PROJECT MANAGEMENT PLANS
1
PROJECT MANAGEMENT PLANS
11
Critical Success Factors in Project Management
PM 598 – PM Mgmt. Capstone - Week 3
May 31, 2016
A risk is a probability that loss, liability or a negative occurrence which may be caused by internal or external vulnerability and can be management through its identification, assessment, evaluation, control and monitoring (Cooper & International, 2005). Risk assessment is the phase of risk management which involves evaluating the potential risks that may occur in an activity which has been projected, during risk assessment one comes with a risk matrix by identifying all the possible risk which are then evaluated in terms of probability or likelihood of the risk and the severity of the impact it will have on the project, this is done by assigning rating and numeric figures to get the compounded risk score.
The first step in project risk management planning is risk identification; this is where you identify those risks which are likely to occur during the EOS-RSA Authentication Server Upgrade. This is the occurrences which could manifest themselves during the project and affect its performance (Cooper, 2014). The following risks are likely to occur during the EOS-RSA Authentication Server Upgrade project; schedule risks i.e. project wrong time estimation, budget risks i.e. cost overruns, operation failure risks i.e. insufficient resources, technical risks i.e. continuous change of project requirements, programmatic risks, in this case, a good example is running out of fund or resources among others.
After the risk are identified to complete the matrix, the risks should be quantified by assigning them numeric ratings depending on the frequency or the likelihood that they can occur and also the severity or the impact they can have on the EOS-RSA Authentication Server Upgrade project if the risks occur. As the project manager, I will use a scale between 1 and 10 to rate the likelihood that the risk can occur, a rating of 1 means that there is a low likelihood that the risk will occur where a rating of 10 means that a risk has a high probability of occurrence to the project. A good example from the identified risk wrong time estimation have a rating of 8 while running out of fund has a rating of 2 this means that wrong time estimation risk have a high probability of occurrence compared to the risk of the project running out of the fund. On the impact or the severity of the risk to the EOS-RSA Authentication Server Upgrade project the small scale have been used to rate the impact the risk will have on the project, a rating of 1 means the risk have less or no impact on the project while a rating of 10 means that the risk will have fatal effects on the project which could mean the project fails to deliver its objectives or takes more time and fund than have been allocated, an example from the matrix table continuous change of requirement have a rating scale of 3 while insufficient resources r.
Today as we see, software has become an inseparable part of human life. Almost everything we can look around is managed, controlled by software.
The goal of software project management is to understand, plan, measure, and control the project such that it is delivered on time and on budget. This involves gathering requirements, managing risk, monitoring and controlling progress, and following a software development process.
Running head PROJECT MANAGEMENT.1PROJECT MANAGEMENT.2.docxtoltonkendal
Running head: PROJECT MANAGEMENT. 1
PROJECT MANAGEMENT. 2
Project management process is a crucial tool in the development of any organization. This is because the projects that the organization deploys determine the business clientele. Critical analysis of the project management process is paramount to the successful execution of these elements within an organization. In the case of introducing the California Coast Credit Union into the San Diego State University, there are five crucial processes that should be adhered to in order to ensure the project’s success.
Initiation
During the initiation process, the eligibility of any relevant projects available is checked so as to validate the feasibility of the project plan. Once the project plans have been presented and the feasibility checked, the selection process is then initiated based on the requirements that each individual project would require. The project manager and the project management team then sign off on the requirements of the specific project selected.
In this case, the DBSI team was selected for the implementation of data signage procedures that are to be introduced within the student’s hub of the San Diego State University. It is during this stage that the appropriate team members of the project are identified as well as the project leaders. Selection of the project leaders is crucial to the next stage of the project management process which is the planning process. Furthermore, the ideal environment for the execution of the project is also identified so as to propagate an approximate orientation as to the next stage of the project plan (Making Waves with Digital Signage, 2014).
Planning
The next stage of the project management process is the planning process. The planning process is crucial in the intricate addressing of the project requirements so as to effectively kick start the project. Once all the project requirements are identified, the project planning can then be able to cultivate procedural steps in the implementation of the project. The project requirements are aligned with the project objectives or the elements that the project hopes to achieve. The specific objectives of the California Coast Credit Union by introducing data signage in the San Diego State University is to create an interactive forum where the students would be able to relate to the credit union, create a specific brand that would advocate for reliability and accessibility, and finally create and more engaging foot traffic among the thirty thousand students operating the campus (5 Basic Phases of Project Management, 2016).
The planning process also involves the scope of the project in terms of its relativity to the actual services that the project hopes to provide. The scope would entail prospects such as open air digital designs, using the ideal equipment so as to utilize the available technology and presentation of the right content in an entertaining forum. Moreover, the planning process als ...
Preempting enterprise resource planning (ERP) project failure could well become the Holy Grail for organizations seeking to improve their technology infrastructure, organizational efficiency, and competitiveness. The business of preempting project failure begins with understanding that there is a preventative approach that can provide planned project assurance at critical points in the project’s evolution. It begins with clear understanding of expectations – from the executives, to the business and IT management, to the software vendors and end users. Learn how corporations are using project assurance methodologies to successfully implement enterprise software projects on time and on budget.
This task contains portions of material that were originally submi.docxherthalearmont
This task contains portions of material that were originally submitted during the [CS455].
Colorado Technical University
SWE410-1704B-01 Software Processes
Software Development Quality Plan
Student: Seth Holley
14 Dec 2017
Contents
Project Goals and Scope 3
Project Management Process 5
Requirements Management (REQM) 9
Product and Process Quality Assurance (PPQA) in CMMI 12
Software Development Methodology 15
Conclusion 20
References 21
Project Goals and Scope
Apex banking system is a reliable solution for the integration of all internal processes in a financial organization. It specializes in the core banking services. Also, it provides functional support for the products and services offered by the financial institution. The system complies with all reporting and accounting standards.
Each piece of software that has been developed is based on the set goals and objectives of the user. These goals and objectives are provided in the form of the requirements and the desired functionality of the given system. While addressing the issue of system requirements and requirement traceability, Apex banking system is going to look at the respective requirements for an online banking system with respect to the various areas of application as far as the system is concerned. Users in this system will be responsible check account balances, locking cards that have been lost or stolen, adjusting statements, waiving charges, view future auto deposits (2-3 days prior), and helping customer via phone if they decide to call in. Customer’s responsibilities are going to be checking account balance, requesting new accounts transfer or send money to someone, pay a bill, deposit check by picture, manage security such as passcodes, set up alerts and close accounts.
The system specifications in terms of the functionality of the system are defined by the functional requirements (Paetsch, Eberlein & Maurer, 2003). As far as the Apex online banking system is concerned, the requirement specifications are as described. Functional and the respective specifications for the system include what the system is expected to do to the user as well as to the other users of the system.
The system will provide the user with a clear user interface to facilitate the operations of the user to the system as far as banking is concerned. The user will be able to request to open an account online regardless of the user`s geographical location. The user will also be able to make the desired check deposits into the opened account regardless of the location of the user. The system is will provide the user with the services of bill paying. In case a user decides to terminate their banking services with the bank, the system will offer account termination services. The system will also facilitate the user to transfer funds from their account to any desired account. The specific requirements are as summarized below:
· Ability to request to open an account.
· Ability to login and ...
You have collected the following documents (unstructured) and pl.docxbriancrawford30935
You have collected the following documents (unstructured) and plan to apply an index technique to convert them into an inverted index.
Doc 1?Information retrieval is the activity of obtaining information resources relevant to an information need from a collection of information resources. Searches can be based on full-text or other content-based indexing.
Doc 2?Information retrieval is finding material of an unstructured nature that satisfies an information need from within large collections.
Doc 3?Information systems is the study of complementary networks of hardware and software that people and organizations use to collect, filter, process, create, and distribute data.
In the process of creating the inverted index, please complete the following steps:
Remove all stop words and punctuation, and then apply Porter’s stemming algorithm to the documents. Thelist of stop words for this task is provided as follows:
Is, The, Of, To, An, A, From, Can, Be, On, Or, That, Within, And, Use
Create a merged inverted list including the within-document frequencies for each term.
Use the index created in part (b) to create a dictionary and the related posting file.
You may like to test the inverted index by using the following keywords:information, system, index
.
You have been working as a technology associate the information .docxbriancrawford30935
You have been working as a technology associate the information systems department at Corporation Techs for a while now. You have discovered so far that all of Corporation Techs’ computer systems share the same Class C public IP address range, including workstations along with servers providing authentication, e-mail, and both secure and public Web sites.
Your next task in this project is to construct a basic network design. An important requirement for the network design is to reduce the number of public addresses needed as the subnet lease results in very high ISP costs.
Tasks
Construct a basic network design, separating private and public services within the Corporation Techs’ network. To do so, you must:
Access the PCAP files using NetWitness Investigator, and browse the Nmap scan (XML format), topology fisheye chart (PDF format), and Nessus report (HTML format).
Identify vulnerabilities and clear-text information transfer.
Conduct research and determine the best network design to ensure security of internal access while retaining public Web site availability.
Identify any opportunities for reduced ISP costs through port redirection or address translation.
Design a network configuration, identifying network gateways, port or address redirection systems, and the location of hosts within private and protected network segments.
Create a professional report detailing the information above as supportive documentation for the network security plan.
Create a report that includes a basic network diagram and research results.
.
More Related Content
Similar to PROJECT MANAGEMENT PLANS1PROJECT MANAGEMENT PLANS .docx
Today as we see, software has become an inseparable part of human life. Almost everything we can look around is managed, controlled by software.
The goal of software project management is to understand, plan, measure, and control the project such that it is delivered on time and on budget. This involves gathering requirements, managing risk, monitoring and controlling progress, and following a software development process.
Running head PROJECT MANAGEMENT.1PROJECT MANAGEMENT.2.docxtoltonkendal
Running head: PROJECT MANAGEMENT. 1
PROJECT MANAGEMENT. 2
Project management process is a crucial tool in the development of any organization. This is because the projects that the organization deploys determine the business clientele. Critical analysis of the project management process is paramount to the successful execution of these elements within an organization. In the case of introducing the California Coast Credit Union into the San Diego State University, there are five crucial processes that should be adhered to in order to ensure the project’s success.
Initiation
During the initiation process, the eligibility of any relevant projects available is checked so as to validate the feasibility of the project plan. Once the project plans have been presented and the feasibility checked, the selection process is then initiated based on the requirements that each individual project would require. The project manager and the project management team then sign off on the requirements of the specific project selected.
In this case, the DBSI team was selected for the implementation of data signage procedures that are to be introduced within the student’s hub of the San Diego State University. It is during this stage that the appropriate team members of the project are identified as well as the project leaders. Selection of the project leaders is crucial to the next stage of the project management process which is the planning process. Furthermore, the ideal environment for the execution of the project is also identified so as to propagate an approximate orientation as to the next stage of the project plan (Making Waves with Digital Signage, 2014).
Planning
The next stage of the project management process is the planning process. The planning process is crucial in the intricate addressing of the project requirements so as to effectively kick start the project. Once all the project requirements are identified, the project planning can then be able to cultivate procedural steps in the implementation of the project. The project requirements are aligned with the project objectives or the elements that the project hopes to achieve. The specific objectives of the California Coast Credit Union by introducing data signage in the San Diego State University is to create an interactive forum where the students would be able to relate to the credit union, create a specific brand that would advocate for reliability and accessibility, and finally create and more engaging foot traffic among the thirty thousand students operating the campus (5 Basic Phases of Project Management, 2016).
The planning process also involves the scope of the project in terms of its relativity to the actual services that the project hopes to provide. The scope would entail prospects such as open air digital designs, using the ideal equipment so as to utilize the available technology and presentation of the right content in an entertaining forum. Moreover, the planning process als ...
Preempting enterprise resource planning (ERP) project failure could well become the Holy Grail for organizations seeking to improve their technology infrastructure, organizational efficiency, and competitiveness. The business of preempting project failure begins with understanding that there is a preventative approach that can provide planned project assurance at critical points in the project’s evolution. It begins with clear understanding of expectations – from the executives, to the business and IT management, to the software vendors and end users. Learn how corporations are using project assurance methodologies to successfully implement enterprise software projects on time and on budget.
This task contains portions of material that were originally submi.docxherthalearmont
This task contains portions of material that were originally submitted during the [CS455].
Colorado Technical University
SWE410-1704B-01 Software Processes
Software Development Quality Plan
Student: Seth Holley
14 Dec 2017
Contents
Project Goals and Scope 3
Project Management Process 5
Requirements Management (REQM) 9
Product and Process Quality Assurance (PPQA) in CMMI 12
Software Development Methodology 15
Conclusion 20
References 21
Project Goals and Scope
Apex banking system is a reliable solution for the integration of all internal processes in a financial organization. It specializes in the core banking services. Also, it provides functional support for the products and services offered by the financial institution. The system complies with all reporting and accounting standards.
Each piece of software that has been developed is based on the set goals and objectives of the user. These goals and objectives are provided in the form of the requirements and the desired functionality of the given system. While addressing the issue of system requirements and requirement traceability, Apex banking system is going to look at the respective requirements for an online banking system with respect to the various areas of application as far as the system is concerned. Users in this system will be responsible check account balances, locking cards that have been lost or stolen, adjusting statements, waiving charges, view future auto deposits (2-3 days prior), and helping customer via phone if they decide to call in. Customer’s responsibilities are going to be checking account balance, requesting new accounts transfer or send money to someone, pay a bill, deposit check by picture, manage security such as passcodes, set up alerts and close accounts.
The system specifications in terms of the functionality of the system are defined by the functional requirements (Paetsch, Eberlein & Maurer, 2003). As far as the Apex online banking system is concerned, the requirement specifications are as described. Functional and the respective specifications for the system include what the system is expected to do to the user as well as to the other users of the system.
The system will provide the user with a clear user interface to facilitate the operations of the user to the system as far as banking is concerned. The user will be able to request to open an account online regardless of the user`s geographical location. The user will also be able to make the desired check deposits into the opened account regardless of the location of the user. The system is will provide the user with the services of bill paying. In case a user decides to terminate their banking services with the bank, the system will offer account termination services. The system will also facilitate the user to transfer funds from their account to any desired account. The specific requirements are as summarized below:
· Ability to request to open an account.
· Ability to login and ...
You have collected the following documents (unstructured) and pl.docxbriancrawford30935
You have collected the following documents (unstructured) and plan to apply an index technique to convert them into an inverted index.
Doc 1?Information retrieval is the activity of obtaining information resources relevant to an information need from a collection of information resources. Searches can be based on full-text or other content-based indexing.
Doc 2?Information retrieval is finding material of an unstructured nature that satisfies an information need from within large collections.
Doc 3?Information systems is the study of complementary networks of hardware and software that people and organizations use to collect, filter, process, create, and distribute data.
In the process of creating the inverted index, please complete the following steps:
Remove all stop words and punctuation, and then apply Porter’s stemming algorithm to the documents. Thelist of stop words for this task is provided as follows:
Is, The, Of, To, An, A, From, Can, Be, On, Or, That, Within, And, Use
Create a merged inverted list including the within-document frequencies for each term.
Use the index created in part (b) to create a dictionary and the related posting file.
You may like to test the inverted index by using the following keywords:information, system, index
.
You have been working as a technology associate the information .docxbriancrawford30935
You have been working as a technology associate the information systems department at Corporation Techs for a while now. You have discovered so far that all of Corporation Techs’ computer systems share the same Class C public IP address range, including workstations along with servers providing authentication, e-mail, and both secure and public Web sites.
Your next task in this project is to construct a basic network design. An important requirement for the network design is to reduce the number of public addresses needed as the subnet lease results in very high ISP costs.
Tasks
Construct a basic network design, separating private and public services within the Corporation Techs’ network. To do so, you must:
Access the PCAP files using NetWitness Investigator, and browse the Nmap scan (XML format), topology fisheye chart (PDF format), and Nessus report (HTML format).
Identify vulnerabilities and clear-text information transfer.
Conduct research and determine the best network design to ensure security of internal access while retaining public Web site availability.
Identify any opportunities for reduced ISP costs through port redirection or address translation.
Design a network configuration, identifying network gateways, port or address redirection systems, and the location of hosts within private and protected network segments.
Create a professional report detailing the information above as supportive documentation for the network security plan.
Create a report that includes a basic network diagram and research results.
.
You have chosen to join WHO. They are particularly interested in.docxbriancrawford30935
You have chosen to join WHO. They are particularly interested in your microbiology skills since there have been many outbreaks of disease around the world. Now that you have reviewed your microbiology, you have been notified that you will be sent to one of two areas, West Africa, or the Middle East. In preparation, the Peace Corp would like you to choose one of these areas and complete a plan to deal with outbreaks or potential outbreaks in the area.
Choose an outbreak from those below to investigate.
Ebola or Middle East respiratory syndrome coronavirus (MERS-CoV)
Locate resources that will provide information about the infection, causing microbe, mode of infection, mode of spread, group or groups specifically susceptible, where outbreak occurred and when, clinical evaluation and diagnosis, infection control.
Find first person reports such as interviews or personal reports or journals on the outbreak. If you need help work with the librarian.
Design and submit an outline of the information you have uncovered. You will use this information to complete the project.
The outline should contain information and cited resources for:
Name of the disease chosen
Causing microbe
Mode of infection
Mode of spread
Group or groups specifically susceptible
Where outbreak occurred and when
Clinical evaluation and diagnosis
Infection control.
.
You have been tasked to present at a town hall meeting in your local.docxbriancrawford30935
You have been tasked to present at a town hall meeting in your local town or city to present the details about a new local policy that is being proposed. The presentation will need to define the problem, proposed solutions, risks, challenges, and funding opportunities/challenges. Topics may include local government changes to communities (for example, transportation, commercial enterprise effects on nearby townships, affordable housing construction, environmental effects of new/old business operations, addressing homelessness support, and others).
Using the
Policy Identification and Analysis Assignment Template [PPTX],
develop an 8–10 slide presentation in which you:
Analyze and define the problem to include possible political conflicts.
Identify risks and challenges.
Identify and construct policy alternatives and solutions.
Identify stakeholders and key roles.
Identify funding opportunities, challenges, and budget cost factors, to include saving measures.
Select supportive and evaluative criteria.
Identify incentives, subsidies, and potential benefits.
Draw conclusions in a thorough summary, including lessons learned.
Use the Internet or Strayer databases at the
Strayer Library
to locate at least three quality resources in this assignment.
Note
: Wikipedia and similar websites do not qualify as quality resources.
Use the
Policy Identification and Analysis Assignment Template [PPTX]
.
.
You have been tasked as the health care administrator of a major hos.docxbriancrawford30935
You have been tasked as the health care administrator of a major hospital to create a financial plan for your organization. What would you include in your financial plan? Compare an operating budget versus a capital budget? Include examples of each budget in a hypothetical department or unit of a hospital. Cite and reference your resources.
.
You have been tasked to devise a program to address the needs of.docxbriancrawford30935
You have been tasked to devise a program to address the needs of crime victims. To better understand what type of program to devise, you need to review some crime data. The crime data will help you to identify the various types of crimes being committed and how the various types of crime victims are impacted by their offenders. Select a source that compiles crime data. Describe why you selected that particular source and what type of data that source contains. Secondly, describe the basic goals of your proposed program and what types of services the program would provide to crime victims based on the various types of crimes. For example, what would be a program goal for a rape victim, and what type of program(s) or service(s) would be devised to address the victim’s needs (this could include gender, age, and group counseling sessions).
Assignment Guidelines
Select a source that compiles crime data.
Address the following in 750–1,000 words:
Why did you select that particular source? Explain in detail.
What type of data does that source contain? Describe in detail.
What are the basic goals of your proposed program? Explain in detail.
What types of services would the program provide to crime victims with regard to the various types of crime? Explain in detail.
Be sure to reference all sources using APA style.
.
You have been successful in your application for the position be.docxbriancrawford30935
You have been successful in your application for the position below and are invited to interview – time and date to be arranged.
Job Title: Social Care Worker – Residential services Panel
The social care worker will…
· work with children / young people, families and / or significant others, Social Work teams, other healthcare providers and agencies, schools, training agencies and community groups.
· care for, protect, and support vulnerable or dependent clients, individually or in groups, in conjunction with the wider multidisciplinary team and other relevant agencies. S/he will ensure the welfare of those under his / her care and will act as an advocate as appropriate.
· contribute to the planning and evaluation of individualised and group programmes of care, which are based on needs, identified in consultation with the client and others and delivered through day-to-day shared life experiences.
· work as part of a team to provide a safe, caring environment for resident clients/ children / young people with the primary aim of providing the intervention necessary to address the issues that are preventing them from fulfilling their outcomes.
· treat clients/ children/ young people and their families with dignity and respect, promoting a culture of unconditional positive regard at all times.
· recognise clients/ children / young people as expert through experience, promoting their participation in care planning, placement planning, decision-making and service delivery.
· contribute to the promotion of good links with neighbours, local community resources, i.e. schools, employment schemes and clubs, local Gardai and any other appropriate service.
· engage in reflective and evidence based practice
. That guideline to use to answer this question 1 to 3
1. Creative practice, reflective practice and team skills
It is important that the Social Care Worker can work independently as well as part of a wider healthcare team, building and maintaining relationships and understanding and valuing individuals and their respective professional roles. S/he should be able to identify the limits of their practice and know when to seek advice and additional expertise or refer to another professional. S/he should be able to give and receive feedback and to input their learning into their practice.
In the space below, please give an example of a situation where you were responsible for an individual piece of work with a service user/group of service users and which demonstrates your ability in the above areas
2
.
Flexibility, resilience and ability to deal with challenges.
An effective Social Care Worker demonstrates a commitment to providing a quality service. S/he is innovative and open to change in striving to ensure high standards in service delivery. Challenges can arise in many ways in the course of Social Care practice and an ability to manage adversity when it arises is an important professional skill.
In the space below, please give an.
You have been hired as a project management consultant by compan.docxbriancrawford30935
You have been hired as a project management consultant by company XYZ to review the status of a CRM (Customer Relationship Management) implementation by their internal project manager. Project Manager has spent allot of time with stakeholders on request for additional features being added to the project, resulting in 7 CRs (total potential project impact of $400,000). You are to review and assess the available current data on the project and provide specific recommendations and prioritized next steps to the executive committee.
Start Date: March 2021
Planned Finish Date: September 2021
Current Phase: Implementation
Overall Percent Complete: 40%
Overall Approved budget: $1,000,000
Actual Cost to date: $650,000
Number of Change Requests submitted by stakeholders: 7
CPI = 0.45
SPI = 0.65
EV = $400,000
.
You have been hired to manage a particular aspect of the new ad.docxbriancrawford30935
You have been hired to manage a particular aspect of the new adult addictions center. It is your job to write a proposal to bring to the next board meeting so that funds can be allocated to initiate your plans. This is the brainstorming stage of the planning. Your proposal will need to be scrutinized by the board before it approves it. It is important to be as specific and detailed as possible to justify the needs of your department before going forward. It is also important to be realistic, but at the same time expand your ideas, goals, and aspirations into doable actions because this board wants you to think outside of the box.
MY ASSIGNED ROLE IS COMMUNITY RESOURCES
Community referrals and other needs (e.g., working with the justice system, local businesses, and nonprofit organizations)
Write a 900–1,200 word paper that addresses the following:
What is the department’s role within the organization, and what are its responsibilities?
What are the client needs or services that are addressed by this department?
What individuals and resources are needed to provide those services?
**** Paper must include ****
Abstract
Introduction
Conclusion
References for all of the sections, in APA style
.
You have been hired by Red Didgeridoo Technologies. They know th.docxbriancrawford30935
You have been hired by Red Didgeridoo Technologies. They know that they need to have network storage technologies, but their IT is a little lost. They want to have a scalable infrastructure to be able to expand and shrink the servers in their infrastructure when needed. In order to do this, they have purchased a license for VMware vSphere 6 Enterprise Plus.
NOTE:There must be at least 1 to 2 paragraphs per question.
1. Find and describe 2 distinct uses for a File Sharing Server which uses the sharing protocol named NFS (at least one of these must be a use specifically involving VMware vSphere 6 Enterprise Plus). List the advantages of using these implementations instead of using SMB or CIFS.
2. Find and describe 2 distinct uses (at least one of these must be a use which specifically involve VMware vSphere 6 Enterprise Plus) for iSCSI technology.
.
You have been hired by TMI to design an application using shell scri.docxbriancrawford30935
You have been hired by TMI to design an application using shell script programs. TMI
Case
Projects
needs you to design and create a new directory structure.
The company has several departments: accounting, sales, manufacturing, information tech-
nology, and headquarters. The accounting department has accounts receivable, accounts
payable, and payroll functions within it. The manufacturing department runs three shifts
and a weekend shift.The information technology department has five projects in progress.
The sales department has offices located in the West, East, North, and South.
First, design the Linux file system hierarchy on paper. Keep in mind that the depart-
ments, functions, shifts, regions, and projects need to translate into directories. Next, you
need to create this hierarchy on the Linux system. Create at least one empty file in each
directory. Use the department, function, shift, region, or project name as the filename
and include an extension of .dat.
.
You have been hired to evaluate the volcanic hazards associated .docxbriancrawford30935
You have been hired to evaluate the volcanic hazards associated with a dormant volcano. The volcano has no historically recorded eruptions, but is showing signs of stirring to life. Assuming that future volcanic activity would be similar to the prehistoric eruptions, what information would you seek out in the field as a part of your evaluation, and why would you collect this information?
.
You have been hired as an assistant to the public health officer for.docxbriancrawford30935
You have been hired as an assistant to the public health officer for the state. The budget deficit has impacted your state, and with elections high on the list of worries, legislators are concerned about their public image and are contemplating reducing the public health budget for the state. You are being asked to prepare a presentation to persuade legislators not to cut public health spending.
Select a public health program/service that will be impacted by a recently proposed state budget cut.
Prepare a PowerPoint presentation to persuade legislators not to cut public health funding. Present the cost/benefit of the public health program/service, the expected impact of the proposed cut, and conclude with an alternative proposal.
The presentation should have a minimum of 15 slides (not including the reference slides).
Notes should be present with each slide describing the information on the slide.
Provide supporting information.
Use charts, graphs, and other visuals.
Please make sure to present some state and local data of the community that will be impacted by the cuts.
REQUIREMENTS:
- Length: Assignment should be at least 15 slides, not counting reference slides.
- Cite your sources and include reference slides.
.
You have been engaged to develop a special calculator program. T.docxbriancrawford30935
You have been engaged to develop a special calculator program. The requirements for this program are very specific, and are as follows:
Create a Windows Forms application in Visual Studio using C#. The interface should look similar to the following:
Create the following controls, as shown above:
Labels for “Enter Information,” “Name,” “Input 1,” and “Input 2”
3 textboxes, as shown in the picture above
Buttons for addition, subtraction, multiplication, and division
Buttons for calculating sine, cosine, and tangent (based on the first input textbox only)
A button that calculates modulus
A button that clears the textboxes
Write a method for each of these calculations that will accept the incoming numbers from the two input fields and return the calculated value.
This value should be displayed in a MessageBox window, which should also display the user’s name from the first textbox.
Please submit your zipped Visual Studio project.
.
You have now delivered the project to your customer ahead of schedul.docxbriancrawford30935
You have now delivered the project to your customer ahead of schedule, but slightly over budget. Now, it is time to reflect on what went well and what didn’t go so well. Based on feedback throughout the course, what would you have done differently in terms of scope, resources, and / or schedule, and why?
.
You have now delivered the project to your customer. The project was.docxbriancrawford30935
You have now delivered the project to your customer. The project was delivered ahead of schedule, as requested by your project sponsor, but over budget by 20 percent. Now, it is time to reflect on what went well and what didn’t go well. Based on feedback throughout the course, what would you have done differently in terms of scope, resources, and schedule, and why?
.
You have now experienced the work of various scholars, artists and m.docxbriancrawford30935
You have now experienced the work of various scholars, artists and musicians who have connected words to social justice.
Now, it is your turn. Write a poem, song, spoken word, lecture, or rap that captures the struggle, action or hope that exists in a social issue of black lives matter. Be creative; this is your opportunity to express your reflections and ideas in a personal and compelling way.
.
You have learned that Mr. Moore does not drink alcohol in the mornin.docxbriancrawford30935
You have learned that Mr. Moore does not drink alcohol in the mornings. He does not binge drink, and he does not drink on Sundays. He does, however, drink the other 6 days of the week. Mrs. Moore explains his pattern of drinking Monday through Friday with his partners as stated in the scenario above, but he does not drink at home on those days. She also informs you that he does drink on Saturdays at home, often starting in the afternoon and passing out by dinnertime. He has a history of being loud, frightening, and angry when under the influence of alcohol. You also learn that Mr. Moore’s father was a winemaker from Italy.
Your supervisor, Officer Steve, suggests that you apply your knowledge of issues surrounding alcohol abuse and alcohol addiction to this case and write a memo to him. The memo should include the proper headings: "To," "From," "Date," and "Re:." The docket number and probation case file number should be included in the "Re:" section. You are beginning to determine whether Mr. Moore has an issue with alcohol that needs to be further addressed.
In the memo, do the following:
Submit the assignment in the format of a memo.
Include the proper headings: "To," "From," "Date," and "Re:." The docket number and probation case file number need to be included in the "Re:" section.
Apply the facts of Mr. Moore's case to the definitions of alcohol abuse and alcohol addiction.
Apply these facts to the differences between alcohol use and abuse.
Apply these facts to the DSM-IV criteria for a diagnosis of alcohol abuse.
Apply these facts to the disease model of alcohol abuse.
Apply these facts to the role genetics and heredity may play in the transmission of alcohol abuse from one generation to another
.
.
You have been hired by a large hospitality firm (e.g., Marriot.docxbriancrawford30935
You have been hired by a large hospitality firm (e.g., Marriott International, Hilton, Sheraton, Best Western, etc.) to be the project manager of the firm’s HQ office relocation project. You have been asked to speak to the HQ HR staff about the project. Many of the staff have very little understanding of project management. Also, they are fearful that this project will end up being a failure since other projects have failed at the firm. Explain to them the key elements of project management by comparing it to something they do understand well - human resources management (HRM). Be sure that your explanation addresses their fears of project management.
.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
1. PROJECT MANAGEMENT PLANS
1
PROJECT MANAGEMENT PLANS
11
Critical Success Factors in Project Management
PM 598 – PM Mgmt. Capstone - Week 3
May 31, 2016
A risk is a probability that loss, liability or a negative
occurrence which may be caused by internal or external
vulnerability and can be management through its identification,
assessment, evaluation, control and monitoring (Cooper &
International, 2005). Risk assessment is the phase of risk
management which involves evaluating the potential risks that
may occur in an activity which has been projected, during risk
assessment one comes with a risk matrix by identifying all the
possible risk which are then evaluated in terms of probability or
likelihood of the risk and the severity of the impact it will have
on the project, this is done by assigning rating and numeric
figures to get the compounded risk score.
The first step in project risk management planning is risk
identification; this is where you identify those risks which are
likely to occur during the EOS-RSA Authentication Server
Upgrade. This is the occurrences which could manifest
themselves during the project and affect its performance
(Cooper, 2014). The following risks are likely to occur during
the EOS-RSA Authentication Server Upgrade project; schedule
risks i.e. project wrong time estimation, budget risks i.e. cost
2. overruns, operation failure risks i.e. insufficient resources,
technical risks i.e. continuous change of project requirements,
programmatic risks, in this case, a good example is running out
of fund or resources among others.
After the risk are identified to complete the matrix, the risks
should be quantified by assigning them numeric ratings
depending on the frequency or the likelihood that they can
occur and also the severity or the impact they can have on the
EOS-RSA Authentication Server Upgrade project if the risks
occur. As the project manager, I will use a scale between 1 and
10 to rate the likelihood that the risk can occur, a rating of 1
means that there is a low likelihood that the risk will occur
where a rating of 10 means that a risk has a high probability of
occurrence to the project. A good example from the identified
risk wrong time estimation have a rating of 8 while running out
of fund has a rating of 2 this means that wrong time estimation
risk have a high probability of occurrence compared to the risk
of the project running out of the fund. On the impact or the
severity of the risk to the EOS-RSA Authentication Server
Upgrade project the small scale have been used to rate the
impact the risk will have on the project, a rating of 1 means the
risk have less or no impact on the project while a rating of 10
means that the risk will have fatal effects on the project which
could mean the project fails to deliver its objectives or takes
more time and fund than have been allocated, an example from
the matrix table continuous change of requirement have a rating
scale of 3 while insufficient resources risk have an impact scale
of 8 this means insufficient resources will have fatal effects to
the EOS-RSA Authentication Server project success. The risk
assessment score is calculated by multiplying the risk impact
and its probability numerical scales (Aven, 2015).
Below is a table showing the various risks, probability, impact,
assessment score and the project team response about the risk.
Risk Title
Probability
3. Impact
Assessment score
Response
Wrong time estimation
8
4
32
This risk is the one which is likely to occur to the project and
can bring about the project completion date occurring in later
dates since the project will take more time than what was
initially planned and it can remedied by correct estimation and
duration adjustments.
Cost overruns
5
6
30
This where the project will spend more than what was initially
planned, this risk can be managed by requesting for more
resources from the project sponsor.
Insufficient resources
3
9
27
Project activities are already in progress but there are no
resources to undertake the activities this can be mitigated by
securing the required resources before the project kickoff.
Requirements changes
6
4
24
Bring about failure in project productivity and performance
since the project requirements changes. This can be minimized
by project users involvement and documentation of
requirements specification
Running out of funds
3
4. 8
24
Project uses more than what the sponsor have provided making
it not to run to completion, this can be addressed by setting
aside more funds for the project
Project human resource management plans are required for the
most important resource to the project is its resources. EOS-
RSA Authentication Server Upgrade project requires specific
expertise which may not be available with the current
employees and if it is available the current employees may be
handling multiple projects which cannot do without his or her
expertise. The project also might require specific talents which
can only be acquired through contracting or from other third
party vendors. To fulfill the human resource needs the first is to
document the EOS-RSA Authentication Server Upgrade project
responsibilities and roles for various project stakeholders.
An organization chart is developed for all project teams
members with the main purpose is each member to know his
role and responsibility and what type of staffing requirement is
needed and at when is it needed. A staffing management plan is
developed to determine how the human resources were to be
brought to the project and how it was to be taken out of the
project team. The next step was staff acquisition which was
done by the HR staff which acquires the necessary staff by
considering previous experience, availability, interests,
competencies and proficiency, example Kun Jiang was acquired
through this process because he had more experience in
development in project related to EOS-RSA Authentication
Server Upgrade.
After acquiring the required staff, there was a need for team
development to enhance team’s ability to contribute as a team
and as an individual. The acquired staff will be trained by the
senior stakeholders who have experience with projects similar
to EOS-RSA Authentication Server Upgrade project and also the
staff will be supposed to attend a seminar about the current
5. project for more training, they will also undertake a physical
team building activity. To improve the performance of the
project stakeholders and team the Human Resource Manager
will reward the stakeholders based on the specific goals which
have been achieved, a bonus amount agreed by project team was
to be paid to project members who achieve their objectives and
targets in the agreed time and also a stakeholder who stayed
worked over time will be provided with extra money for the
extra time he had worked.
A project management communication plan is required in every
project, failure to communicate have been a great threat to
project success, strong communication skills are required to
ensure effective flow of information among all the project
stakeholders. To ensure effective communication between all
the project life cycle a communication planning need to done,
the plan should determine the communication and information
needs of the various stakeholders, coming up with ways to
ensure that the needed information by the stakeholders is
available to them in a timely manner, Collecting and
distributing project performance information which includes
progress reports, measured progress and forecasting.
According to (Collins, 2011)stakeholders are those individuals,
organization, group who are directly affected by the project
decision; every project have its own specific stakeholders and
EOS-RSA Authentication Server Upgrade project have the
following project stakeholders; sponsor who is the Bank of
Tokyo who is also the owner of the project, the project manager
who is responsible for planning, coordinating, decision making
for the project, customers and users who will be using the
upgraded EOS-RSA Authentication Server, HR staff who are
responsible for acquiring the extra staff needed for project
completion, Suppliers who will bring the resources for the
project which are not available at the organization, Project team
this include the developers and the designers who perform
6. various activities and tasks in the project, support staff
examples include the procurement officers.
Below is a table showing information produced during project
life cycle
Document/Information
Audience
Availability
Communication mode
Produced by
Project charter
Sponsor
Once
Hardcopy
Project manager
Budget
Sponsor
Once, on Request
Hardcopy
Project manager
Work breakdown Structure
Project team, Sponsor
Weekly
Hardcopy, Email
Project manager
Progress report
Sponsor
On request, Weekly
Hard copy, Email
Project Manager
Status report
Project team
Bi-weekly
Emails, Meetings
Project Manager
Project schedule
7. Sponsor, Project team
Weekly
Email
Project Manager
Change requests
Project Team, Sponsor
On request
Meetings, Hardcopy
Project Manager, Stakeholder
Performance indicators
Project team, Sponsor
Weekly
Email
Project Manager
Project report
Sponsor
Once
Hardcopy
Project Manager
Project procurement means acquiring services and goods that
the organization does not have and are required by the project
(Tracy, 2013). Project procurement has been important to the
project since it allows the project stakeholders to focus on the
core business of the project, it helps the project to access
services and technologies that the organization does not have
currently. Project procurement plan involves the following;
planning purchases and acquisition which is identifying those
services that EOS-RSA Authentication Server Upgrade project
requires, the second step is contract planning where you
identify potential sellers of the project, obtaining quotes, bids
and proposals from the sellers, selecting the sellers by
evaluating and negotiate the contract.
There are various methods, tools and techniques which can be
used manage procurement in the project they include; make-or-
buy analysis this is a method that is used to determine whether
8. an organization should make a particular project inside the
organization or should they buy it from an outside source
(Institute, 2004), this method helps the project management
team to decide whether it is beneficial in terms of quality and
cost to procure a service or produce it within the organization.
The second method to be used in procurement management plan
is market research which includes project team examining the
industry for specific vendors offering a certain product or
service; this information can be got through conferences, online
reviews and other ways to identify the capability of the market.
The other method is expert judgment where experts inside and
outside provide valuable decisions and advice in procuring of
services and products.
A contract is mutual binding agreement that obligates the seller
of a certain product or services to provide and the project's
owners to pay for the services which have been provided; the
contracts ensures there is accountability and responsibilities in
the parties involved. There are various contract vehicles which
project team can use during procurement of product and
services the best one for EOS-RSA Authentication Server
Upgrade would be the firm fixed price contract (FFP) which is a
subdivision of fixed price contract (Fleming, 2003), the main
reason for using Firm Fixed Price Contract is because the fee of
the products are known and the seller has to deliver the products
in the agreed time and money. Any cost incurred by the project
due to the sellers' bad performance will be his responsibility, an
example a seller has to deliver two new servers for $200,000
within two weeks and install them.
REFERENCES
Aven, T. (2015). Risk analysis. Chichester, West Sussex, United
Kingdom: John Wiley & Sons.
Collins, R. J. (2011). Project management. New York: Nova
9. Science Publishers.
Cooper, D. F. (2014). Project risk management guidelines ;
managing risk with ISO 31000 and IEC 62198. Hoboken, New
Jersey: John Wiley and Sons, Inc.
Cooper, D. F., & International, B. C. (2005). Project risk
management guidelines : managing risk in large projects and
complex procurements. West Sussex, England ; Hoboken, NJ: J.
Wiley.
Fleming, Q. W. (2003). Project procurement management :
contracting, subcontracting, teaming. Tustin, California: FMC
Press.
Institute, P. M. (2004). A guide to Project management body of
knowledge(PMBOK) . Newtown Square, Pa.: Project
Management Institute.
Tracy, J. (2013). PMBOK guide. North Charleston, South
Carolina: CreateSpace Independant Publishing Platform.
1[OA] Signature Assignment: Project Management Plan 100%
1Project Risks (10%)
Does Not Meet Expectations
Approaches Expectations
Meets Expectations
Exceeds Expectations
Top of Form
Feedback
Bottom of Form
2Project Risk Assessment (10%)
10. Does Not Meet Expectations
Approaches Expectations
Meets Expectations
Exceeds Expectations
Top of Form
Feedback
Bottom of Form
3Needs Acquisition (10%)
Does Not Meet Expectations
Approaches Expectations
Meets Expectations
Exceeds Expectations
Top of Form
Feedback
Bottom of Form
4Training & Recognition (10%)
Does Not Meet Expectations
Approaches Expectations
Meets Expectations
Exceeds Expectations
Top of Form
Feedback
Bottom of Form
5Stakeholder Groups (10%)
11. Does Not Meet Expectations
Approaches Expectations
Meets Expectations
Exceeds Expectations
Top of Form
Feedback
Bottom of Form
6Project Communication Plan (10%)
Does Not Meet Expectations
Approaches Expectations
Meets Expectations
Exceeds Expectations
Top of Form
Feedback
Bottom of Form
7Procurement Management (5%)
Does Not Meet Expectations
Approaches Expectations
Meets Expectations
Exceeds Expectations
Top of Form
Feedback
Bottom of Form
8Contract Vehicle (5%)
12. Does Not Meet Expectations
Approaches Expectations
Meets Expectations
Exceeds Expectations
Top of Form
Feedback
Bottom of Form
9The paper is organized in a logical and coherent manner.
Transitions are used to improved flow.(10%)
Does Not Meet Expectations
Approaches Expectations
Meets Expectations
Exceeds Expectations
Top of Form
Feedback
Bottom of Form
10Valid research is used to appropriately support the content.
References to sources are used when required. (10%)
Does Not Meet Expectations
Approaches Expectations
Meets Expectations
Exceeds Expectations
Top of Form
Feedback
Bottom of Form
13. 11The author uses correct grammar and spelling. Format and
citations are consistent with APA rules. (10%)
Does Not Meet Expectations
Approaches Expectations
Meets Expectations
Exceeds Expectations
Top of Form
Feedback
Bottom of Form
Break-Even Sales Under Present and Proposed Conditions
Battonkill Company, operating at full capacity, sold 107,100
units at a price of $135 per unit during 2014. Its income
statement for 2014 is as follows:
Sales
$14,458,500
Cost of goods sold
5,130,000
Gross profit
$9,328,500
Expenses:
Selling expenses
14. $2,565,000
Administrative expenses
1,530,000
Total expenses
4,095,000
Income from operations
$5,233,500
The division of costs between fixed and variable is as follows:
Fixed
Variable
Cost of goods sold
40%
60%
Selling expenses
50%
50%
Administrative expenses
70%
30%
Management is considering a plant expansion program that will
permit an increase of $1,350,000 in yearly sales. The expansion
15. will increase fixed costs by $180,000, but will not affect the
relationship between sales and variable costs.
Required:
1. Determine for 2014 the total fixed costs and the total variable
costs.
Total fixed costs
$
Total variable costs
$
2. Determine for 2014 (a) the unit variable cost and (b) the unit
contribution margin.
Unit variable cost
$
Unit contribution margin
$
3. Compute the break-even sales (units) for 2014.
units
4. Compute the break-even sales (units) under the proposed
program.
units
5. Determine the amount of sales (units) that would be
necessary under the proposed program to realize the $5,233,500
of income from operations that was earned in 2014.
units
6. Determine the maximum income from operations possible
with the expanded plant.
$
7. If the proposal is accepted and sales remain at the 2014 level,
what will the income or loss from operations be for 2015?
$ SelectIncomeLossItem 10
8. Based on the data given, would you recommend accepting the
proposal?
In favor of the proposal because of the reduction in break-even
point.
In favor of the proposal because of the possibility of increasing
income from operations.
16. In favor of the proposal because of the increase in break-even
point.
Reject the proposal because if future sales remain at the 2014
level, the income from operations of will increase.
Reject the proposal because the sales necessary to maintain the
current income from operations would be below 2014 sales.
Choose the correct answer.
Selectabcde
EOS-RSA AUTHENTICATION SERVER UPGRADE
1
EOS-RSA AUTHENTICATION SERVER UPGRADE
12
EOS-RSA Authentication Server Upgrade
Project Scope, Schedule, and Budget
PM 598 – PM Mgmt. Capstone - Week 2
May 23, 2016
Project Description
The project End Of Support RSA Authentication servers is a
project by the Bank of Tokyo which has been started so that the
bank client’s and customer can have authentication services
which will enable them access the bank internet applications,
the RSA Authentication will also enable remote access through
a RSA securID token.
17. The project will also have a Helpdesk Administration Portal
which will enable Administrators to efficiently perform support
activities to internal users. Finally, the project will also have a
Standard Operating Procedure which will be used in approving
and deploying RSA securID Soft Tokens which will eliminate
cost associated with mailing or replacement of Hard Tokens to
Internal Users.
Problem & Result Statement
The current version of RSA comes to End-of-Support on
12/31/2016. In the event of an RSA failure that requires
technical support, customers will not be able to access Bank's
Internet-facing systems. Some of the remedy to the problem
statement will be:
· Reduce the RSA SecurID maintenance and RSA
Administration costs
· Enhance and automate the process of deploying RSA SecurID
· Building a RSA Architecture needed to support RSA SecurID
soft and hard token distribution
Project Justification
The Bank End-of-Support upgrade of the RSA environment was
done in order to leverage the Enterprise plus license so as to
reduce the cost of maintenance. The EOS-RSA Authentication
Server Upgrade Project is the best because it will lower the cost
of maintenance and also it will be able complete the activities
which were started by Alternate Web Hosting Project and it has
a RSA Architecture that will allow remote access to the
environment by internal and external customers. As compared to
other alternatives the EOS-RSA Authentication Server Upgrade
18. Project is the best one to minimize the cost and allow support
services to be efficiently performed.
Project Scope Statement
IN SCOPE
The following items are considered to be in scope for this
project:
· Complete the replacement and configurations of the RSA
Authentication Servers so that RSA Enterprise Plus Licenses
can be installed, which will reduce the overall RSA license
annual maintenance cost
· Provide a Self-Service Portal for internal users of the RSA
environment.
· Ensure that the portal can be accessed on all bank owned
devices, and on all bank approved personal devices
· Ensure that the self-service portal can be accessed on all bank
supported browsers and on all supported browser versions.
· Provide an Admin Portal for the Helpdesk to more efficiently
perform remote Internal User support activities
· Create a test environment so that future updates and fixes can
be tested without interrupting Production.
· Ensure no service interruption in the event of either a
Component or Data Center failure
OUT OF SCOPE
The following items are not within scope of this project:
19. · Implementing RSA Enterprise Plus licenses and a self-service
portal for MUB and ISA-West Coast users.
· Providing a self-service portal for external customers.
Out of scope items will be considered in future projects
Major Project Deliverables
· Install the remaining RSA Authentication Servers in both the
Harborside and Sterling Forest Data Centers
· Purchase new hardware and software for hosting a Self-
Service and Helpdesk Portal for Internal Users
· Leverage the Enterprise Plus License structure to reduce
license maintenance costs
· Install new RSA Self-Service Portals to reduce ongoing
administrative and overhead costs, and improve the end-user
experience of Internal Users
· Deploy a Self-Service Portal so that Internal Users working
remotely can reset their RSA Token PIN without having to call
the Helpdesk.
High level Milestones and significant event
The current high level milestones completion dates are as
follows:
Planning
July 6, 2016
Design
August 7, 2016
Build & Configure Portals
September 18, 2016
Testing-Portals
November 13, 2016
Implementation: Portals
December 14, 2016
Build & Configure Soft Tokens
24. Fri 5/20/16
Fri 5/20/16
Kick-off Security
0 days
Sun 5/22/16
Sun 5/22/16
Complete EIS SRE Questionnaire
2 days
Sun 5/22/16
Mon 5/23/16
Kun Jiang
Obtain Initial Security Assessment Cost Estimations
0 days
Thu 6/2/16
Thu 6/2/16
Business & Infrastructure Requirements
10.29 days
Mon 5/30/16
Mon 6/13/16
Create BRD
5 days
Mon 5/30/16
Fri 6/3/16
Peter Tse (Koon Hing Tse)
Review BRD with SOE Management
0 days
Mon 5/30/16
Mon 5/30/16
Review BRD with QA and Obtain Approval
0 days
Wed 6/1/16
25. Wed 6/1/16
BRD Sign-off in ePLC
0 days
Thu 6/2/16
Thu 6/2/16
EIS Planning Phase Requirements & Activities
26.71 days
Mon 5/30/16
Tue 7/5/16
Complete Initial Security Risk Assessment Spreadsheet
5 days
Mon 5/30/16
Fri 6/3/16
Roger Brinkley, Kun Jiang
Review Initial Security Risk Assessment(SRA)
0 days
Thu 6/9/16
Thu 6/9/16
Scope Pentest and Technical Security Standard
Requirements
10 days
Mon 6/13/16
Fri 6/24/16
Nikolay Belov
Scope BR and BCP Requirements
10 days
Mon 6/13/16
Fri 6/24/16
Peter Tse(Koon Hing Tse)
Provide Final Security Assessment Cost Estimations and
quotes
5 days
26. Sat 6/25/16
Thu 6/30/16
Nikolay Belov
SME Reviews
10.29 days?
Mon 6/13/16
Mon 6/27/16
Create High Level Design Document
7 days
Mon 6/13/16
Tue 6/21/16
Kun Jiang, Peter Tse(Koon Hing Tse)
Conduct SME High Level Design Review Meeting
3 days
Fri 6/17/16
Tue 6/21/16
Kun Jiang
Submit SME Summary Sheet in ePLC
0 days
Mon 6/20/16
Mon 6/20/16
Ringi
30.86 days
Mon 5/30/16
Mon 7/11/16
Document Approach, Testing and Migration Strategy for
Project planning
10 days
Mon 5/30/16
Fri 6/10/16
Kun Jiang, Peter Tse(Koon Hing Tse)
Obtain Cost Estimations & Quotes/SOWs
0 days
27. Fri 6/17/16
Fri 6/17/16
Create Project Plan Document and ePLC Deliverables
11 days
Wed 6/8/16
Wed 6/22/16
Create WBS and Resource Plan for Phase 2 to Phase 5
10 days
Wed 6/8/16
Tue 6/21/16
Submit Project Ringi
0 days
Mon 6/20/16
Mon 6/20/16
Ringi Local Approval in ePLC
0 days
Sat 7/2/16
Sat 7/2/16
Planning Activities for Remaining Project Phases
17 days
Sat 6/25/16
Mon 7/18/16
Kun Jiang, Peter Tse(Koon Hing Tse)
EIS Planning Activities for Remaining Project Phases
17 days
Sat 6/25/16
Mon 7/18/16
Nikolay Belov, Philip Norman
End of Planning Phase
0 days
Sun 7/17/16
28. Sun 7/17/16
Design Phase
1 day
Tue 8/2/16
Tue 8/2/16
Development Phase
1 day
Tue 8/2/16
Tue 8/2/16
Testing Phase
1 day
Tue 8/2/16
Tue 8/2/16
Pre-Implementation
0
Tue 8/2/16
Tue 8/2/16
Time-Phase Budget
Planning phase
Design Phase
Implementation
May-16
Jun-16
31. $ 2,000.00
$ 2,000.00
$ 8,500.00
Legal cost
$ 1,000.00
$ 500.00
$ 500.00
$ 500.00
$ 2,500.00
CUMULATIVE COST
$ 55,500.00
$ 165,000.00
$ 122,250.00
$124,500.00
$ 467,250.00
Work Breakdown Structure (Howard, 2013)
REFERENCES
Howard, B. (2013). Microsoft Project 2013. Sebastopol,
California : O'Reilly Media.
Kerzner, H. (2001). Project management : a systems approach to
planning, scheduling, and controlling. New York: John Wiley.
32. Mehta, R. C. (2007). Project management. Jaipur: Aavishkar
Publishers.
Grading Guide
Content
Met
Partially Met
Not Met
Comments:
Project scope is refined from Week 1’s charter.
X
A work breakdown structure is created.
X
WBS looks great.
A project schedule and budget is created.
X
A schedule is created for the project lifecycle in Microsoft®
Project®.
X
The schedule is a good start. There are multiple levels. The
task durations appear to be reasonable. Predecessor information
needs to be setup for all tasks. Resources are defined and
33. assigned.
Specific tasks and milestones are included with time and
resource estimates.
X
A time-phased budget is created using Microsoft® Excel®
Using Microsoft® Excel®, create a time-phased budget
containing cost estimates. Include direct and indirect costs for
labor, machinery, equipment, supplies, and other elements
applicable to the project.
X
The budget is contained within Project.
Total Available
Total Earned
7
6.5
Writing Guidelines
Met
Partially Met
Not Met
Comments:
The paper—including tables and graphs, headings, title page,
34. and reference page—is consistent with APA formatting
guidelines and meets course-level requirements.
X
Intellectual property is recognized with in-text citations and a
reference page.
X
.
Paragraph and sentence transitions are present, logical, and
maintain the flow throughout the paper.
X
Sentences are complete, clear, and concise.
X
Rules of grammar and usage are followed including spelling and
punctuation.
X
Total Available
Total Earned
35. 3
3
Assignment Total
#
10
9.5
Additional comments:
Great work!
PROJECT CHARTER
Project Charter: End of Support RSA Authentication Servers
05.10.2016
Project Charter
PM 598 – PM Mgmt. Capstone - Week 1
May 16, 2016
Project Name: End of Support (EOD) RSA Authentication
Servers
Project Manager: Twanna Perkins
Project Start: 07/06/2016
Project End: 05/15/2017
Business Case:
The RSA EOS Hardware Upgrade project is an ISA initiated
effort. The RSA environment supports internal user and
external user authentication for remote access. The RSA
Authentication Servers reached End of Support on December 31,
36. 2014, and were replaced as part of the Alternative Web Hosting
project. However, EOS upgrade activities were not fully
completed due to that project’s budget and resource constraints.
Business Driver
Relevant?
Describe
Audit
No
Business Promotion
Yes
Will keep vendor applications current and available for business
purposes.
Cost Reduction
Yes
Moving to an Enterprise Plus License structure will reduce the
overall annual maintenance cost.
Head Office Initiative
No
IT Infrastructure
Yes
37. This is an ISA/SOE initiative
Regulatory
No
Risk Management
No
Upgrade
Yes
Complete remaining EOS Upgrade activities that were not fully
completed during the Alternate Web Hosting project
Narrative Project Description/Background
End-Of-Support (EOS): To provide authentication service for
customers to access Bank's Internet-facing applications, and
staff to remotely access the bank's network.
Problem & Result Statement
The current version of RSA comes to End-of-Support on
12/31/2016. In the event of an RSA failure that requires
technical support, customers will not be able to access Bank's
Internet-facing systems, and staff will not be able to remotely
access (VPN) Bank's resources.
Mission Justification
The Bank needs to complete the EOS upgrade of the RSA
environment in order to leverage the Enterprise Plus License
structure which will reduce the overall annual maintenance cost.
38. Project Scope Statement
The following items are considered to be in scope for this
project:
•
Complete the replacement and configurations of the RSA
Authentication Servers so that RSA Enterprise Plus Licenses
can be installed, which will reduce the overall RSA license
annual maintenance cost
•
Provide a Self-Service Portal for internal users of the RSA
environment.
•
Ensure that the portal can be accessed on all bank owned
devices, and on all bank approved personal devices
•
Ensure that the self-service portal can be accessed on all bank
supported browsers and on all supported browser versions.
•
Provide an Admin Portal for the Helpdesk to more efficiently
perform remote Internal User support activities
•
Create a test environment so that future updates and fixes can
be tested without interrupting Production.
•
Ensure no service interruption in the event of either a
Component or Data Center failure
The following items are not within scope of this project:
39. •
Implementing RSA Enterprise Plus licenses and a self-service
portal for MUB and ISA-West Coast users.
•
Providing a self-service portal for external customers.
The following items are not within scope of this project:
· Implementing RSA Enterprise Plus licenses and a self-service
portal for MUB and ISA-West Coast users.
· Providing a self-service portal for external customers.
Major Deliverables/Goals
· Install the remaining RSA Authentication Servers in both the
Harborside and Sterling Forest Data Centers
· Purchase new hardware and software for hosting a Self-
Service and Helpdesk Portal for Internal Users
· Leverage the Enterprise Plus License structure to reduce
license maintenance costs
· Install new RSA Self-Service Portals to reduce ongoing
administrative and overhead costs, and improve the end-user
experience of Internal Users
· Deploy a Self-Service Portal so that Internal Users working
remotely can reset their RSA Token PIN without having to call
the Helpdesk.
Key Stakeholders
Client
The Bank
Sponsor
John Doe
Project Manager
40. Twanna Perkins
Project Team Members
Martina Scott, Valeria Gomez, Daniel Schmidt
High-Level Project Milestones& Significant Events
Current high level milestone completion dates are as follows:
Planning
July 6, 2016
Design
August 7, 2016
Build & Configure Portals
September 18, 2016
Testing-Portals
November 13, 2016
Implementation: Portals
December 14, 2016
Build & Configure Soft Tokens
January 15, 2017
Testing: Soft Tokens
February 5, 2017
Implementation: Soft Tokens
February 22, 2017
ID
Milestone
Planned Completion
3
Project Initiation Request (PIR) Approved
4/17/2016
4
Kick-Off Security Risk Assessment
04/29/16
6
41. Obtain Initial Security Assessment Cost Estimations
05/08/16
8
Create BRD
05/04/16
11
BRD Sign-Off
05/15/16
13
Complete Initial Security Risk Assessment Spreadsheet
05/08/16
14
Review initial Security Risk Assessment (RSA)
05/15/16
15
Scope Pentest & Technical Security Standard Requirements
05/29/16
17
Provide Final Security Risk Assessment Cost Estimations and
Quotes
06/05/16
25
Create Project Plan Document
06/12/16
26
Create WBS & Resource Plan
06/11/16
28
RINGI (Budget) Approval
07/22/16
30
EIS Planning Activities for Remaining Project Phases
07/06/16
36
Design Phase
07/06/16
43. $16,597.10
$16,597.10
S/W Development (ISA Resources)
$75,446.82
$50,342.09
$25,104.73
S/W Development (ISA Resources Mark-Up)
$6,395.98
$4,262.08
$2,133.90
Sub Total
$551,062.57
$491,223.94
$59,838.63
Expense
Sales Tax
$21,372.49
$21,372.49
Sub Total
$21,372.49
$21,372.49
Grand Total
$572,435.06
$512,596.43
$59,838.63
$0.00
Technical Requirements, Constraints, Assumptions, Risks and
44. Dependencies
Technical Requirements
· N/A
Constraints
· N/A
Assumptions
· Core Banking has provided approval for upgrade migration
· Funding has been approved and allocated
· Necessary resources are available to complete tasks
Risks
· If RSA fails and technical support is required, customers will
not be able to access Bank's Internet-facing systems, and staff
will not be able to remotely access (VPN) Bank's resources
Dependencies
· Core Banking must provide approval prior to the scheduled
December 14, 2016 implementation of the Self-Service Portal.
· The Ringi (budget) must be approved by June 29, 2016 so that
the Enterprise Plus Licenses can be purchased with the
favorable discount which expires on June 30, 2016
Approval Signatures
[Name], Project Client
[Name], Project Sponsor
[Name], Project Manager
Content
Met
45. Partially Met
Not Met
Comments:
A project charter is developed.
X
The paper contains some of the required elements.
Narrative project description is included.
X
This section is underdeveloped.
Problem and result statement included.
X
This section is underdeveloped.
Mission justification is included.
X
This section is underdeveloped.
Project scope statement is provided.
X
Major deliverables are added.
X
Be sure to clearly identify deliverables. Deliverables and goals
are two separate things.
46. High-level milestones are included for significant events.
X
Applicable technical requirements, assumptions, or constraints
are provided.
X
The paper is 700- to 1,050 words in length.
X
Total Available
Total Earned
5.5
4.5
Writing Guidelines
Met
Partially Met
Not Met
Comments:
The paper—including tables and graphs, headings, title page,
47. and reference page—is consistent with APA formatting
guidelines and meets course-level requirements.
X
Text should be double spaced.
Intellectual property is recognized with in-text citations and a
reference page.
X
All writing assignments required sources.
Paragraph and sentence transitions are present, logical, and
maintain the flow throughout the paper.
X
Sentences are complete, clear, and concise.
X
Rules of grammar and usage are followed including spelling and
punctuation.
X
There are few, if any errors in spelling and grammar.
Total Available
Total Earned
48. 2.5
1.75
Assignment Total
#
8
6.25
Additional comments:
This is a great project to use throughout this course. Be sure
to clearly identify each requirement within your work and
address every requirement.
�Text should be double spaced.
�What is proposed to remedy the problem?
�This section should explain why this project is the best option
to remedy the problem.
The Project Charter Form is created for you by the simple
project management tool www.casual.pm
_1524662581.unknown
_1524662580.unknown