SlideShare a Scribd company logo
Project Name
Your Full Name
Course Number and Name (As it appears on your Course
Guide.)
Professor’s Name (As it appears on your Course Guide.)
University Name (As it appears on the Course Guide.)
Date (Month must be spelled out. Use the date that the paper is
due.)
*
*
*
Project Description & ObjectivesDescribe the project in non-
technical terms.Describe the project objectives and how the
project has met each objective.Explanation #1Explanation
#2Explanation #3State the project scope statement. Detail the
requirements of the project.Adhere to quality management.
*
*
*
Work Breakdown Structure (WBS)Insert the WBS.Highlight
brief task explanation on the slide but explain thoroughly on the
speaker notes.
*
Project Schedule and MilestonesCreate timeline.List activity
sequences and durations.Indicate the critical path.
*
Project Human Resource ManagementIdentify
stakeholders.Indicate the project team matrix (weak, balanced,
and strong).Explain how the project team was developed and
managed.Identify procurement management, i.e., vendors,
contractors, suppliers, etc.
*
Project CostEstablish the approved budget.Identify the cost for
the resources.State the cost of the project. (Is it under or over
budget?)Note the technology used with associated
cost.BenefitsDrawbacks or barriers
*
Project CommunicationsEnsure that all project information is
collected, documented, and archived.Distribute and share
information with stakeholders, management, and project team
members.Identify risks.Qualitative RisksQuantitative Risks
*
Competitive Analysis
*
*
*
Competitive Analysis, Cont.
*
*
*
Procedures
*
*
*
Assumptions, Constraints & DependenciesIdentify the
assumptions used to determine the project scope.Evaluate
project’s success from these assumptions.Evaluate project’s
obstacles from these assumptions.Explain the scope, time, and
cost constraints.List any dependencies. Explain.
*
Project Lessons LearnedRecommend methods to avoid similar
obstacles in future projects.List of six (6) best practices arising
from this project.#1#2#3#4#5#6
*
Next Steps
NOTE: Is there another phase for this project? What is the
project closure?
*High-level GoalsRelationshipUltimate Goal
*
*
ReferencesYou must use references that coincide with the in-
text citations in your presentation written in correct APA
format. All references should come from Strayer University
databases such as EbscoHost, eLibrary, ProQuest, etc. If your
professor allows use of the internet avoid using .com sites, but
you may use .org or .gov sites that are copyrighted.
*
ABC: INFORMATION TECHNOLOGY PROJECT CHARTER
Name:
Institutional Affiliation:
1.0. INTRODUCTIONPurpose of INFORMATION
TECHNOLOGY Project Charterthe abc’s INFORMATIONA
tECHNONOLOGY pROJECT PROPOSAL charter documents a
research and formulation of a surveillance security system
which is targeted to appraise internal security within the
company includingthe project’s proposed budget as well as the
deliverables together with the required appraisals. The carter
further acts to validate and substantiate the feasibility of this
project meeting company specifications and its ability to meet
organizational needs through the ICT department.
The intended audience of the Information Technology Project
Charter is the project sponsor who topples up as the System
technician with ABC’s ICT department and the Administration
of ABC.project And Product Overview
The project’s vision is to enhance the beefing up security
measures within ABC Company. Besides, the system will be
geared to nothing else but will help in attaining the company’s
profit maximization goals and in making sure that the company
attains international risk management status.
The proposed project will provide a plan of the project
containing the foresaid project’s important procedures, the
project’s proposed budget, the deliverables and the required
appraisals for the project to succeed. The project also validates
and substantiates the feasibility of organizational security by
meeting company specifications and its ability to meet
organizational needs.
The Information Technology project employs the use of the
pipeline management as its project portfolio management
method. The methodology involves having the capital
application project being identified and raising measureable
deliverables that the project has to attain (Ding, 2009). In
addition, the use of the organizational resources is classified
both as time based and objective based.
The project at hand has a restrictedlife span of one full year of
generating the surveillance security system, two months that
will cover the pilot phase, a third of a year to facilitate the
overhaul and finally three months that will enable performance
appraisal.
3. O. PROJECT PROBLEMS
The major areas of concern which will be addressed once the
surveillance system is implemented are the intensification of the
internal security, bearing in mind that the crime rates are in the
increase as well as terrorism activities and the second the
system will find its application within company internal
controls as well as inspection programs (Ding, 2009).The two
areas for a long time have posed a challenge to the company
particularly the later which has seen the company’s production
dwindling. As thus, federal government has highly
recommended the use of these improved surveillance systems
within the corporate institutions to make sure an extensive
approach to not only homeland security, but also international
security.
3.1. PROPOSED SOLUTIONS TO THE BUSINESS
PROBLEMS
After the completion of the system development and its actual
implementation, the company will have gotten mitigation to the
various business problems earlier explored. The solutions are as
outlined as follows;
Firstly, Potential damages to property and the individuals within
the company will be minimized as the developed program will
be tracking the movements of all the people within and around
the company’s premises.
Secondly, the establishments of a program that will be keep
track of all the activities of the employees within the
organization with the key concern being establishment of
employee production. It will lead to each employee trying to
optimize his productivity rate thus production will rise in
capacity.
Thirdly, the beefing up of security in that the network creation
will connect the organization’s security system to that of the
homeland security. That will facilitate the access of security
assistance from homeland security by the company in the event
of a security alarm (Hou et al., 2008). .
The fourth solution is Cost reduction in key areas such as the
inspection fee since inspection professionals required in the
production section of the organization will significantly reduce
in number once the system developed comes into operation.
The fifth solution would be Reduction of losses that relate to
inadequate surveillance that leads to pilferage, crime and
terrorism activities once the system is developed in the long-
run. The profits on the other hand will be maximized.
Lastly, the business premise will reduce long-term liability in
the event of unforeseen crimes whose main cause is negligent
performance.
4. 0. SCOPE
4.1. OBJECTIVES/GOALS
The goals of the projects include;
· To ascertain that within a span of 21 months, the organization
has been able to establish a robust surveillance system.
· To spearhead optimal utilization of capital allotted to the
project development process.
· To ensure a comprehensive coverage and dealing of all the
surveillance related risks that the company faces.
4.2. REQUIREMENTS
The following table presents the requirements that the project’s
product, service or result must meet in order for the project
objectives to be satisfied.
Requirement
Requirement description
1
A camera surveillance plan to show the positions throughout the
company’s business
2
Access to an internet such that all the cameras and other
peripherals in the company can be inter-networked- A local area
internet is recommended for this purpose as it allows the use of
Ethernet cable connection to the electrical appliances
3
Cameras- adequate in number to be fixed to all the locations in
the organization’s premise as specified there before
4
Systems that will store the data which is streamed in by the
camera- for the purpose of the information technology project a
data management system is recommended
5
A network topology that has a central location with a remote
server to enhance the viewing of cameras
6
Connection to a Wide Area Network (WAN) so that the security
cameras are connected to the proposed Security Company
7
An over the counter program(Tailored/customized) that will be
utilized in capturing information from the cameras, viewing
selected data, storage of data in a database besides other
Artificial Intelligence(AI) functions
8
Components of internet connectivity establishment. For
instance, data cables used for interconnection to cameras using
a remote computer
9
Countermeasures against data lose such as back-up storage
especially on virtual memory that’s internet based
10
Skilled individuals within the discipline of information and
technology such as System developer and database designers
11
Technical staff that will be tasked with System Management
12
Adequate working space in the organization to allow
installation
13
A piped system to be used for connections that will be
employed in system management
4.3. MAJOR DELIVERABLES OF THE PROJECT
Developmemt timeframe
Development of a surveillance system within the given time
limit to enable the company reduce on costs that result from
delays suck as payment made to the technicians involved in the
installation process
Design Review
Walkthrough conducted by Business Analyst to achieve
approval from Business as to the proposed project design
User Acceptance Testing
The company’s staff will have substantial time to learn how to
use the system hence cutting down on the costs incurred on
training them how to operate the system (Hou et al., 2008)
Deployment Plan
Identifies to the stakeholders and project team tasks necessary
to move application into production
Developing database
Developing a database that coordinates the business activities
and the security within the organization
Organbizational connectivity
Business activities and the security of the organization should
be well connected to minimize chances of losses that may be
caused due of theft by company’s employees as well as its
potential customers
Organizational coordination
the coordination of the Business activities and the security of
the organizationwill bring down the threat of terrorist activities
to the organization-it will make sure that the security of all
individuals dealing with the company is assured and thus
improving the chances of the company’s expansion
5. TRAINING
Training of staff on the use of the newly developed system
prepares them to induce change at the same time reducing
chances of resistance. The training will also boost service
delivery to customers as transactions will be executed on a
timely basis and in accordance to customers’ needs and
specifications. It will end up giving the company a competitive
advantage over its worthy competitors- thanks to the improved
delivery of services (Flammini, Setola&Franceschetti, 2013).
6. PROJECT CONNECTION WITH HOMELAND
Whereas the company has the sole responsibility of
maintaining and maximizing its internal security control system,
the homeland security agencies are more professional in the
area and thus their overall effect in the enhancement of security
is very important. This projects aims to control a system that
connects the company’s security control system to the homeland
security to enable information to be shared on security issues
are swift, intellectual as well as steadfast.
To come up with a project whose benefits outweighs the cons of
project development and implementation(Williams, 2006).
Whereas development of a surveillance system is an
important step in the company’s premeditated growth, the
opportunity cost of the system is a major consideration in the
overall determination of utility of the project. The doles are as
follows; the reduced chances of theft and other security
concerns, the increment in the overall productive capacity of the
company, a reduction of the supervision cost in the organization
as well as an increase in funds put in by independent individuals
who are third parties to the company (Ding, 2009). This is a
result of the rise in confidence of the company’s management
besides other direct not forgetting indirect advantages.
7. DURATION
7.1. ESTIMATED TIMELINE
The schedule below outlines the timeframe within which various
phases of the project shall be attained.
ID
ABC INFORMATION TECHNOLOGY PROPOSAL DATA
ENTRY
FINISH
1
The Feasibility study
by end of 4th month
2
Acquiring all legal documents
by end of 5th month
3
Developing of the camera surveillance plan
by end of 5th month
4
Purchasing equipment
by end of 6th month
5
Developing network for the interconnection of the cameras
by end of 7th month
6
Structuring of support application software
by end of 8th month
7
Developing system database system
by end of 9th month
8
Installation
by end of 11th month
9
Pilot run in the front office department
by end of 13th month
10
Complete implementation
by end of 17th month
11
Training to staff members
by end of 20th month
12
Performance test
by end of 22nd month
8. PROJECT RESOURCES
Table containing the generic resources, people, equipment, and
materials needed to undertake the project. The following is a
table denoting the use of the generic resources, human resource,
and equipment together with materials in different acts within
the project.
s/no
Activity
Generic resources
Human resources
Materials
1
Feasibility study
- external system investigator
- company staff used in filling questionnaires
- questionnaires
- past records on the security and supervision status in the
company
2
Acquisition of legal documents and licenses
- company’s purchases officer
3
Development of camera surveillance plan
- Broadband internet connection
- External ICT/ Surveillance expert
4
Purchase of equipment and materials
- company’s purchases officer
5
Development of physical cabled network
- external builders and fixers
- data cables
- pipes
- RJ45 connectors
6
Development of application software
- broadband internet
System developer
- remote computer
7
Development of database system
- broadband internet
System developer
- remote computer
8
Physical installation of cameras and other accessories
- External ICT/ Surveillance expert
- Surveillance cameras
- remote computer
- Wall camera holders
-
9
Pilot run
- broadband internet
- system developer
- company ICT staff
- the new system at the front office department
10
Full implementation
- broadband internet
- System developer
- Company ICT staff
- the system in the whole company
11
Performance measurement
- Broadband internet
- External ICT/ Surveillance professionals
- System analyst
- the system in the whole company
9. DETEREMINANTS OF THE PROJECT’S SUCCESS
Successful completion of the project purely lies on the ability to
achieve the projected deliverables of the project. These
incorporate the following determinants;
· Completion of the project development within the limited span
of period
· Capability of the system to send real-time signals to various
destinations such as the remote computer, the database and the
homeland security systems
· If the system developed will reduce the cost of production
supervision as well as increase the rate of staff performance in
the organization
· Security concerns such as safeguarding the system from
external and malicious interference and lack of system
redundancy.
10. RECOMMENDATIONS
During the implementation phase cycle of the system
development, the company is required to ascertain that this
system that has been developed is update regularly. There is
need for conducting a system appraisal fortnightly to ensure that
the developments in the field of Information technology and
Camera Surveillance have been adopted and up to date
(Flammini, Setola&Franceschetti, 2013). In summation, staff
training for the implementation these changes is too a necessary
requirement during the same duration.11. BUDGET
Estimate11.1. Funding Source
ABC11.2. Estimate
This section provides a summary of estimated spending to meet
the objectives of the Information Technology project as
described in this Project Charter. This summary of spending is
preliminary, and should reflect costs for the entire investment
lifecycle. It is intended to present probable funding
requirements and to assist in obtaining budgeting support (see
excel document)
References
Ding, A. (2009). Social computing in homeland security (1st
ed.). Hershey, Pa.: Information Science Reference.
Flammini, F., Setola, R., &Franceschetti, G. (2013).Effective
surveillance for homeland security (1st ed.). Boca Raton, FL:
CRC Press.
Hou, J., Wu, C., Yuan, Z., Tan, J., Wang, Q., & Zhou, Y.
(2008).Research of intelligent home security surveillance
system based on ZigBee, 554--557.
Williams, R. (2006). Real-time systems development (1st ed.).
Oxford: Elsevier Butterworth-Heinemann.
Running head: INFORMATION TECHNOLOGY PROJECT
PROPOSAL 1
INFORMATION TECHNOLOGY PROJECT PROPOSAL 2
INFORMATION TECHNOLOGY PROJECT PROPOSAL
Name:
Institution:
INFORMATION TECHNOLOGY PROJECT PROPOSAL
Executive summary
The administration of the ABC Industry has burdened the
ICT section of the company to research and formulate a
surveillance security system which is targeted to appraise
internal security within the company. In my capacity as ICT
section’s system technician, I am bound to develop the plan
which will act as a guide to this fundamental project as from the
initial stages to its completion. This paper brings out the
foresaid project’s important procedures, the project’s proposed
budget as well as the deliverables together with the required
appraisals for this project to go through successfully. This paper
acts to validate and substantiate the feasibility of this project
meeting company specifications and its ability to meet
organizational needs.
Recommend a project portfolio management method for your
selected project.
The method that shall best suit the purpose of the project
at hand is the pipeline management. This methodology involves
having the capital application project being identified and
raising measureable deliverables that the project has to attain
(Ding, 2009). More still, use of the organizational resources
should be classified as times based as well as objective based.
Within the project at hand, the span is restricted to a full year of
generating the surveillance security system, two months that
will cover the pilot phase, a third of a year to facilitate the
overhaul and finally three months that will enable performance
appraisal.
Type of problem
The major areas of concern which will be addressed once
the surveillance system is implemented are the intensification of
the internal security, bearing in mind that the crime rates are in
the increase as well as terrorism activities and the second the
system will find its application within company internal
controls as well as inspection programs (Ding, 2009). The two
areas for a long time have posed a challenge to the company
particularly the later which has seen the company’s production
dwindling. As thus, federal government has highly
recommended the use of these improved surveillance systems
within the corporate institutions to make sure an extensive
approach to not only homeland security, but also international
security.
Requirements
Following are the specifications of the project to be developed.
A camera surveillance plan. This is to show the positions
throughout the company’s business.
Access to an internet such that all the cameras and other
peripherals in the company can be inter-networked- A local area
internet is recommended for this purpose as it allows the use of
Ethernet cable connection to the electrical appliances.
Cameras- adequate in number to be fixed to all the locations in
the organization’s premise as specified there before.
Systems that will store the data which is streamed in by the
camera- for this purpose a data management system is
recommended.
A network topology that has a central location with a remote
server to enhance the viewing of cameras.
Connection to a Wide Area Network (WAN) so that the security
cameras are connected to the proposed Security Company.
An over the counter program(Tailored/customized) that will be
utilized in capturing information from the cameras, viewing
selected data, storage of data in a database besides other
Artificial Intelligence(AI) functions
Components of internet connectivity establishment. For
instance, data cables used for interconnection to cameras using
a remote computer.
Countermeasures against data lose such as back-up storage
especially on virtual memory that’s internet based.
Skilled individuals within the discipline of information and
technology such as System developer and database designers.
Technical staff that will be tasked with System Management
Adequate working space in the organization to allow
installation.
A piped system to be used for connections that will be
employed in system management.
Proposed solutions to the business problems
After the completion of the system development and its actual
implementation, the company will have gotten mitigation to the
various business problems earlier explored. The solutions are as
outlined below.
Potential damages to property and the individuals within the
company will be minimized as the developed program will be
tracking the movements of all the people within and around the
company’s premises.
Establishment of a program that will be keeping track of all the
activities of the employees within the organization with the key
concern being establishment of employee production. It will
lead to each employee trying to optimize his productivity rate
thus production will rise in capacity.
Beefing up of security. The network creation will connect the
organization’s security system to that of the homeland security.
That will facilitate the access of security assistance from
homeland security by the company in the event of a security
alarm (Hou et al., 2008). .
Cost reduction in key areas such as the inspection fee since
inspection professionals required in the production section of
the organization will significantly reduce in number once the
system developed comes into operation.
Reduction of losses that relate to inadequate surveillance that
leads to pilferage, crime and terrorism activities once the
system is developed in the long-run. The profits on the other
hand will be maximized.
The business premise will reduce long-term liability in the
event of unforeseen crimes whose main cause is negligent
performance.
State the vision and the goal of the project.
Project’s vision
The project’s vision is to enhance the beefing up security
measures within ABC Company .Besides, the system will be
geared to nothing else but will help in attaining the company’s
profit maximization goals and in making sure that the company
attains international risk management status.
The goals of the projects are
To ascertain that within a span of 21 months, the organization
has been able to establish a robust surveillance system.
To spearhead optimal utilization of capital allotted to the
project development process.
To ensure a comprehensive coverage and dealing of all the
surveillance related risks that the company faces.
Major Deliverables of the project
Development of a surveillance system within the given time
limit
The surveillance system ought to be put in place within the
required time limit. This will enable the company reduce on
costs that result from delays suck as payment made to the
technicians involved in the installation process. In spite of that,
the company’s staff will have substantial time to learn how to
use the system hence cutting down on the costs incurred on
training them how to operate the system (Hou et al., 2008).
Developing a database that coordinates the business activities
and the security within the organization
Business activities and the security of the organization should
be well connected to minimize chances of losses that may be
caused due of theft by company’s employees as well as its
potential customers. In addition, the coordination of the two
activities will bring down the threat of terrorist activities to the
organization- this will make sure that the security of all
individuals dealing with the company is assured and thus
improving the chances of the company’s expansion.
Training of staff on the usability of the newly developed
system
Training of staff on the use of the newly developed system
prepares them to induce change at the same time reducing
chances of resistance. Also, the training will boost service
delivery to customers as transactions will be executed on a
timely basis and I accordance to customers’ needs and
specifications. This will end up giving the company a
competitive advantage over its worthy competitors- thanks to
the improved delivery of services (Flammini, Setola &
Franceschetti, 2013).
Ensure the security control within the company’s system is in
connection with homeland security
Whereas the company has the sole responsibility of
maintaining and maximizing its internal security control system,
the homeland security agencies are more professional in the
area and thus their overall effect in the enhancement of security
is very important. This projects aims to control a system that
connects the company’s security control system to the homeland
security to enable information to be shared on security issues
are swift, intellectual as well as steadfast.
To come up with a project whose benefits outweighs the cons of
project development and implementation (Williams, 2006).
Whereas development of a surveillance system is an
important step in the company’s premeditated growth, the
opportunity cost of the system is a major consideration in the
overall determination of utility of the project. The doles are as
follows; the reduced chances of theft and other security
concerns, the increment in the overall productive capacity of the
company, a reduction of the supervision cost in the organization
as well as an increase in funds put in by independent individuals
who are third parties to the company (Ding, 2009). This is a
result of the rise in confidence of the company’s management
besides other direct not forgetting indirect advantages.
The timeframe for delivering the solution to the project
The schedule below outlines the timeframe within which various
phases of the project shall be attained
The Feasibility study by
end of 4nd month
Acquiring all legal documents
by end of 5th month
Developing of the camera surveillance plan
by end of 5th month
Purchasing equipment
by end of 6th month
Developing network for the interconnection of the cameras
by end of 7th month
Structuring of support application software
by end of 8th month
Developing system database system
by end of 9th month
Installation
by end of 11th month
Pilot run in the front office department by
end of 13th month
Complete implementation
by end of 17th month
Training to staff members by
end of 20th month
Performance test by
end of 22nd month
Table containing the generic resources, people, equipment, and
materials needed to undertake the project.
Following is a table denoting the use of the generic resources,
human resource, and equipment together with materials in
different acts within the project.
s/no
Activity
Generic resources
Human resources
Materials
1
Feasibility study
- external system investigator
- company staff used in filling questionnaires
- questionnaires
- past records on the security and supervision status in the
company
2
Acquisition of legal documents and licenses
- company’s purchases officer
3
Development of camera surveillance plan
- Broadband internet connection
- External ICT/ Surveillance expert
4
Purchase of equipment and materials
- company’s purchases officer
5
Development of physical cabled network
- external builders and fixers
- data cables
- pipes
- RJ45 connectors
6
Development of application software
- broadband internet
System developer
- remote computer
7
Development of database system
- broadband internet
System developer
- remote computer
8
Physical installation of cameras and other accessories
- External ICT/ Surveillance expert
- Surveillance cameras
- remote computer
- Wall camera holders
-
9
Pilot run
- broadband internet
- system developer
- company ICT staff
- the new system at the front office department
10
Full implementation
- broadband internet
- System developer
- Company ICT staff
- the system in the whole company
11
Performance measurement
- Broadband internet
- External ICT/ Surveillance professionals
- System analyst
- the system in the whole company
Determine the key success criteria for your project
Successful completion of the project purely lies on the ability to
achieve the projected deliverables of the project. These
incorporate the following determinants.
Completion of the project development within the limited span
of period.
Capability of the system to send real-time signals to various
destinations such as the remote computer, the database and the
homeland security systems.
If the system developed will reduce the cost of production
supervision as well as increase the rate of staff performance in
the organization.
Security concerns such as safeguarding the system from external
and malicious interference and lack of system redundancy.
Recommendations
During the implementation phase cycle of the system
development, the company is required to ascertain that this
system that has been developed is update regularly. I
recommend that a system appraisal shall be conducted
fortnightly to ensure that the developments in the field of
Information technology and Camera Surveillance have been
adopted and up to date (Flammini, Setola & Franceschetti,
2013). To crown it all, staff training for the implementation
these changes is too a necessary requirement during the same
duration.
References
Ding, A. (2009). Social computing in homeland security (1st
ed.). Hershey, Pa.: Information Science Reference.
Flammini, F., Setola, R., & Franceschetti, G. (2013). Effective
surveillance for homeland security (1st ed.). Boca Raton, FL:
CRC Press.
Hou, J., Wu, C., Yuan, Z., Tan, J., Wang, Q., & Zhou, Y.
(2008). Research of intelligent home security surveillance
system based on ZigBee, 554--557.
Williams, R. (2006). Real-time systems development (1st ed.).
Oxford: Elsevier Butterworth-Heinemann.
Running head: INFORMATION TECHNOLOGY PROJECT
PROPOSAL
1
INFORMATION TECHNOLOGY PROJECT PROPOSAL
Name:
Institution:
Running head: INFORMATION TECHNOLOGY PROJECT
PROPOSAL 1
INFORMATION TECHNOLOGY PROJECT PROPOSAL
Name:
Institution:
Project NameYour Full NameCourse Number and Name (As i.docx

More Related Content

Similar to Project NameYour Full NameCourse Number and Name (As i.docx

The infrastructure and the security essentials of information technology in a...
The infrastructure and the security essentials of information technology in a...The infrastructure and the security essentials of information technology in a...
The infrastructure and the security essentials of information technology in a...
adeel hamid
 
CPIN 269 Final Documentation
CPIN 269 Final DocumentationCPIN 269 Final Documentation
CPIN 269 Final DocumentationJennifer Cordes
 
Business Case Capstone IIConnie FarrisColorado T.docx
Business Case Capstone IIConnie FarrisColorado T.docxBusiness Case Capstone IIConnie FarrisColorado T.docx
Business Case Capstone IIConnie FarrisColorado T.docx
jasoninnes20
 
Running Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docx
Running Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docxRunning Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docx
Running Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docx
toltonkendal
 
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docxCLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
monicafrancis71118
 
REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docx
REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docxREAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docx
REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docx
danas19
 
Bamberger Corp. Completed Denver Expansion Project 1 P .docx
Bamberger Corp.  Completed Denver Expansion Project 1  P .docxBamberger Corp.  Completed Denver Expansion Project 1  P .docx
Bamberger Corp. Completed Denver Expansion Project 1 P .docx
ikirkton
 
BUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docx
BUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docxBUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docx
BUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docx
jasoninnes20
 
Redspin HIPAA Security Risk Analysis RFP Template
Redspin HIPAA Security Risk Analysis RFP TemplateRedspin HIPAA Security Risk Analysis RFP Template
Redspin HIPAA Security Risk Analysis RFP Template
Redspin, Inc.
 
After reading chapter 10Watch.. httpswww.youtube.comwatc.docx
After reading chapter 10Watch.. httpswww.youtube.comwatc.docxAfter reading chapter 10Watch.. httpswww.youtube.comwatc.docx
After reading chapter 10Watch.. httpswww.youtube.comwatc.docx
nettletondevon
 
ITP-1 – Project CharterGroup 3 - The Project Management Masters .docx
ITP-1 – Project CharterGroup 3 - The Project Management Masters .docxITP-1 – Project CharterGroup 3 - The Project Management Masters .docx
ITP-1 – Project CharterGroup 3 - The Project Management Masters .docx
priestmanmable
 
Enterprise Architecture Verification Validation
Enterprise Architecture Verification Validation Enterprise Architecture Verification Validation
Enterprise Architecture Verification Validation
William Francis
 
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
oswald1horne84988
 
Pmw2 k3ni 1-1a
Pmw2 k3ni 1-1aPmw2 k3ni 1-1a
Pmw2 k3ni 1-1ahariclant1
 
4 reasons why your staff should keep time records.pdf
4 reasons why your staff should keep time records.pdf4 reasons why your staff should keep time records.pdf
4 reasons why your staff should keep time records.pdf
Jose thomas
 
1. Project Description Definition of ProjectThe supervision of w
1. Project Description Definition of ProjectThe supervision of w1. Project Description Definition of ProjectThe supervision of w
1. Project Description Definition of ProjectThe supervision of w
SantosConleyha
 
1. project description definition of project the supervision of w
1. project description definition of project the supervision of w1. project description definition of project the supervision of w
1. project description definition of project the supervision of w
SUKHI5
 
1. Project Description Definition of ProjectThe supervision of w
1. Project Description Definition of ProjectThe supervision of w1. Project Description Definition of ProjectThe supervision of w
1. Project Description Definition of ProjectThe supervision of w
AbbyWhyte974
 
Consulting whitepaper cloud-adoption-lifecycle_0612-1
Consulting whitepaper cloud-adoption-lifecycle_0612-1Consulting whitepaper cloud-adoption-lifecycle_0612-1
Consulting whitepaper cloud-adoption-lifecycle_0612-1
thinkofdevil
 
Business RequirementsReference number Document Control
Business RequirementsReference number Document ControlBusiness RequirementsReference number Document Control
Business RequirementsReference number Document Control
TawnaDelatorrejs
 

Similar to Project NameYour Full NameCourse Number and Name (As i.docx (20)

The infrastructure and the security essentials of information technology in a...
The infrastructure and the security essentials of information technology in a...The infrastructure and the security essentials of information technology in a...
The infrastructure and the security essentials of information technology in a...
 
CPIN 269 Final Documentation
CPIN 269 Final DocumentationCPIN 269 Final Documentation
CPIN 269 Final Documentation
 
Business Case Capstone IIConnie FarrisColorado T.docx
Business Case Capstone IIConnie FarrisColorado T.docxBusiness Case Capstone IIConnie FarrisColorado T.docx
Business Case Capstone IIConnie FarrisColorado T.docx
 
Running Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docx
Running Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docxRunning Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docx
Running Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docx
 
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docxCLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
 
REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docx
REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docxREAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docx
REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docx
 
Bamberger Corp. Completed Denver Expansion Project 1 P .docx
Bamberger Corp.  Completed Denver Expansion Project 1  P .docxBamberger Corp.  Completed Denver Expansion Project 1  P .docx
Bamberger Corp. Completed Denver Expansion Project 1 P .docx
 
BUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docx
BUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docxBUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docx
BUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docx
 
Redspin HIPAA Security Risk Analysis RFP Template
Redspin HIPAA Security Risk Analysis RFP TemplateRedspin HIPAA Security Risk Analysis RFP Template
Redspin HIPAA Security Risk Analysis RFP Template
 
After reading chapter 10Watch.. httpswww.youtube.comwatc.docx
After reading chapter 10Watch.. httpswww.youtube.comwatc.docxAfter reading chapter 10Watch.. httpswww.youtube.comwatc.docx
After reading chapter 10Watch.. httpswww.youtube.comwatc.docx
 
ITP-1 – Project CharterGroup 3 - The Project Management Masters .docx
ITP-1 – Project CharterGroup 3 - The Project Management Masters .docxITP-1 – Project CharterGroup 3 - The Project Management Masters .docx
ITP-1 – Project CharterGroup 3 - The Project Management Masters .docx
 
Enterprise Architecture Verification Validation
Enterprise Architecture Verification Validation Enterprise Architecture Verification Validation
Enterprise Architecture Verification Validation
 
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
 
Pmw2 k3ni 1-1a
Pmw2 k3ni 1-1aPmw2 k3ni 1-1a
Pmw2 k3ni 1-1a
 
4 reasons why your staff should keep time records.pdf
4 reasons why your staff should keep time records.pdf4 reasons why your staff should keep time records.pdf
4 reasons why your staff should keep time records.pdf
 
1. Project Description Definition of ProjectThe supervision of w
1. Project Description Definition of ProjectThe supervision of w1. Project Description Definition of ProjectThe supervision of w
1. Project Description Definition of ProjectThe supervision of w
 
1. project description definition of project the supervision of w
1. project description definition of project the supervision of w1. project description definition of project the supervision of w
1. project description definition of project the supervision of w
 
1. Project Description Definition of ProjectThe supervision of w
1. Project Description Definition of ProjectThe supervision of w1. Project Description Definition of ProjectThe supervision of w
1. Project Description Definition of ProjectThe supervision of w
 
Consulting whitepaper cloud-adoption-lifecycle_0612-1
Consulting whitepaper cloud-adoption-lifecycle_0612-1Consulting whitepaper cloud-adoption-lifecycle_0612-1
Consulting whitepaper cloud-adoption-lifecycle_0612-1
 
Business RequirementsReference number Document Control
Business RequirementsReference number Document ControlBusiness RequirementsReference number Document Control
Business RequirementsReference number Document Control
 

More from wkyra78

Melissa HinkhouseWeek 3-Original PostNURS 6050 Policy and A.docx
Melissa HinkhouseWeek 3-Original PostNURS 6050 Policy and A.docxMelissa HinkhouseWeek 3-Original PostNURS 6050 Policy and A.docx
Melissa HinkhouseWeek 3-Original PostNURS 6050 Policy and A.docx
wkyra78
 
Melissa HinkhouseAdvanced Pharmacology NURS-6521N-43Professo.docx
Melissa HinkhouseAdvanced Pharmacology NURS-6521N-43Professo.docxMelissa HinkhouseAdvanced Pharmacology NURS-6521N-43Professo.docx
Melissa HinkhouseAdvanced Pharmacology NURS-6521N-43Professo.docx
wkyra78
 
Meiner, S. E., & Yeager, J. J. (2019). Chapter 17Chap.docx
Meiner, S. E., & Yeager, J. J. (2019).    Chapter 17Chap.docxMeiner, S. E., & Yeager, J. J. (2019).    Chapter 17Chap.docx
Meiner, S. E., & Yeager, J. J. (2019). Chapter 17Chap.docx
wkyra78
 
member is a security software architect in a cloud service provider .docx
member is a security software architect in a cloud service provider .docxmember is a security software architect in a cloud service provider .docx
member is a security software architect in a cloud service provider .docx
wkyra78
 
Melissa ShortridgeWeek 6COLLAPSEMy own attitude has ch.docx
Melissa ShortridgeWeek 6COLLAPSEMy own attitude has ch.docxMelissa ShortridgeWeek 6COLLAPSEMy own attitude has ch.docx
Melissa ShortridgeWeek 6COLLAPSEMy own attitude has ch.docx
wkyra78
 
Melissa is a 15-year-old high school student. Over the last week.docx
Melissa is a 15-year-old high school student. Over the last week.docxMelissa is a 15-year-old high school student. Over the last week.docx
Melissa is a 15-year-old high school student. Over the last week.docx
wkyra78
 
Measurement  of  the  angle  θ          .docx
Measurement  of  the  angle  θ          .docxMeasurement  of  the  angle  θ          .docx
Measurement  of  the  angle  θ          .docx
wkyra78
 
Measurement of the angle θ For better understanding .docx
Measurement of the angle θ     For better understanding .docxMeasurement of the angle θ     For better understanding .docx
Measurement of the angle θ For better understanding .docx
wkyra78
 
Meaning-Making Forum 2 (Week 5)Meaning-Making Forums 1-4 are thi.docx
Meaning-Making Forum 2 (Week 5)Meaning-Making Forums 1-4 are thi.docxMeaning-Making Forum 2 (Week 5)Meaning-Making Forums 1-4 are thi.docx
Meaning-Making Forum 2 (Week 5)Meaning-Making Forums 1-4 are thi.docx
wkyra78
 
MBA6231 - 1.1 - project charter.docxProject Charter Pr.docx
MBA6231 - 1.1 - project charter.docxProject Charter Pr.docxMBA6231 - 1.1 - project charter.docxProject Charter Pr.docx
MBA6231 - 1.1 - project charter.docxProject Charter Pr.docx
wkyra78
 
Medication Errors Led to Disastrous Outcomes1. Search th.docx
Medication Errors Led to Disastrous Outcomes1. Search th.docxMedication Errors Led to Disastrous Outcomes1. Search th.docx
Medication Errors Led to Disastrous Outcomes1. Search th.docx
wkyra78
 
Meet, call, Skype or Zoom with a retired athlete and interview himh.docx
Meet, call, Skype or Zoom with a retired athlete and interview himh.docxMeet, call, Skype or Zoom with a retired athlete and interview himh.docx
Meet, call, Skype or Zoom with a retired athlete and interview himh.docx
wkyra78
 
Medication Administration Make a list of the most common med.docx
Medication Administration Make a list of the most common med.docxMedication Administration Make a list of the most common med.docx
Medication Administration Make a list of the most common med.docx
wkyra78
 
media portfolio”about chapter 1 to 15 from the book  Ci.docx
media portfolio”about chapter 1 to 15 from the book  Ci.docxmedia portfolio”about chapter 1 to 15 from the book  Ci.docx
media portfolio”about chapter 1 to 15 from the book  Ci.docx
wkyra78
 
MediationNameAMUDate.docx
MediationNameAMUDate.docxMediationNameAMUDate.docx
MediationNameAMUDate.docx
wkyra78
 
Media coverage influences the publics perception of the crimina.docx
Media coverage influences the publics perception of the crimina.docxMedia coverage influences the publics perception of the crimina.docx
Media coverage influences the publics perception of the crimina.docx
wkyra78
 
Media Content AnalysisPurpose Evaluate the quality and value of.docx
Media Content AnalysisPurpose Evaluate the quality and value of.docxMedia Content AnalysisPurpose Evaluate the quality and value of.docx
Media Content AnalysisPurpose Evaluate the quality and value of.docx
wkyra78
 
Mayan gods and goddesses are very much a part of this text.  Their i.docx
Mayan gods and goddesses are very much a part of this text.  Their i.docxMayan gods and goddesses are very much a part of this text.  Their i.docx
Mayan gods and goddesses are very much a part of this text.  Their i.docx
wkyra78
 
Media and SocietyIn 1,100 words, complete the followingAn.docx
Media and SocietyIn 1,100 words, complete the followingAn.docxMedia and SocietyIn 1,100 words, complete the followingAn.docx
Media and SocietyIn 1,100 words, complete the followingAn.docx
wkyra78
 
MBA 5110 – Business Organization and ManagementMidterm ExamAns.docx
MBA 5110 – Business Organization and ManagementMidterm ExamAns.docxMBA 5110 – Business Organization and ManagementMidterm ExamAns.docx
MBA 5110 – Business Organization and ManagementMidterm ExamAns.docx
wkyra78
 

More from wkyra78 (20)

Melissa HinkhouseWeek 3-Original PostNURS 6050 Policy and A.docx
Melissa HinkhouseWeek 3-Original PostNURS 6050 Policy and A.docxMelissa HinkhouseWeek 3-Original PostNURS 6050 Policy and A.docx
Melissa HinkhouseWeek 3-Original PostNURS 6050 Policy and A.docx
 
Melissa HinkhouseAdvanced Pharmacology NURS-6521N-43Professo.docx
Melissa HinkhouseAdvanced Pharmacology NURS-6521N-43Professo.docxMelissa HinkhouseAdvanced Pharmacology NURS-6521N-43Professo.docx
Melissa HinkhouseAdvanced Pharmacology NURS-6521N-43Professo.docx
 
Meiner, S. E., & Yeager, J. J. (2019). Chapter 17Chap.docx
Meiner, S. E., & Yeager, J. J. (2019).    Chapter 17Chap.docxMeiner, S. E., & Yeager, J. J. (2019).    Chapter 17Chap.docx
Meiner, S. E., & Yeager, J. J. (2019). Chapter 17Chap.docx
 
member is a security software architect in a cloud service provider .docx
member is a security software architect in a cloud service provider .docxmember is a security software architect in a cloud service provider .docx
member is a security software architect in a cloud service provider .docx
 
Melissa ShortridgeWeek 6COLLAPSEMy own attitude has ch.docx
Melissa ShortridgeWeek 6COLLAPSEMy own attitude has ch.docxMelissa ShortridgeWeek 6COLLAPSEMy own attitude has ch.docx
Melissa ShortridgeWeek 6COLLAPSEMy own attitude has ch.docx
 
Melissa is a 15-year-old high school student. Over the last week.docx
Melissa is a 15-year-old high school student. Over the last week.docxMelissa is a 15-year-old high school student. Over the last week.docx
Melissa is a 15-year-old high school student. Over the last week.docx
 
Measurement  of  the  angle  θ          .docx
Measurement  of  the  angle  θ          .docxMeasurement  of  the  angle  θ          .docx
Measurement  of  the  angle  θ          .docx
 
Measurement of the angle θ For better understanding .docx
Measurement of the angle θ     For better understanding .docxMeasurement of the angle θ     For better understanding .docx
Measurement of the angle θ For better understanding .docx
 
Meaning-Making Forum 2 (Week 5)Meaning-Making Forums 1-4 are thi.docx
Meaning-Making Forum 2 (Week 5)Meaning-Making Forums 1-4 are thi.docxMeaning-Making Forum 2 (Week 5)Meaning-Making Forums 1-4 are thi.docx
Meaning-Making Forum 2 (Week 5)Meaning-Making Forums 1-4 are thi.docx
 
MBA6231 - 1.1 - project charter.docxProject Charter Pr.docx
MBA6231 - 1.1 - project charter.docxProject Charter Pr.docxMBA6231 - 1.1 - project charter.docxProject Charter Pr.docx
MBA6231 - 1.1 - project charter.docxProject Charter Pr.docx
 
Medication Errors Led to Disastrous Outcomes1. Search th.docx
Medication Errors Led to Disastrous Outcomes1. Search th.docxMedication Errors Led to Disastrous Outcomes1. Search th.docx
Medication Errors Led to Disastrous Outcomes1. Search th.docx
 
Meet, call, Skype or Zoom with a retired athlete and interview himh.docx
Meet, call, Skype or Zoom with a retired athlete and interview himh.docxMeet, call, Skype or Zoom with a retired athlete and interview himh.docx
Meet, call, Skype or Zoom with a retired athlete and interview himh.docx
 
Medication Administration Make a list of the most common med.docx
Medication Administration Make a list of the most common med.docxMedication Administration Make a list of the most common med.docx
Medication Administration Make a list of the most common med.docx
 
media portfolio”about chapter 1 to 15 from the book  Ci.docx
media portfolio”about chapter 1 to 15 from the book  Ci.docxmedia portfolio”about chapter 1 to 15 from the book  Ci.docx
media portfolio”about chapter 1 to 15 from the book  Ci.docx
 
MediationNameAMUDate.docx
MediationNameAMUDate.docxMediationNameAMUDate.docx
MediationNameAMUDate.docx
 
Media coverage influences the publics perception of the crimina.docx
Media coverage influences the publics perception of the crimina.docxMedia coverage influences the publics perception of the crimina.docx
Media coverage influences the publics perception of the crimina.docx
 
Media Content AnalysisPurpose Evaluate the quality and value of.docx
Media Content AnalysisPurpose Evaluate the quality and value of.docxMedia Content AnalysisPurpose Evaluate the quality and value of.docx
Media Content AnalysisPurpose Evaluate the quality and value of.docx
 
Mayan gods and goddesses are very much a part of this text.  Their i.docx
Mayan gods and goddesses are very much a part of this text.  Their i.docxMayan gods and goddesses are very much a part of this text.  Their i.docx
Mayan gods and goddesses are very much a part of this text.  Their i.docx
 
Media and SocietyIn 1,100 words, complete the followingAn.docx
Media and SocietyIn 1,100 words, complete the followingAn.docxMedia and SocietyIn 1,100 words, complete the followingAn.docx
Media and SocietyIn 1,100 words, complete the followingAn.docx
 
MBA 5110 – Business Organization and ManagementMidterm ExamAns.docx
MBA 5110 – Business Organization and ManagementMidterm ExamAns.docxMBA 5110 – Business Organization and ManagementMidterm ExamAns.docx
MBA 5110 – Business Organization and ManagementMidterm ExamAns.docx
 

Recently uploaded

Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 

Recently uploaded (20)

Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 

Project NameYour Full NameCourse Number and Name (As i.docx

  • 1. Project Name Your Full Name Course Number and Name (As it appears on your Course Guide.) Professor’s Name (As it appears on your Course Guide.) University Name (As it appears on the Course Guide.) Date (Month must be spelled out. Use the date that the paper is due.) * * * Project Description & ObjectivesDescribe the project in non- technical terms.Describe the project objectives and how the project has met each objective.Explanation #1Explanation #2Explanation #3State the project scope statement. Detail the requirements of the project.Adhere to quality management.
  • 2. * * * Work Breakdown Structure (WBS)Insert the WBS.Highlight brief task explanation on the slide but explain thoroughly on the speaker notes. * Project Schedule and MilestonesCreate timeline.List activity sequences and durations.Indicate the critical path. * Project Human Resource ManagementIdentify stakeholders.Indicate the project team matrix (weak, balanced, and strong).Explain how the project team was developed and managed.Identify procurement management, i.e., vendors, contractors, suppliers, etc. *
  • 3. Project CostEstablish the approved budget.Identify the cost for the resources.State the cost of the project. (Is it under or over budget?)Note the technology used with associated cost.BenefitsDrawbacks or barriers * Project CommunicationsEnsure that all project information is collected, documented, and archived.Distribute and share information with stakeholders, management, and project team members.Identify risks.Qualitative RisksQuantitative Risks * Competitive Analysis * * *
  • 5. Assumptions, Constraints & DependenciesIdentify the assumptions used to determine the project scope.Evaluate project’s success from these assumptions.Evaluate project’s obstacles from these assumptions.Explain the scope, time, and cost constraints.List any dependencies. Explain. * Project Lessons LearnedRecommend methods to avoid similar obstacles in future projects.List of six (6) best practices arising from this project.#1#2#3#4#5#6 * Next Steps NOTE: Is there another phase for this project? What is the project closure? *High-level GoalsRelationshipUltimate Goal
  • 6. * * ReferencesYou must use references that coincide with the in- text citations in your presentation written in correct APA format. All references should come from Strayer University databases such as EbscoHost, eLibrary, ProQuest, etc. If your professor allows use of the internet avoid using .com sites, but you may use .org or .gov sites that are copyrighted. * ABC: INFORMATION TECHNOLOGY PROJECT CHARTER Name: Institutional Affiliation:
  • 7. 1.0. INTRODUCTIONPurpose of INFORMATION TECHNOLOGY Project Charterthe abc’s INFORMATIONA tECHNONOLOGY pROJECT PROPOSAL charter documents a research and formulation of a surveillance security system which is targeted to appraise internal security within the company includingthe project’s proposed budget as well as the deliverables together with the required appraisals. The carter further acts to validate and substantiate the feasibility of this project meeting company specifications and its ability to meet organizational needs through the ICT department. The intended audience of the Information Technology Project Charter is the project sponsor who topples up as the System technician with ABC’s ICT department and the Administration of ABC.project And Product Overview The project’s vision is to enhance the beefing up security measures within ABC Company. Besides, the system will be geared to nothing else but will help in attaining the company’s profit maximization goals and in making sure that the company attains international risk management status. The proposed project will provide a plan of the project containing the foresaid project’s important procedures, the project’s proposed budget, the deliverables and the required appraisals for the project to succeed. The project also validates and substantiates the feasibility of organizational security by meeting company specifications and its ability to meet organizational needs. The Information Technology project employs the use of the pipeline management as its project portfolio management method. The methodology involves having the capital application project being identified and raising measureable deliverables that the project has to attain (Ding, 2009). In
  • 8. addition, the use of the organizational resources is classified both as time based and objective based. The project at hand has a restrictedlife span of one full year of generating the surveillance security system, two months that will cover the pilot phase, a third of a year to facilitate the overhaul and finally three months that will enable performance appraisal. 3. O. PROJECT PROBLEMS The major areas of concern which will be addressed once the surveillance system is implemented are the intensification of the internal security, bearing in mind that the crime rates are in the increase as well as terrorism activities and the second the system will find its application within company internal controls as well as inspection programs (Ding, 2009).The two areas for a long time have posed a challenge to the company particularly the later which has seen the company’s production dwindling. As thus, federal government has highly recommended the use of these improved surveillance systems within the corporate institutions to make sure an extensive approach to not only homeland security, but also international security. 3.1. PROPOSED SOLUTIONS TO THE BUSINESS PROBLEMS After the completion of the system development and its actual implementation, the company will have gotten mitigation to the various business problems earlier explored. The solutions are as outlined as follows; Firstly, Potential damages to property and the individuals within the company will be minimized as the developed program will be tracking the movements of all the people within and around the company’s premises. Secondly, the establishments of a program that will be keep track of all the activities of the employees within the organization with the key concern being establishment of employee production. It will lead to each employee trying to optimize his productivity rate thus production will rise in
  • 9. capacity. Thirdly, the beefing up of security in that the network creation will connect the organization’s security system to that of the homeland security. That will facilitate the access of security assistance from homeland security by the company in the event of a security alarm (Hou et al., 2008). . The fourth solution is Cost reduction in key areas such as the inspection fee since inspection professionals required in the production section of the organization will significantly reduce in number once the system developed comes into operation. The fifth solution would be Reduction of losses that relate to inadequate surveillance that leads to pilferage, crime and terrorism activities once the system is developed in the long- run. The profits on the other hand will be maximized. Lastly, the business premise will reduce long-term liability in the event of unforeseen crimes whose main cause is negligent performance. 4. 0. SCOPE 4.1. OBJECTIVES/GOALS The goals of the projects include; · To ascertain that within a span of 21 months, the organization has been able to establish a robust surveillance system. · To spearhead optimal utilization of capital allotted to the project development process. · To ensure a comprehensive coverage and dealing of all the surveillance related risks that the company faces. 4.2. REQUIREMENTS The following table presents the requirements that the project’s product, service or result must meet in order for the project objectives to be satisfied. Requirement Requirement description 1 A camera surveillance plan to show the positions throughout the company’s business 2
  • 10. Access to an internet such that all the cameras and other peripherals in the company can be inter-networked- A local area internet is recommended for this purpose as it allows the use of Ethernet cable connection to the electrical appliances 3 Cameras- adequate in number to be fixed to all the locations in the organization’s premise as specified there before 4 Systems that will store the data which is streamed in by the camera- for the purpose of the information technology project a data management system is recommended 5 A network topology that has a central location with a remote server to enhance the viewing of cameras 6 Connection to a Wide Area Network (WAN) so that the security cameras are connected to the proposed Security Company 7 An over the counter program(Tailored/customized) that will be utilized in capturing information from the cameras, viewing selected data, storage of data in a database besides other Artificial Intelligence(AI) functions 8 Components of internet connectivity establishment. For instance, data cables used for interconnection to cameras using a remote computer 9 Countermeasures against data lose such as back-up storage especially on virtual memory that’s internet based 10 Skilled individuals within the discipline of information and technology such as System developer and database designers 11 Technical staff that will be tasked with System Management
  • 11. 12 Adequate working space in the organization to allow installation 13 A piped system to be used for connections that will be employed in system management 4.3. MAJOR DELIVERABLES OF THE PROJECT Developmemt timeframe Development of a surveillance system within the given time limit to enable the company reduce on costs that result from delays suck as payment made to the technicians involved in the installation process Design Review Walkthrough conducted by Business Analyst to achieve approval from Business as to the proposed project design User Acceptance Testing The company’s staff will have substantial time to learn how to use the system hence cutting down on the costs incurred on training them how to operate the system (Hou et al., 2008) Deployment Plan Identifies to the stakeholders and project team tasks necessary to move application into production Developing database Developing a database that coordinates the business activities and the security within the organization Organbizational connectivity Business activities and the security of the organization should be well connected to minimize chances of losses that may be caused due of theft by company’s employees as well as its potential customers Organizational coordination the coordination of the Business activities and the security of
  • 12. the organizationwill bring down the threat of terrorist activities to the organization-it will make sure that the security of all individuals dealing with the company is assured and thus improving the chances of the company’s expansion 5. TRAINING Training of staff on the use of the newly developed system prepares them to induce change at the same time reducing chances of resistance. The training will also boost service delivery to customers as transactions will be executed on a timely basis and in accordance to customers’ needs and specifications. It will end up giving the company a competitive advantage over its worthy competitors- thanks to the improved delivery of services (Flammini, Setola&Franceschetti, 2013). 6. PROJECT CONNECTION WITH HOMELAND Whereas the company has the sole responsibility of maintaining and maximizing its internal security control system, the homeland security agencies are more professional in the area and thus their overall effect in the enhancement of security is very important. This projects aims to control a system that connects the company’s security control system to the homeland security to enable information to be shared on security issues are swift, intellectual as well as steadfast. To come up with a project whose benefits outweighs the cons of project development and implementation(Williams, 2006). Whereas development of a surveillance system is an important step in the company’s premeditated growth, the opportunity cost of the system is a major consideration in the overall determination of utility of the project. The doles are as follows; the reduced chances of theft and other security concerns, the increment in the overall productive capacity of the company, a reduction of the supervision cost in the organization as well as an increase in funds put in by independent individuals
  • 13. who are third parties to the company (Ding, 2009). This is a result of the rise in confidence of the company’s management besides other direct not forgetting indirect advantages. 7. DURATION 7.1. ESTIMATED TIMELINE The schedule below outlines the timeframe within which various phases of the project shall be attained. ID ABC INFORMATION TECHNOLOGY PROPOSAL DATA ENTRY FINISH 1 The Feasibility study by end of 4th month 2 Acquiring all legal documents by end of 5th month 3 Developing of the camera surveillance plan by end of 5th month 4 Purchasing equipment by end of 6th month 5 Developing network for the interconnection of the cameras by end of 7th month 6 Structuring of support application software by end of 8th month 7 Developing system database system by end of 9th month 8 Installation by end of 11th month 9
  • 14. Pilot run in the front office department by end of 13th month 10 Complete implementation by end of 17th month 11 Training to staff members by end of 20th month 12 Performance test by end of 22nd month 8. PROJECT RESOURCES Table containing the generic resources, people, equipment, and materials needed to undertake the project. The following is a table denoting the use of the generic resources, human resource, and equipment together with materials in different acts within the project. s/no Activity Generic resources Human resources Materials 1 Feasibility study - external system investigator - company staff used in filling questionnaires
  • 15. - questionnaires - past records on the security and supervision status in the company 2 Acquisition of legal documents and licenses - company’s purchases officer 3 Development of camera surveillance plan - Broadband internet connection - External ICT/ Surveillance expert 4 Purchase of equipment and materials - company’s purchases officer 5 Development of physical cabled network - external builders and fixers - data cables - pipes - RJ45 connectors 6 Development of application software - broadband internet System developer - remote computer 7 Development of database system - broadband internet System developer - remote computer 8
  • 16. Physical installation of cameras and other accessories - External ICT/ Surveillance expert - Surveillance cameras - remote computer - Wall camera holders - 9 Pilot run - broadband internet - system developer - company ICT staff - the new system at the front office department 10 Full implementation - broadband internet - System developer - Company ICT staff - the system in the whole company 11 Performance measurement - Broadband internet - External ICT/ Surveillance professionals - System analyst - the system in the whole company 9. DETEREMINANTS OF THE PROJECT’S SUCCESS Successful completion of the project purely lies on the ability to achieve the projected deliverables of the project. These incorporate the following determinants; · Completion of the project development within the limited span of period · Capability of the system to send real-time signals to various destinations such as the remote computer, the database and the homeland security systems · If the system developed will reduce the cost of production
  • 17. supervision as well as increase the rate of staff performance in the organization · Security concerns such as safeguarding the system from external and malicious interference and lack of system redundancy. 10. RECOMMENDATIONS During the implementation phase cycle of the system development, the company is required to ascertain that this system that has been developed is update regularly. There is need for conducting a system appraisal fortnightly to ensure that the developments in the field of Information technology and Camera Surveillance have been adopted and up to date (Flammini, Setola&Franceschetti, 2013). In summation, staff training for the implementation these changes is too a necessary requirement during the same duration.11. BUDGET Estimate11.1. Funding Source ABC11.2. Estimate This section provides a summary of estimated spending to meet the objectives of the Information Technology project as described in this Project Charter. This summary of spending is preliminary, and should reflect costs for the entire investment lifecycle. It is intended to present probable funding requirements and to assist in obtaining budgeting support (see excel document) References Ding, A. (2009). Social computing in homeland security (1st ed.). Hershey, Pa.: Information Science Reference. Flammini, F., Setola, R., &Franceschetti, G. (2013).Effective surveillance for homeland security (1st ed.). Boca Raton, FL: CRC Press. Hou, J., Wu, C., Yuan, Z., Tan, J., Wang, Q., & Zhou, Y. (2008).Research of intelligent home security surveillance system based on ZigBee, 554--557. Williams, R. (2006). Real-time systems development (1st ed.). Oxford: Elsevier Butterworth-Heinemann.
  • 18. Running head: INFORMATION TECHNOLOGY PROJECT PROPOSAL 1 INFORMATION TECHNOLOGY PROJECT PROPOSAL 2 INFORMATION TECHNOLOGY PROJECT PROPOSAL Name: Institution: INFORMATION TECHNOLOGY PROJECT PROPOSAL Executive summary The administration of the ABC Industry has burdened the ICT section of the company to research and formulate a surveillance security system which is targeted to appraise
  • 19. internal security within the company. In my capacity as ICT section’s system technician, I am bound to develop the plan which will act as a guide to this fundamental project as from the initial stages to its completion. This paper brings out the foresaid project’s important procedures, the project’s proposed budget as well as the deliverables together with the required appraisals for this project to go through successfully. This paper acts to validate and substantiate the feasibility of this project meeting company specifications and its ability to meet organizational needs. Recommend a project portfolio management method for your selected project. The method that shall best suit the purpose of the project at hand is the pipeline management. This methodology involves having the capital application project being identified and raising measureable deliverables that the project has to attain (Ding, 2009). More still, use of the organizational resources should be classified as times based as well as objective based. Within the project at hand, the span is restricted to a full year of generating the surveillance security system, two months that will cover the pilot phase, a third of a year to facilitate the overhaul and finally three months that will enable performance appraisal. Type of problem The major areas of concern which will be addressed once the surveillance system is implemented are the intensification of the internal security, bearing in mind that the crime rates are in the increase as well as terrorism activities and the second the system will find its application within company internal controls as well as inspection programs (Ding, 2009). The two areas for a long time have posed a challenge to the company particularly the later which has seen the company’s production dwindling. As thus, federal government has highly recommended the use of these improved surveillance systems within the corporate institutions to make sure an extensive approach to not only homeland security, but also international
  • 20. security. Requirements Following are the specifications of the project to be developed. A camera surveillance plan. This is to show the positions throughout the company’s business. Access to an internet such that all the cameras and other peripherals in the company can be inter-networked- A local area internet is recommended for this purpose as it allows the use of Ethernet cable connection to the electrical appliances. Cameras- adequate in number to be fixed to all the locations in the organization’s premise as specified there before. Systems that will store the data which is streamed in by the camera- for this purpose a data management system is recommended. A network topology that has a central location with a remote server to enhance the viewing of cameras. Connection to a Wide Area Network (WAN) so that the security cameras are connected to the proposed Security Company. An over the counter program(Tailored/customized) that will be utilized in capturing information from the cameras, viewing selected data, storage of data in a database besides other Artificial Intelligence(AI) functions Components of internet connectivity establishment. For instance, data cables used for interconnection to cameras using a remote computer. Countermeasures against data lose such as back-up storage especially on virtual memory that’s internet based. Skilled individuals within the discipline of information and technology such as System developer and database designers. Technical staff that will be tasked with System Management Adequate working space in the organization to allow installation. A piped system to be used for connections that will be employed in system management. Proposed solutions to the business problems After the completion of the system development and its actual
  • 21. implementation, the company will have gotten mitigation to the various business problems earlier explored. The solutions are as outlined below. Potential damages to property and the individuals within the company will be minimized as the developed program will be tracking the movements of all the people within and around the company’s premises. Establishment of a program that will be keeping track of all the activities of the employees within the organization with the key concern being establishment of employee production. It will lead to each employee trying to optimize his productivity rate thus production will rise in capacity. Beefing up of security. The network creation will connect the organization’s security system to that of the homeland security. That will facilitate the access of security assistance from homeland security by the company in the event of a security alarm (Hou et al., 2008). . Cost reduction in key areas such as the inspection fee since inspection professionals required in the production section of the organization will significantly reduce in number once the system developed comes into operation. Reduction of losses that relate to inadequate surveillance that leads to pilferage, crime and terrorism activities once the system is developed in the long-run. The profits on the other hand will be maximized. The business premise will reduce long-term liability in the event of unforeseen crimes whose main cause is negligent performance. State the vision and the goal of the project. Project’s vision The project’s vision is to enhance the beefing up security measures within ABC Company .Besides, the system will be geared to nothing else but will help in attaining the company’s profit maximization goals and in making sure that the company attains international risk management status. The goals of the projects are
  • 22. To ascertain that within a span of 21 months, the organization has been able to establish a robust surveillance system. To spearhead optimal utilization of capital allotted to the project development process. To ensure a comprehensive coverage and dealing of all the surveillance related risks that the company faces. Major Deliverables of the project Development of a surveillance system within the given time limit The surveillance system ought to be put in place within the required time limit. This will enable the company reduce on costs that result from delays suck as payment made to the technicians involved in the installation process. In spite of that, the company’s staff will have substantial time to learn how to use the system hence cutting down on the costs incurred on training them how to operate the system (Hou et al., 2008). Developing a database that coordinates the business activities and the security within the organization Business activities and the security of the organization should be well connected to minimize chances of losses that may be caused due of theft by company’s employees as well as its potential customers. In addition, the coordination of the two activities will bring down the threat of terrorist activities to the organization- this will make sure that the security of all individuals dealing with the company is assured and thus improving the chances of the company’s expansion. Training of staff on the usability of the newly developed system Training of staff on the use of the newly developed system prepares them to induce change at the same time reducing chances of resistance. Also, the training will boost service delivery to customers as transactions will be executed on a timely basis and I accordance to customers’ needs and specifications. This will end up giving the company a competitive advantage over its worthy competitors- thanks to the improved delivery of services (Flammini, Setola &
  • 23. Franceschetti, 2013). Ensure the security control within the company’s system is in connection with homeland security Whereas the company has the sole responsibility of maintaining and maximizing its internal security control system, the homeland security agencies are more professional in the area and thus their overall effect in the enhancement of security is very important. This projects aims to control a system that connects the company’s security control system to the homeland security to enable information to be shared on security issues are swift, intellectual as well as steadfast. To come up with a project whose benefits outweighs the cons of project development and implementation (Williams, 2006). Whereas development of a surveillance system is an important step in the company’s premeditated growth, the opportunity cost of the system is a major consideration in the overall determination of utility of the project. The doles are as follows; the reduced chances of theft and other security concerns, the increment in the overall productive capacity of the company, a reduction of the supervision cost in the organization as well as an increase in funds put in by independent individuals who are third parties to the company (Ding, 2009). This is a result of the rise in confidence of the company’s management besides other direct not forgetting indirect advantages. The timeframe for delivering the solution to the project The schedule below outlines the timeframe within which various phases of the project shall be attained The Feasibility study by end of 4nd month Acquiring all legal documents by end of 5th month Developing of the camera surveillance plan by end of 5th month Purchasing equipment by end of 6th month Developing network for the interconnection of the cameras
  • 24. by end of 7th month Structuring of support application software by end of 8th month Developing system database system by end of 9th month Installation by end of 11th month Pilot run in the front office department by end of 13th month Complete implementation by end of 17th month Training to staff members by end of 20th month Performance test by end of 22nd month Table containing the generic resources, people, equipment, and materials needed to undertake the project. Following is a table denoting the use of the generic resources, human resource, and equipment together with materials in different acts within the project. s/no Activity Generic resources Human resources Materials 1 Feasibility study - external system investigator - company staff used in filling questionnaires
  • 25. - questionnaires - past records on the security and supervision status in the company 2 Acquisition of legal documents and licenses - company’s purchases officer 3 Development of camera surveillance plan - Broadband internet connection - External ICT/ Surveillance expert 4 Purchase of equipment and materials - company’s purchases officer 5 Development of physical cabled network - external builders and fixers - data cables - pipes - RJ45 connectors 6 Development of application software - broadband internet System developer - remote computer 7 Development of database system - broadband internet System developer - remote computer 8
  • 26. Physical installation of cameras and other accessories - External ICT/ Surveillance expert - Surveillance cameras - remote computer - Wall camera holders - 9 Pilot run - broadband internet - system developer - company ICT staff - the new system at the front office department 10 Full implementation - broadband internet - System developer - Company ICT staff - the system in the whole company 11 Performance measurement - Broadband internet - External ICT/ Surveillance professionals - System analyst - the system in the whole company Determine the key success criteria for your project Successful completion of the project purely lies on the ability to achieve the projected deliverables of the project. These incorporate the following determinants. Completion of the project development within the limited span of period. Capability of the system to send real-time signals to various destinations such as the remote computer, the database and the homeland security systems. If the system developed will reduce the cost of production
  • 27. supervision as well as increase the rate of staff performance in the organization. Security concerns such as safeguarding the system from external and malicious interference and lack of system redundancy. Recommendations During the implementation phase cycle of the system development, the company is required to ascertain that this system that has been developed is update regularly. I recommend that a system appraisal shall be conducted fortnightly to ensure that the developments in the field of Information technology and Camera Surveillance have been adopted and up to date (Flammini, Setola & Franceschetti, 2013). To crown it all, staff training for the implementation these changes is too a necessary requirement during the same duration. References Ding, A. (2009). Social computing in homeland security (1st ed.). Hershey, Pa.: Information Science Reference. Flammini, F., Setola, R., & Franceschetti, G. (2013). Effective surveillance for homeland security (1st ed.). Boca Raton, FL: CRC Press. Hou, J., Wu, C., Yuan, Z., Tan, J., Wang, Q., & Zhou, Y. (2008). Research of intelligent home security surveillance system based on ZigBee, 554--557. Williams, R. (2006). Real-time systems development (1st ed.). Oxford: Elsevier Butterworth-Heinemann. Running head: INFORMATION TECHNOLOGY PROJECT PROPOSAL 1
  • 28. INFORMATION TECHNOLOGY PROJECT PROPOSAL Name: Institution: Running head: INFORMATION TECHNOLOGY PROJECT PROPOSAL 1 INFORMATION TECHNOLOGY PROJECT PROPOSAL Name: Institution: