup Activity 1 SuperTAX Soft.docx
IT 8003 Cloud ComputingGroup Activity 1 SuperTAX Soft.docxIT 8003 Cloud ComputingGroup Activity 1 SuperTAX Soft.docx
IT 8003 Cloud ComputingGroup Activity 1 SuperTAX Soft.docxvrickens
 

Similar to Project Deliverable 2 Business Requirements1Project Deliverab.docx (14)

Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015
 
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxTerm Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
 
project plan
project planproject plan
project plan
 
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woerm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
 
Running Head System Proposal .docx
Running Head System Proposal                                     .docxRunning Head System Proposal                                     .docx
Running Head System Proposal .docx
 
Cyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comCyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.com
 
REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docx
REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docxREAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docx
REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docx
 
Falcon Security Essay
Falcon Security EssayFalcon Security Essay
Falcon Security Essay
 
Raju 5.7 java
Raju 5.7 javaRaju 5.7 java
Raju 5.7 java
 
Project 6 - Cloud Computing Security PolicyThis week you will pr.docx
Project 6 - Cloud Computing Security PolicyThis week you will pr.docxProject 6 - Cloud Computing Security PolicyThis week you will pr.docx
Project 6 - Cloud Computing Security PolicyThis week you will pr.docx
 
Analyzing The Audit Statement Provided By The Information...
Analyzing The Audit Statement Provided By The Information...Analyzing The Audit Statement Provided By The Information...
Analyzing The Audit Statement Provided By The Information...
 
Citrix Virtual Desktop Handbook
Citrix Virtual Desktop HandbookCitrix Virtual Desktop Handbook
Citrix Virtual Desktop Handbook
 
Supply Chain Network Design Essay
Supply Chain Network Design EssaySupply Chain Network Design Essay
Supply Chain Network Design Essay
 
IT 8003 Cloud ComputingGroup Activity 1 SuperTAX Soft.docx
IT 8003 Cloud ComputingGroup Activity 1 SuperTAX Soft.docxIT 8003 Cloud ComputingGroup Activity 1 SuperTAX Soft.docx
IT 8003 Cloud ComputingGroup Activity 1 SuperTAX Soft.docx
 

More from wkyra78

Melissa HinkhouseWeek 3-Original PostNURS 6050 Policy and A.docx
Melissa HinkhouseWeek 3-Original PostNURS 6050 Policy and A.docxMelissa HinkhouseWeek 3-Original PostNURS 6050 Policy and A.docx
Melissa HinkhouseWeek 3-Original PostNURS 6050 Policy and A.docxwkyra78
 
Melissa HinkhouseAdvanced Pharmacology NURS-6521N-43Professo.docx
Melissa HinkhouseAdvanced Pharmacology NURS-6521N-43Professo.docxMelissa HinkhouseAdvanced Pharmacology NURS-6521N-43Professo.docx
Melissa HinkhouseAdvanced Pharmacology NURS-6521N-43Professo.docxwkyra78
 
Meiner, S. E., & Yeager, J. J. (2019). Chapter 17Chap.docx
Meiner, S. E., & Yeager, J. J. (2019).    Chapter 17Chap.docxMeiner, S. E., & Yeager, J. J. (2019).    Chapter 17Chap.docx
Meiner, S. E., & Yeager, J. J. (2019). Chapter 17Chap.docxwkyra78
 
member is a security software architect in a cloud service provider .docx
member is a security software architect in a cloud service provider .docxmember is a security software architect in a cloud service provider .docx
member is a security software architect in a cloud service provider .docxwkyra78
 
Melissa ShortridgeWeek 6COLLAPSEMy own attitude has ch.docx
Melissa ShortridgeWeek 6COLLAPSEMy own attitude has ch.docxMelissa ShortridgeWeek 6COLLAPSEMy own attitude has ch.docx
Melissa ShortridgeWeek 6COLLAPSEMy own attitude has ch.docxwkyra78
 
Melissa is a 15-year-old high school student. Over the last week.docx
Melissa is a 15-year-old high school student. Over the last week.docxMelissa is a 15-year-old high school student. Over the last week.docx
Melissa is a 15-year-old high school student. Over the last week.docxwkyra78
 
Measurement  of  the  angle  θ          .docx
Measurement  of  the  angle  θ          .docxMeasurement  of  the  angle  θ          .docx
Measurement  of  the  angle  θ          .docxwkyra78
 
Measurement of the angle θ For better understanding .docx
Measurement of the angle θ     For better understanding .docxMeasurement of the angle θ     For better understanding .docx
Measurement of the angle θ For better understanding .docxwkyra78
 
Meaning-Making Forum 2 (Week 5)Meaning-Making Forums 1-4 are thi.docx
Meaning-Making Forum 2 (Week 5)Meaning-Making Forums 1-4 are thi.docxMeaning-Making Forum 2 (Week 5)Meaning-Making Forums 1-4 are thi.docx
Meaning-Making Forum 2 (Week 5)Meaning-Making Forums 1-4 are thi.docxwkyra78
 
MBA6231 - 1.1 - project charter.docxProject Charter Pr.docx
MBA6231 - 1.1 - project charter.docxProject Charter Pr.docxMBA6231 - 1.1 - project charter.docxProject Charter Pr.docx
MBA6231 - 1.1 - project charter.docxProject Charter Pr.docxwkyra78
 
Medication Errors Led to Disastrous Outcomes1. Search th.docx
Medication Errors Led to Disastrous Outcomes1. Search th.docxMedication Errors Led to Disastrous Outcomes1. Search th.docx
Medication Errors Led to Disastrous Outcomes1. Search th.docxwkyra78
 
Meet, call, Skype or Zoom with a retired athlete and interview himh.docx
Meet, call, Skype or Zoom with a retired athlete and interview himh.docxMeet, call, Skype or Zoom with a retired athlete and interview himh.docx
Meet, call, Skype or Zoom with a retired athlete and interview himh.docxwkyra78
 
Medication Administration Make a list of the most common med.docx
Medication Administration Make a list of the most common med.docxMedication Administration Make a list of the most common med.docx
Medication Administration Make a list of the most common med.docxwkyra78
 
media portfolio”about chapter 1 to 15 from the book  Ci.docx
media portfolio”about chapter 1 to 15 from the book  Ci.docxmedia portfolio”about chapter 1 to 15 from the book  Ci.docx
media portfolio”about chapter 1 to 15 from the book  Ci.docxwkyra78
 
MediationNameAMUDate.docx
MediationNameAMUDate.docxMediationNameAMUDate.docx
MediationNameAMUDate.docxwkyra78
 
Media coverage influences the publics perception of the crimina.docx
Media coverage influences the publics perception of the crimina.docxMedia coverage influences the publics perception of the crimina.docx
Media coverage influences the publics perception of the crimina.docxwkyra78
 
Media Content AnalysisPurpose Evaluate the quality and value of.docx
Media Content AnalysisPurpose Evaluate the quality and value of.docxMedia Content AnalysisPurpose Evaluate the quality and value of.docx
Media Content AnalysisPurpose Evaluate the quality and value of.docxwkyra78
 
Mayan gods and goddesses are very much a part of this text.  Their i.docx
Mayan gods and goddesses are very much a part of this text.  Their i.docxMayan gods and goddesses are very much a part of this text.  Their i.docx
Mayan gods and goddesses are very much a part of this text.  Their i.docxwkyra78
 
Media and SocietyIn 1,100 words, complete the followingAn.docx
Media and SocietyIn 1,100 words, complete the followingAn.docxMedia and SocietyIn 1,100 words, complete the followingAn.docx
Media and SocietyIn 1,100 words, complete the followingAn.docxwkyra78
 
MBA 5110 – Business Organization and ManagementMidterm ExamAns.docx
MBA 5110 – Business Organization and ManagementMidterm ExamAns.docxMBA 5110 – Business Organization and ManagementMidterm ExamAns.docx
MBA 5110 – Business Organization and ManagementMidterm ExamAns.docxwkyra78
 

More from wkyra78 (20)

Melissa HinkhouseWeek 3-Original PostNURS 6050 Policy and A.docx
Melissa HinkhouseWeek 3-Original PostNURS 6050 Policy and A.docxMelissa HinkhouseWeek 3-Original PostNURS 6050 Policy and A.docx
Melissa HinkhouseWeek 3-Original PostNURS 6050 Policy and A.docx
 
Melissa HinkhouseAdvanced Pharmacology NURS-6521N-43Professo.docx
Melissa HinkhouseAdvanced Pharmacology NURS-6521N-43Professo.docxMelissa HinkhouseAdvanced Pharmacology NURS-6521N-43Professo.docx
Melissa HinkhouseAdvanced Pharmacology NURS-6521N-43Professo.docx
 
Meiner, S. E., & Yeager, J. J. (2019). Chapter 17Chap.docx
Meiner, S. E., & Yeager, J. J. (2019).    Chapter 17Chap.docxMeiner, S. E., & Yeager, J. J. (2019).    Chapter 17Chap.docx
Meiner, S. E., & Yeager, J. J. (2019). Chapter 17Chap.docx
 
member is a security software architect in a cloud service provider .docx
member is a security software architect in a cloud service provider .docxmember is a security software architect in a cloud service provider .docx
member is a security software architect in a cloud service provider .docx
 
Melissa ShortridgeWeek 6COLLAPSEMy own attitude has ch.docx
Melissa ShortridgeWeek 6COLLAPSEMy own attitude has ch.docxMelissa ShortridgeWeek 6COLLAPSEMy own attitude has ch.docx
Melissa ShortridgeWeek 6COLLAPSEMy own attitude has ch.docx
 
Melissa is a 15-year-old high school student. Over the last week.docx
Melissa is a 15-year-old high school student. Over the last week.docxMelissa is a 15-year-old high school student. Over the last week.docx
Melissa is a 15-year-old high school student. Over the last week.docx
 
Measurement  of  the  angle  θ          .docx
Measurement  of  the  angle  θ          .docxMeasurement  of  the  angle  θ          .docx
Measurement  of  the  angle  θ          .docx
 
Measurement of the angle θ For better understanding .docx
Measurement of the angle θ     For better understanding .docxMeasurement of the angle θ     For better understanding .docx
Measurement of the angle θ For better understanding .docx
 
Meaning-Making Forum 2 (Week 5)Meaning-Making Forums 1-4 are thi.docx
Meaning-Making Forum 2 (Week 5)Meaning-Making Forums 1-4 are thi.docxMeaning-Making Forum 2 (Week 5)Meaning-Making Forums 1-4 are thi.docx
Meaning-Making Forum 2 (Week 5)Meaning-Making Forums 1-4 are thi.docx
 
MBA6231 - 1.1 - project charter.docxProject Charter Pr.docx
MBA6231 - 1.1 - project charter.docxProject Charter Pr.docxMBA6231 - 1.1 - project charter.docxProject Charter Pr.docx
MBA6231 - 1.1 - project charter.docxProject Charter Pr.docx
 
Medication Errors Led to Disastrous Outcomes1. Search th.docx
Medication Errors Led to Disastrous Outcomes1. Search th.docxMedication Errors Led to Disastrous Outcomes1. Search th.docx
Medication Errors Led to Disastrous Outcomes1. Search th.docx
 
Meet, call, Skype or Zoom with a retired athlete and interview himh.docx
Meet, call, Skype or Zoom with a retired athlete and interview himh.docxMeet, call, Skype or Zoom with a retired athlete and interview himh.docx
Meet, call, Skype or Zoom with a retired athlete and interview himh.docx
 
Medication Administration Make a list of the most common med.docx
Medication Administration Make a list of the most common med.docxMedication Administration Make a list of the most common med.docx
Medication Administration Make a list of the most common med.docx
 
media portfolio”about chapter 1 to 15 from the book  Ci.docx
media portfolio”about chapter 1 to 15 from the book  Ci.docxmedia portfolio”about chapter 1 to 15 from the book  Ci.docx
media portfolio”about chapter 1 to 15 from the book  Ci.docx
 
MediationNameAMUDate.docx
MediationNameAMUDate.docxMediationNameAMUDate.docx
MediationNameAMUDate.docx
 
Media coverage influences the publics perception of the crimina.docx
Media coverage influences the publics perception of the crimina.docxMedia coverage influences the publics perception of the crimina.docx
Media coverage influences the publics perception of the crimina.docx
 
Media Content AnalysisPurpose Evaluate the quality and value of.docx
Media Content AnalysisPurpose Evaluate the quality and value of.docxMedia Content AnalysisPurpose Evaluate the quality and value of.docx
Media Content AnalysisPurpose Evaluate the quality and value of.docx
 
Mayan gods and goddesses are very much a part of this text.  Their i.docx
Mayan gods and goddesses are very much a part of this text.  Their i.docxMayan gods and goddesses are very much a part of this text.  Their i.docx
Mayan gods and goddesses are very much a part of this text.  Their i.docx
 
Media and SocietyIn 1,100 words, complete the followingAn.docx
Media and SocietyIn 1,100 words, complete the followingAn.docxMedia and SocietyIn 1,100 words, complete the followingAn.docx
Media and SocietyIn 1,100 words, complete the followingAn.docx
 
MBA 5110 – Business Organization and ManagementMidterm ExamAns.docx
MBA 5110 – Business Organization and ManagementMidterm ExamAns.docxMBA 5110 – Business Organization and ManagementMidterm ExamAns.docx
MBA 5110 – Business Organization and ManagementMidterm ExamAns.docx
 

Recently uploaded

Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 

Recently uploaded (20)

Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 

Project Deliverable 2 Business Requirements1Project Deliverab.docx

  • 1. Project Deliverable 2: Business Requirements 1 Project Deliverable 2: Business Requirements 3 Project Deliverable 2: Business Requirements Jessica Hill Dr. Jan Felton CIS 590: Directed Research Project February 1, 2015 Table of Contents 1 Business Requirements………………………………………………………… …….………3 1.1 Project Overview……………………………………………………………… …….........3
  • 2. 1.2 Background including current process…………………………………………….3 1.3 Scope…………………………………………………………… …………………3 1.3.1 Scope of Project……………………………………………………….........4 1.3.2 Constraints and Assumptions……………………………………….............5 1.3.3. Risks………………………………………………………………….. ........5 1.3.4. Scope Control ………………………………………………………………5 1.3.5. Relationship to Other Systems/Projects ……………………………………6 1.3.6. Definition of Terms (if applicable)………………………………………...6 1.1 Project Overview This project is an information Technology project that was requested by WebFOCUS Company. The project is a development of a secure website that offers online advertisements, sharing, collection and storage of visual tools. The Website should be hosted in a cloud environment and should provide database functions for use in data warehousing 1.2 Background including current process WebFOCUS was developed in order to generate profit through online advertisements as well as offshoring and outsourcing of business operations. Currently the business uses the relational
  • 3. database analysis. The company’s website in operated on both Windows and Mac OS X operating systems. In order to enhance virtualization, the company is seeking cloud computing services as well as data warehousing for data analysis purposes. The project goals include; a. Generation of profit through the charges on advertisement b. Integration of database and operating systems in employee management. c. Outsourcing work at a reduced cost (Olsen, 2006) d. Developing a secure network infrastructure e. The use of cloud computing to handle and share data Tasks a. Develop a website for advertisement b. Install security measures c. Integrate the website with cloud computing functionalities d. Develop the outsourcing functionalities within the website 1.3 Scope The scope of this project involves the determination and documentation of the project goals, deliverable, tasks, the cost and the deadlines. 1.3.1 Scope of the Project Project Deliverables: Scope Statement: This statement outlines the major activities to be carried out within the time allocated for the project. The scope statement’s goal is the financial analysis and financial documents regarding the operation of the project. The cost incurred and the revenue generated can be compared to observe the progress of the project. Progress Reports: These include the process and the stages at which the project is undergoing. For the development of secure network infrastructure, the progress report deliverables would be network firewall types, authentication keys, as well as the passwords and the antivirus installed on the network. Issues Reports: These are updates concerning the progress of the project and errors encountered. It also includes any adjustments that would be necessary in order for the system to
  • 4. achieve its goals. 1.3.2. Constraints, and assumptions. Constraints: These are guidelines that should be adhered to. They include: project completion (1month), cost (must not exceed $500.000), and the hardware vendor must be either Microsoft Inc. or Apple Inc. Assumptions: In this project, the possible assumptions are: the organization’s network bandwidth is able to support the website advertisement, the stakeholders would make decisions in the next meeting and finally, the server hardware should be separated between DMZ and internal servers. 1.3.3. Risks Risks prevent the achievement of the project objectives. The possible risks in this project include; user commitment, single point failure in the existing environment, and the project delivery date, thus it may not serve its purpose as intended. 1.3.4. Scope Control For successful project implementation, all stakeholders involved will have to understand the objectives and the project deliverable in order to understand the means for processing a scope change request. Changes in project scope can be controlled by frequent communication with the company. The developers can also outline their methods of project development and submit them to the client for adjustments and recommendations before any development begins. Adjustments can be made based on time, cost, functionality and the interface of the website to be designed. 1.3.5. Relationship to other Systems Integration of Database and Data Warehousing, Cloud Technology and Virtualization, and Network Infrastructure and Security. The integration of the advertisement with other systems is very important. This is because it is a single website with several functional tools. The database must be integrated with data warehousing. Data warehousing offers merged data in multidimensional assessments. It also provides Online
  • 5. Analytical Processing (OLAP) tools which assist in interactive and effective data analysis in a multidimensional space (Elmasri, & Navathe, 2011). Virtualization is the software separating physical infrastructure in order to make numerous devoted resources. It is the technology that powers cloud computing and should be integrated together within the website. It would allow for the installation of the OS X operating system and the Windows operating system. Security should be integrated within the network infrastructure of the website to prevent unsecure access, virus attacks, and cyber theft. It should have secure passwords and firewalls (Elmasri, & Navathe, 2011). 1.3.6. Definition of Terms (if applicable) 1. Access Rights- Rights for using a vendor's online collection or database defined by a license, or other contractual and/or co- operative agreement. 2. Data Warehouse- a system which is used in reporting and analysis of data. Data warehouses are central repositories of integrated data from one or more disparate sources (Elmasri, & Navathe, 2011). 3. Database- A collection data that is electronically stored with a mutual user interface and software for the retrieval and manipulation of data (Elmasri, & Navathe, 2011). 4. Digital Advertisement- The use of the internet in creating awareness in the company’s website. 5. Firewall- A system that prevents unauthorized access to or from a private network. Firewallscan be implemented in hardware and software as well as the website itself (Elmasri, & Navathe, 2011). 6. Network Infrastructure- Part of the IT infrastructure often established in most enterprise IT environments (Elmasri, & Navathe, 2011). 7. Network Security- are the requirements and rules accepted by a network administrator to avoid and control unauthorized access, misuse, modification, or denial of a computer network
  • 6. and network-accessible resources (Elmasri, & Navathe, 2011). 8. Offshoring- the relocation of a business process by a company from one nation to another. It is mainly the operational processes, such as manufacturing, and accounting that are offshored (Oslen, 2006). 9. Outsourcing. The allocation of specific business processes to an external service provider (Olsen, 2006). 10. Visualization- means of reducing IT expenses while boosting efficiency and agility. References: Elmasri, R. & Navathe, S (2011). Fundamentals of database systems. Addison-Wesley. Olsen, K.B (2006). “Productivity impacts of Offshoring and Outsourcing: A Review”, OECDScience, Technology and Industry Working Papers, 2006/1, OECD Publishing. 1 Project Deliverable 1: Project Plan Inception Jessica Hill Dr. Jan Felton CIS 590: Directed Research Project January 18, 2015
  • 7. Background Information WebFOCUS is an innovative internet based company that acquires its funds from a small group of shareholders and entrepreneurs. The corporation came into existence in March of 2010. The company went live with close beta. Later, they opened registration through email request. This company provides users with a facility to display what they are about. The users can create, manipulate, sort, upload and manage images with the internet based company. It is a personalized display place for media content (Divitini, & Brasethvik, 1999). The company offers facilities of visual discovery. It also provides sharing, collecting and storage of visual tools. The user creates a board and then selects an item, website or page and pins it to the board. The client can save and share these pins. These boards can be used to make projects or to merge data and pictures together (Divitini, & Brasethvik, 1999). The company manages it’s working with the help of operational systems and the data of the users is maintained through relational databases. A user creates a personal pin board where he displays images of his interest and information about the images displayed and is maintained in the database of the company for future reference (Divitini, & Brasethvik, 1999).
  • 8. Details of Business Activities of the Company Business activities are carried out in order to generate profit. One of the means of making profit includes charging advertisers. The company places off sponsored pins on category pages or individual profiles which influences other users. Advertisers pay for such pins. The company carries out branded campaigns. Several brands create pages and place their products which represent their brands. Thus, revenue is generated through the respective brands. There are companies like Outbrain which provide aid to publishers in making money. This is done by directing visitors to other sites. The company makes profit through charging the e-commerce partners too (Divitini, & Brasethvik, 1999). Revenue can easily be collected by charging for the company’s membership or for transactions. The company offers a special section of its site which acts like a marketplace. The internet based company creates a customer to the customer marketplace. In this case, it acts like a medium of communication between two consumers and charges fees for it. The customer can sell their products to other customers by using this medium. The internet based company can also make earnings by generating its own products. The company receives basic information of the demands of customers through their pins. It can generate its own services for fulfilling the needs of customers and charge them for it. Turnover is also generated by charging business to business partners. Data can be packaged and sell to advertisers and retailers who care about the needs of customers. Speculations on Outsourcing and Offshoring Opportunities Opportunities are outsourced when the company can get them done at a lesser cost. When outsourcing is done, the company only pays a fraction of amount for it and the pain of fulfilling the task under the given payment is what customer bears. It also gives opportunity of having a following workforce which never ends (Olsen, 2006). When work
  • 9. is outsourced, a wide-ranging documentation of the software should be made. This way, the customer will be able to give best results on the work taken under consideration. Before outsourcing any project, the company should always explain to its staff the reason why it is being outsourced. This will ease any doubt about the project to the staff. The company should make provisions for retaining its employees with outsourcing. If a company has a reputation in outsourcing then lesser employees sign up for it. Hence, employees with skills in high demand should be retained at any cost. When deciding for outsourcing, the work should be monitored. If it is not done, then the company will have no basic knowledge of the project (Olsen, 2006). It is also difficult to manage globally distributed employees. The workers belong to different geographic locations and cultures which makes it difficult to manage them. Also in case of natural disasters, no guarantee of work is assured. Offshoring is the phenomenon in which groups from different locations of world combine and work out together. It helps in the way that the time difference of working groups at different geographic locations can be both advantageous and disadvantageous (Olsen, 2006). When one group is asleep, the other can continue working. On the other hand, it can lead to communication differences which can be created when there is an urgent need to discuss some part of project. Offshoring also accounts for problems such as that of cultural differences and language barrier. The teams under offshoring have lives of their own. Their environmental differences can lead to different assumptions being made by different teams which can hinder the growth of the work. Generally, high turnover is not easy with offshoring opportunities. If the offshore group is good at one thing, it does not ensure that it will carry out all the other works also with same efficiency (Olsen, 2006). Offshoring can also generate hidden costs for the
  • 10. company when giving out such opportunities. The hidden cost here includes: cost of telephone calls, web-based meetings which are an essential requirement of any project work, and video conferences, which can be needed in order to facilitate efficient conversation (Olsen, 2006). Data in offshoring also gets lost due to translation. The language barrier generates a need for efficient translation. This process takes time which results in loss of data which would have been essential for project development (Olsen, 2006). Current Information System The operational systems used by WebFOCUS to support its business include Microsoft Windows and Linux. Microsoft Windows is a powerful tool that provides an effective graphical user interface which makes working easy for its users. On the other hand, Linux is an open source operating system which can be circulated and customized by anyone. The company uses relational databases to store files. This works on the basis of the relational model. The data is arranged in tables in the form of rows and columns and can easily be sorted with the help of a unique key meant for each row. The relational database works on CODD’s rules and uses structured query language for carrying out queries in database and for maintaining data too (Elmasri & Navathe, 2011). Data warehouses are used for accumulation and analysis of data. The extract-transform-load based data warehouse is used by company. It uses staging and data integration techniques. It maintains history of data and improves data quality. Data from multiple sources in integrated in a data warehouse. It also provides a single general data model for storage of entire data (Elmasri & Navathe, 2011). Cloud computing is the technique in which several remote servers and software networks are interconnected. It facilitates the central storage of data. It also provides access to computer services and resources online. According to requirement, the company can build up private, public, or hybrid cloud for the same.
  • 11. A private cloud is operated only for a single organization either internally or in an external mode. A public cloud provides services over a public network. A hybrid cloud is an integration of two or more clouds together. These clouds are individual in nature but are bound together in some manner (Elmasri & Navathe, 2011). Virtualization enables the facility to run on many virtual environments. The company uses it through Linux in which a visitor can run in the environment provided by the existing software (Elmasri & Navathe, 2011). Network infrastructure and security is ensured with the help of different factors such as: firewall, multiple levels of authentication and application security, which is achieved with the help of secure coding techniques and antivirus software. Intrusion detection systems can also be installed in order to prevent the entry of unauthorized users. Such systems generate an alarm when an unauthorized person tries to enter the premises of the secure zone (Elmasri & Navathe, 2011). References: Divitini, M., & Brasethvik, T. (1999). Internet-based organizational memory and knowledge management. D. G. Schwartz (Ed.). IGI Global. Elmasri, R. & Navathe, S (2011). Fundamentals of database systems. Addison-Wesley. Olsen, K.B (2006). “Productivity impacts of Offshoring and Outsourcing: A Review”, OECDScience, Technology and Industry Working Papers, 2006/1, OECD Publishing.