SlideShare a Scribd company logo
1 of 41
Running Head: Assignment 5 1
INFRASTRUCTURE AND SECURITY 6
Infrastructure and Security
Ramon O. Crespo
Professor: Roy R. Creasey, Jr., Ph.D.
Strayer University
November 29, 2016
Infrastructure Document
For a company with potential for expansion, the company may
be required to integrate their infrastructure to ensure solutions
to certain problems are considered. There the company may
need to develop infrastructure which contains reliable and
effective security protocols. Therefore, to ensure the best
network is developed, it means stability, speed and reliability
are the major factors that should be considered. On the other
hand, the network should be able to ease operations conducted
in an organization. In this reference, various aspects like
gateways, routers etc should be considered when setting up
workstations. (Chou, D., & Sengupta, S. 2008).
There has been the technological advancement and due to this
reason technology based infrastructure has been innovated.
They have been created and used to partially match the modern
world. Cyberspace or the network can be considered to be of
much value in terms of information and money. Alternatively, it
has lead to extended personal and organizations and reactions.
For example, in this case, is that network has become the center
of many systems which are used to control and manage
infrastructure. I.e. those used in banking, energy delivery etc.
therefore networks are the underlying technological that will
transform the society on basis of information.
Cyberspace is also very sensitive due to the following failure.
Their failure can result due to their complex nature, accident, or
hostile intent. Therefore, bad things can happen to the network
itself or the infrastructure itself due to this reason when
designing a network the design plan needs to consider these
aspects. In this regard, bad things can mean delay, damage or
disconnect. Their when designing a network the design need to
consider this element that may prevent the development of a
well-integrated network. These attics are quite common in day
to day basis and therefore a network design for a company that
is that is expanding should be well implemented to as much as
possible to minimize such incidences.
Networks are under threats which are more extensive with
respect to the value of infrastructure itself. The design should
also consider strategic defense options. Networks are faced with
possible disruption and this may have substantive consequences
to the economy. Therefore, networks infrastructure should be
developed in such a way to prevent potential attackers. For the
network to be efficient, it must be highly protected to prevent
unauthorized network access. For example, hackers can cause
destruction to an organization data. This may affect company
productivity. (Radvanovsky, R. S., & McDougall, A. 2009).
Due to the evolution of computer various assumptions have
been developed. For example, in this case, is a modern
computer which is very spacious, and runs universal protocols.
There they are open to access and due to this reason hackers or
people with bad intention can get in touch to them. To provide
adequate protection of network resources three things are
essential to consider. Confidentiality basically means that only
an authorized person can view a particular data. On the other
hand, the system should encompass integrity. This means that
only authorized users can change particular information. It
should also be possible to detect the authenticity of the data.
In a company that is growing, infrastructure and security
network is another adamant aspect that a designer should
consider. Therefore, they should be aware of possible threats
that at any particular moment could compromise the security.
The main objective of installing a network system is to ensure
the operations of an organization run smoothly. However, cost
factor is an important factor that a designer may need to
consider. An asset is anything of value to an organization.
Therefore, the company should ensure the network is secure.
Hackers are always on the headlines however many
organizations have taken the responsibility of preventing such
risks; therefore, the design should consist of all these
vulnerabilities and the way to handle them. An example is a
vulnerability which is a weakness in a design which is at higher
risk of threat. They are sometimes found in protocols and they
can also be found in applications themselves.
For a company, which is expanding, it is essential for
employees to be safe. For example, in the case of fire in the
building, there should be systems in place that notifies the
personnel in that particular building. Therefore, by effective
physical integration, it is possible to manage and maintain
access. Alternatively, being able to automate an organization
processes it become easier to transfer information between
systems and the staff. Therefore, integration of an effective
network create operational efficiencies, reduces risk and it also
improves risk man agent.
The company has chosen various ways of enhancing
infrastructure. The internet technology is changing so rapidly
and therefore any company that remains behind may be forced
out of the market. Therefore, due to this reason business must
keep up with the current trend. Availability of technology is not
so much important is it is not used to make the best out of it. In
the present day, computing has become the background of
network infrastructure in much organization. The reason as to
why a company could be having a big budget in installing
computing system is definitely; because this reason covers the
need of cloud computing in an organization. (Bishop, M. 2003).
Computing needs require regular maintenance and expertise to
handle the network system. Due to company growth relative to
technology has become very complex. Therefore, due to this
complex computing system, it is important to have a company
divided into the various department, i.e. finance department,
communication etc. when this division is done, it requires the
very department to have its software’s. Cloud computing is
when a company anvils the technological services through
services provider. In this case, a ‘cloud’ can be defined is a
number of all possible hardwires, and computing application
which are provided as a single package to an organization or a
company.
References
Bishop, M. (2003). What is computer security? IEEE Security &
Privacy, 1(1), 67-69.
Chou, D., & Sengupta, S. (2008). Infrastructure and security.
Practical Guide to Clinical Computing Systems: Design,
Operations, and Infrastructure, 37.
Radvanovsky, R. S., & McDougall, A. (2009). Critical
infrastructure: homeland security and emergency preparedness.
CRC Press
Wallom, D., Turilli, M., Martin, A., Raun, A., Taylor, G.,
Hargreaves, N., & McMoran, A. (2011, November).
MyTrustedCloud: Trusted cloud infrastructure for security-
critical computation and data managment. In Cloud Computing
Technology and Science (CloudCom), 2011 IEEE Third
International Conference on (pp. 247-254). IEEE.
Running head: INSTITUTIONAL CONFLICT 1
INSTITUTIONAL CONFLICT 4
Institutional Conflict
Susan White
Capella University
Introduction
Conflict is hardly avoidable especially when interaction is
between two or more people, whether at home or workplace. In
an institution, conflict is possible between a group and
individual, two or more groups, or two or more individuals
(Rahim, 2010). When an organization have to deal with a
conflict, it is fundamental for an institution to ensure they
address the issue other than the people. The following paper
discusses more on institutional conflict.
Explain why institutional conflict is significant. Why does it
matter?
Some of the various institutional conflict may occur when there
is conflict of interest, unclear definition of responsibilities, lack
of interpersonal relationship and resources. A conflict in most
cases will have a negative connotation, but its effects may be
negative and positive. Institutional conflict therefore significant
as the management will have the chance to bring the members
together (Blake & Mouton, 1984). Members get to work
together to solve the conflict, therefore sharing their opinion.
Learning from each other’s opinion helps in improvement of
future communication.
The above matters because it dictates the continuity of a
business. Unsolved conflicts may bring about violence, decrease
in company’s productivity, and some members leaving the
organization. Solved conflicts on the other hand allows the
management and members learn more about each (Lipsky &
Seeber, 2006).
Institutional Conflict Problems
As discussed above, several issues as a result of any type of
institutional conflict. The following examples are discussed
herein:
Employee turnover
Members of an institution who are continually frustrated with
the conflict level, may make up their mind to terminate their
membership. This is normally detrimental when a member is a
head of a committee or executive board which may end up
compromising the organizational management (Gordon, 2005).
Increased absenteeism
Conflicts especially in an organization may get tiring. This is
especially one is involved. One keeps avoiding his or her
workplace as a way of avoiding reality on the ground. The
workplace becomes boring a reason for one to continually be
absent.
Increased health claims
Organizational conflicts may cause frustration to a member if
they feel there is no solution on the way any time soon, or if the
feeling is that their opinion is falling on deaf ears. As result,
stress starts being evident, adversely affecting their personal
and professional lives. The member may start experiencing
headaches, overheating, loss of appetite, sleeping problems and
finally they become unapproachable (Rahim & Bonoma, 1979).
Conclusion
Institutional conflicts are a thing that is just inevitable
especially when people are living together. These conflicts are
significant and should be handled professionally so that they
don’t cause interruptions to the particular institution. As
demonstrated above, if unresolved they have damaging effects
to the individuals and the institution at large.
References
Blake, R. R., & Mouton, J. S. (1984). Solving costly
organizational conflicts. Jossey-Bass Inc
Pub.
Gordon, D. I. (2005). Organizational Conflicts of Interest: A
Growing Integrity Challenge.
Pub. Cont. LJ, 35, 25.
Lipsky, D. B., & Seeber, R. L. (2006). Managing organizational
conflicts. The Sage
Handbook of Conflict Communication. Thousand Oaks, CA:
Sage Publications, 359-90.
Putnam, L. L., & Wilson, C. E. (1982). Communicative
strategies in organizational conflicts:
Reliability and validity of a measurement scale. Annals of the
International Communication Association, 6(1), 629-652.
Rahim, M. A. (2010). Managing Conflict in Organizations.
Transaction Publishers.
Rahim, A., & Bonoma, T. V. (1979). Managing organizational
conflict: A model for
diagnosis and intervention. Psychological reports.
ffi
ffi
ffi
ffi
fl
ffi
ffi
ffi
ffi
ffi
ffi
ffi
fl
fl
+ + +
+ +
fl
Print
Conflict Resolution Scoring Guide
Due Date: End of Unit 10.
Percentage of Course Grade: 15%.
Criteria
Non-performance
Basic
Proficient
Distinguished
Identify variables within an institutional structure that may have
contributed to a conflict.
12%
Does not identify variables within an institutional structure that
may have contributed to a conflict.
Provides minimal information with little detail when identifying
variables within an institutional structure that may have
contributed to a conflict.
Identifies variables within an institutional structure that may
have contributed to a conflict.
Analyzes variables within an organizational structure that may
have contributed to a conflict; identifies assumptions on which
the analysis is based.
Describe how a conflict was resolved.
12%
Does not describe how a conflict was resolved.
Provides minimal information and little detail when describing
how a conflict was resolved.
Describes how a conflict was resolved.
Analyzes how a conflict was resolved; evaluates the degree to
which this conflict resolution was effective or ineffective.
Illustrates the evaluation of this conflict resolution with specific
details.
Analyze a conflict situation.
12%
Does not analyze a conflict situation.
Provides minimal information and little detail when analyzing a
conflict situation.
Analyzes a conflict situation.
Analyzes a conflict situation; identifies areas where additional
information is needed to gain a more complete understanding.
Evaluate the degree to which this conflict resolution was
effective or ineffective.
12%
Does not evaluate the degree to which this conflict resolution
was effective or ineffective.
Provides minimal information and little detail when evaluating
the degree to which this conflict resolution was effective or
ineffective.
Evaluates the degree to which this conflict resolution was
effective or ineffective.
Evaluates the degree to which this conflict resolution was
effective or ineffective; impartially considers conflicting
evidence and other perspectives.
Propose a detailed solution to a conflict.
13%
Does not propose detailed solution to a conflict.
Provides minimal information and little detail when proposing a
detailed solution to a conflict.
Proposes a detailed solution to a conflict.
Proposes a detailed solution to a conflict; identifies criteria for
evaluating the proposed solution.
Incorporate conflict resolution readings into a conflict analysis.
13%
Does not incorporate conflict resolution readings into a conflict
analysis.
Provides minimal information and little detail when
incorporating conflict resolution readings into a conflict
analysis.
Incorporates conflict resolution readings into a conflict
analysis.
Integrates conflict resolution readings into a conflict analysis;
justifies inclusion and applicability of those specific readings.
Incorporate conflict resolution theory into a conflict analysis.
13%
Does not incorporate resolution theory into a conflict analysis.
Provides minimal information and little detail when
incorporating conflict resolution theory into a conflict analysis.
Incorporates conflict resolution theory into a conflict analysis.
Integrates conflict resolution theory into a conflict analysis;
justifies inclusion and applicability of that specific theory.
Communicate effectively through writing.
13%
Does not communicate effectively through writing.
Ineffectively and inconsistently communicates through writing.
Communicates effectively through writing.
Communicates effectively through writing; writing reflects the
quality and fluency expected of a professional.
Running head: PROJECT INTRODUCTION 1
SECTION 1: PROJECT INTRODUCTION
2
Section 1: Project Introduction
Ramon O. Crespo
Professor: Roy R. Creasey, Jr., Ph.D.
Strayer University
October 16, 2016
Section 1: Project Introduction
Introduction
a. Background information of the Company
The company is known for its rampant role in the collection and
analysis of data. The firm has been operational for a duration
almost equalling 2 years and has a total of approximate 20
employees, where 4 have been delegated to the IT department.
Due to the rampant growth that has been exhibited by the firm,
pundits predict that it is going to experience a staggering 60%
growth for the next one and a half year. The organization
collects data by the help of the Web analytics and then
combines it with the data obtained from the operation systems.
Web analytics hold a significant role in majority of the
marketing plans for the business and it involves measuring,
collecting, analysing and then reporting the data collected from
the website for the sake of development and optimization of
usage of web.
The firm is a very young one and hence is struggling to adopt to
the limited technological infrastructure it has to keep it running.
However regardless of this, the firm still anticipates to have the
business expanded in the next half a year by having its
operational activities moved from its current one floor to a
spacious 3 floors. The company has all the information
regarding its operations kept in the form of both hardware and
software and stored on-site.
b. The company’s business
The firm works on web analytics and effective qualitative
reportage. The software used by the firm enables it to have high
quality, data collection that is very effective that starts in
minutes without any necessity of additional programing (Aalst,
et al. 2009). Therefore, whether it is a very big document,
review or digital sets of data, the organization will be able to
provide you with analytical services, which will off great help
for you in acquiring answers that are simpler to ambiguous
business queries. The firm is further able to collect native and
email data from almost all the electronic sources, with the
inclusion of the individual computers, storage devices for
mobile media, backup tapes, networks belonging to the
companies, and the mobile devices for personal use (Aalst, et al.
2009). This shows that the company is well equipped to manage
almost all of the devices.
c. The Current Outsourcing and offshoring activities.
Globalization and an increase on the competition on the global
standards have pushed the organization to incorporate a wider
range of economical transfers and the process of exchanging
goods and services, technical knowhow, personnel, and
numerous other related intermediate activities that are part of
the value chains for the global markets. When it comes
outsourcing and offshoring, there is always a very close
relationship amid the locations, motivational standards and the
organizational strategy for the company (Warranty Data
Collection and Analysis. 2011). Technological advancements
will ultimately play great roles in reshaping this subject more in
the organization.
The main reason behind the organization resolving to the
activities related to outsourcing and offshoring when it comes to
knowledge is because the firm has an objective of cementing its
competitive advantage. This will only be achieved through
exploitation of the locally available talent and proficiency in
the host economies.
d. The skilled information personnel in position and their
responsibilities
The following are the duties and the responsibilities of the team
that will ensure the fulfilment of the project.
· The Senior Project Director
i. The individual will be in charge of ensuring that the project is
planned, directed and ensures a smooth running of the project.
The individual will also be in charge of ensuring that the
project deliverables and their functions are achieved as stated in
the Charter of the project (Ward, et al. 2006).
ii. He will also be in charge of ensuring that accountability is
maintained when it comes to managing the resources for the
project.
· The Quality Manager and the Technical Lead
i. Will ensure that both the proposed product and that the
qualities of the process for the project are maintained.
ii. Will manage every day’s activities for the project and that
there is a good liaison with the project’s technical management.
iii. Will ensure that the technical disciples regarding the project
are maintained.
iv. Will partner with the IT department to ensure that adequate
technical assistance is accorded to the project handlers.
v. Will be in charge of advising on the insight regarding the
health of the project.
vi. Will be available to offer leadership assistance to the
technical staff throughout the life cycle of the project.
vii. Will provide necessary assistance to the Senior Project
Director in establishing the best technical policies, procedures
and processes for the project.
· Implementation and test lead
Will be in-charge of:
i. Managing the implementation phase of the project.
ii. Providing leadership when it comes to implementation
management by forming, synchronizing, scheduling, and closely
overseeing the activities during implementation phase.
iii. Directing the testing process of the newly created structure.
iv. Will work with with the state and the federal departments to
ensure that the test are carried out as provided for by the law.
· Operation Lead
Will be in charge of:
i. Coordinating and supervising how the new system works
e. The particular data collected by the company
f. The information systems that is currently being used by the
company:
· Operational Systems and Databases
Below are some of the operating systems and Databases that the
organization has been using to help with its day to day
activities.
· Operating System
They include:
i. Microsoft.NET 2.0 Framework
ii. ASP.NET 2.0 master pages, the gratified pages and Web
Parts.
iii. Windows Workflow Foundation.
· Databases
i. Business Request Data
ii. Site custom data
iii. InfoPath Forms Services
· Analytics and Interfaces
The most used analytic interface being used by the organization
is the graphic interface.
· Infrastructure and Security
To ensure the security of the collected data, the firm has
resolved to the use of the combination of both the technologies
of the cloud computing and Software-as-as-a-Service (SaaS)
Therefore, when the above outlined structure is thoroughly
implemented by the organization, then the structures it will
have initiated in place will be able to assist with holding the
demand for the expansion that the business will come with.
References
Aalst, W., Joseph, M., Mylopoulos, J., Sadeh, N. M., Shaw, M.
J., Szyperski, C., Gotel, O., ... Meyer-Stabley, B. (2009).
Software Engineering Approaches for Offshore and Outsourced
Development: Third International Conference, SEAFOOD 2009,
Zurich, Switzerland, July 2-3, 2009. Proceedings. Berlin,
Heidelberg: Springer Berlin Heidelberg.
Ward, P., & Dafoulas, G. (2006). Database management
systems. London: Thomson.
Warranty Data Collection and Analysis. (2011). London:
Springer-Verlag London Limited.
Running head: PROJECT PLAN 1
PROJECT PLAN
2
Section 2: Project Plan
Ramon O. Crespo
Professor: Roy R. Creasey, Jr., Ph.D.
Strayer University
October 16, 2016
Project Plan for the Organization
Introduction
The organization is proud to be able to review and enter
into a partnership with its customers in goal of overhauling the
company visibility. This visibility will be done in hopes to
increase brand awareness while increasing the residential
customer base and the industrial IT services. Through the
improved visual appearance of the company assets the brand
will become known for its appearance and with the known
appearance will make changes within the organization. The
graphics will provide information in regards to the company as
well as local contacts and the company website. With that, the
organization will strive to increase its quality of field service as
well as improve the quality of the customer service through face
to face interactions as well as online and telephone interactions.
To ensure maximum satisfaction of the organization’s
customers, the following Project Implementation plan has been
drafted to assist with ensuring that the project is smoothly and
comprehensively carried out. The refurnishing process of the
organization’s IT department is a very huge project that the
organization would like to capitalize on greatly.
1. The IT Plan
The IT department holds a vital role in the process of
realization of the project. The organization understands this
with a very strong implication. This is why the firm has taken
necessary steps to ensure that the IT plan developed has a close
association with its Business Plan. This Organization’s IT plan
will help in achieving the successes of the project by making
sure that the best IT personnel that bear recommended
qualifications are brought on board. If put to use according to
plan, the plan will prove to be a great tool in assisting with
controlling the activities of the IT department throughout the
whole process.
Roles and responsibilities of Team Members of the Project
The list provided below outlines the duties and the obligations
of the Organization’s project team.
· The Senior Project Director
· In charge of planning directing and overseeing the project, and
making that the project deliverables and its functionality are
realized.
· Ensures that there is maintenance of accountability when it
comes to managing all of the resources being used in the
project.
· Acts an intermediary with between the project and its
sponsors.
· The Quality Manager
· In charge of managing the quality of the product and the
process involved in the project.
· Ensures that the traceability matrix of the requirements is
maintained.
· In charge of providing insight into the health of the project.
· The Roles and the duties of:
· The Technical Lead have been clearly outlined.
· The Implementation Lead.
· The Application Support Lead.
· The Test Lead have been properly and thoroughly outlined.
· The Configuration Lead and,
· The Operations Lead have all been clearly outlined on the
Human Resource Plan.
Project Organizational Charts
The graphic structure below, derived from DMOZ - Regional:
North America: United States: Tennessee: Guides and
Directories. (2016), is a representation of the reporting
hierarchy for the project.
The chart below, derived from DMOZ - Regional: North
America: United States: Tennessee: Guides and Directories.
(2016), shows the existing association of the tasks for the
project and the members of the team. All of the changes that are
proposed to the responsibilities of the project must receive a
direct approval from the office of the Project Manager. Proposal
of change will only occur with a basis to the control process of
change for the project. When the change is made, all of the
documents for the project will be updated and then redeployed
in accordance with the procedures.
Roles
Infrastructure Preparation
Requirements Gathering
Design
Configuration
Development
Implementation Software Testing
Conduct Training
Stakeholder
Communication Management
Senior Project Director
A
A
R
R
C
C
I
Quality Manager
A
R
C
C
I
Technical Lead
A
R
Implementation Lead
I
A
R
C
I
I
Application Support Lead
A
C
R
I
I
Test Lead
A
C
R
C
C
I
Configuration Lead
R
A
R
C
I
Operation Lead
C
C
Project Sponsor
C
C
C
I
I
I
I
Steering Committee
I
I
I
I
C
C
A
IV& V
C
C
C
C
C
I
I
Agency Subject Matter Experts
R
I
C
Key:
R – Responsible for completing the work
A – Accountable for ensuring task completion/sign off
C – Consulted before any decisions are made
I – Informed of when an action/decision has been made
Staffing Management Plan
The Staffing Management Plan helps with formalization of the
processes that are used in managing the project. This plan
positions itself with the available processes like refurbishment,
Cultural and People policies, the policies for the supply chain,
and the collective agreements that have been continuously
applied by Organization for its staffing (Water Research
Foundation, September 1, 2011). During the resources
planning, there is significance in considering the resources that
are commonly used in the project and the ones from the external
environment. The Staffing Management Plan will aim to provide
a solution to the required resources to offer support to the
program through the life cycle of the project. However, it is of
significance to note that the details contained in the plan will
only be for the foreseeable future and will be updated with a
continuation of realization of the process.
When it comes to the staffing of the project and the resources,
the requirements will vary with time as the project progresses.
This document will be subjected to continuous updates as
deemed necessary for the phases that are to come. Staff will be
required to report directly to the organizational headquarters.
The staff that will be taken to work for this project will be split
into three main categories. There will be some employed on a
full-time, provisional, or rotational obligations. Finally,
purchased services contracts from the external that includes
Amplified Staff, particular, and accomplished task contracts
will help greatly in bringing in new staff in the course of
realizing the project (Project Management Institute, 2004).
All of the details relating to the staff and the, to be used
resources will be developed and safely stored in the Projects
Business Plan, which is a section of the Organization Business
Plan. The duties of the staff and the planning of the resources
will be put purely on the shoulders of the Project Manager, the
top most ranking Vice-President, IT managers and the HR
manager. All of the members at the Organization will be held
accountable for sake of planning of the resources and
identifying the needs of the staff during the process of planning.
2. Quality Management Plan
The activities related to quality assurance and control are of
great significance to the mission of organization. The
realization of the strategic goals for the organization is on a
basis on research products of high quality that the customers
and the public in general can be glad to see branded on the
offices. The organization has a policy that the quality program
is aligned to its mission and the goals of strategic research. The
Executive Director and the firms Director, Subscribers and the
Research Services have been mandated with the duty of seeing
to it that the resources related to personnel and finances are
allocated in the best way possible for the sake of development
and operation of the programs and processes related to quality
(Water Research Foundation, September 1, 2011).
When it comes to the management of the organization, the focus
has been solemnly put on ensuring that the goals of the process
is achieved so that the mission and vision of the organization
are achieved. The quality program is inclusive of the team
members who have basic duties of making the processes,
ensuring that their effectiveness, and overseeing the actions that
will make an improvement in the manner in which the
organization manages quality during and after the project. The
positions held by individuals who help with ensuring quality
include; the Board of Trustees, the Focus Area Council, the
Executive Director, the Quality Assurance Manager, The
Director of the Services related to Subscription and Research,
the Committee in charge of Project Advisory, Finance and
Administration Director, the Contracts Administrators and the
Project Coordinators (Water Research Foundation, September 1,
2011).
With the help of the above named individuals and the outlined
plan, the quality of the project as a whole is expected to be of a
very high quality that will satisfy the needs of the Customers.
Procurement Management Plan
The objective and goals of this Procurement Management Plan
is to help the Contacting Authorities and the Technical
Authorities at Organization:
· Adhere to the provisions of the government regarding the
whole process.
· Carry out the whole process of contracting in ways that can
test the scrutiny from the stakeholders when it comes to matters
relating to judiciousness and integrity, facilitation of access,
foster competitiveness, and reflect fairness when it comes to
spending the organizational funds (Project Management
Institute, 2004).
· Ensure that the Contract Regulations outlined by the
Government are applied at all times (Project Management
Institute. (2004).
· Be able to mitigate the associated risks and liability.
References
DMOZ - Regional: North America: United States: Tennessee:
Guides and Directories. (2016). Dmoz.org. Retrieved 12
October 2016, from
http://www.dmoz.org/Regional/North_America/United_States/T
ennessee/Guides_and_Directories
http://www.opg.com/about/regulatory-affairs/Documents/2014-
2015/D2-02-01_Attachment%204-08.pdf
Project Management Institute. (2004). A guide to the project
management body of knowledge (PMBOK guide). Newtown
Square, PA: Project Management Institute.
Water Research Foundation, (September 1, 2011). Retrieved on
10th Oct/2016 from
http://www.waterrf.org/funding/Policies/QualityManagementPla
n.pdf
Senior Project Director
Operations Lead
Quality Manager
Implementation Lead
Configuration Lead
Test Lead
Technical Lead
Application Support Lead
Running head: Assignment 4 1
Section 1: Design Document
6
Business Analytics
Ramon O. Crespo
Professor: Roy R. Creasey, Jr., Ph.D.
Strayer University
Nobember 21, 2016
Executive Summary
Business intelligence is one of the best technique businesses can
use to get functional intelligence from data. Through this,
businesses can provide required information to people of their
interest at any given time and via correct channels which in turn
can help to create a competitive gain by well-informed decision
making. Almost all businesses have a huge amount of
information that is available as structured data. Based on their
functional activities within the business, this information has
accumulated over time. Therefore, the old-style method may not
be able to utilize the late opportunities provided by this massive
data fully. In that case, the use of business intelligence system
has made work easier by consolidating, analyzing, store and
retrieve accumulated amount of data. This can be achieved by
techniques such as business analytics.
The paper will focus on a preview of business analytics by
defining this into depth term and, also providing its capabilities
along with how it is utilized by business enterprises to gain a
competitive advantage over their competitors.
According to Stubbs, business analytic is a practice of iterative
methodological examination of a business data with prominence
on statistical analysis.Business Analytics is mainly used by
companies devoted to data-driven decision making.The use of
business analytic enables the organization to improve their
business by ensuring optimized decision along with the use of
methods employed in statistics that involve data gathering and
analysis (Stubbs, 2013).
By the use of business analytics, the enterprise could
realize the reaction of the products or service from the external
environment such as customers, regions among others. This will
enable them to add features or vary the product or service based
on their customer's demand. The data for the product is
important to any new product line with structures since this can
be used to improve sales in a certain target population.
However, the idea of business analytic is in most cases utilized
by people involved in marketing. Marketers apply this technique
to predict and analyze customer's behavior. Therefore,
statistical techniques are applied based on historical data for
consumer's transactions. Therefore, information and statistics is
the key aspect of business analytics in the organization.
What a company can do with Business Analytics (BA)
Business analytic make use of statistical techniques on past
business performance to improve the new business insight and
initiative business planning. It also involves the use of
practices, skills and application along with some technologies.
The key concepts that always investigated from business
analytics are the information questions like what took place for
the last few years based on sales in a certain region. Also, the
analysis involves what might be taking place then in a certain
place and what might be their predictive performance. Based on
these questions, critical understanding must be enhanced to
answer the questions in a more advanced manner. Therefore, the
only solution to such questions is by use of mathematical
modeling and experimental designs.
Besides, from focusing on these questions, the answers will
always provide the next best action to be taken. The forecast
analysis is the best to decide the steps that the business can use
to either improve the sales of a specific product or change the
variation of a product or service. Business analytics always
focus on more perceptive answers to questions the organization
may require. This includes the perspectives to stay competitive
within their business line. The analysis helps to make proper
decisions which will reduce jeopardize in decision-making
(Rajiv Sabherwal, 2011).
Today, the use of business analytics is applicable in almost
all the business in predicting their customer's behavior, the
price range of the product, in logistics along with determining
best transportation routes. Also, the business may employ
business analytic in supply chain operation and in finding the
crucial factors that influence the organization performance,
investments, risk management, issuing credit cards and
maximizing sales.
Environmental requirements for Business Analytics (BA)
For Business Analytics (BA) be utilized fully it requires some
elements to be available. Most important is to identify which
features the process are allied to satisfy and value the
standpoint of the consumer. Business Analytics (BA) can be
performed in presence of the following components;
· Data: this deals with data quality and data sufficiency
requirements for analytics process. Enough data should be
present for modeling, testing and experimenting as analytics
demands. This additionally calls for management and
technology used in the whole Business Analytic process.
· Enterprise: Effective Business Analytics requires an enterprise
view point. In the absence of Enterprise, Business Analytics
initiatives may be confined, and it will be difficult to draw any
important benefits at the enterprise level.
· Leadership: Business Analytics (BA) requires capable and
cross-functional leaders who have strong executive management
support. The management emphasis more than just one project.
The leadership will strive to bring Business Analytics (BA)
based culture in the business environment.
· Targets: These are metrics to track these outcomes of
analytics projects. The metrics can be consumer loyalty, hiring
better corresponding to skill set requirements, increased
performance in the supply chain, and better quantitative risk
leadership.
· Analysts: they must pose high expert capabilities to build the
models and arrive at the results.
The figure below shows a data flow diagram in Business
analytics and cloud computing environment.
Conclusion
To sum up, for any business organization to succeed in the
present world market, Business analytics technique is the
stepping stone. I recommend the use of analyses reports made
from business analytic to improve the organization’s
management team to make insightful decisions for business
success.
References
Brijs, B. (2016). Business Analysis for Business Intelligence.
Boca Raton, Florida: CRC Press.
Rajiv Sabherwal, . B.-F. (2011). Business Intelligence:
Practices, Technologies, and Management. Hoboken, New
Jersey: John Wiley & Sons.
Stubbs, E. (2013). Delivering Business Analytics: Practical
Guidelines for Best Practice. Hoboken, New Jersey: John Wiley
& Sons.
Operational Data
Warehouse
Enterprise Data
Warehouse
Big Data
Application Development
Environment
User
Vertical Application
Analytics Library
SALES
MARKETIN
G
OPERATII
ONS
Data
Data
Data
Virtual Users
Data Center
Batch
Infrastructure
Real Time
1
2
3
4
5
Analytics
C
l
o
u
d
Q
u
e
u
e
C
l
o
u
d
Q
u
e
u
e
Research and
Development
Running head: PROJECT INCEPTION
1
PROJECT INCEPTION
2
Project Inception
Ramon O. Crespo
Professor: Roy R. Creasey, Jr., Ph.D.
Strayer University
October 30, 2016
Project Inception
Having the best information system is always the best desire of
any kind of an organization. The urge is more when the
organization in picture is concerned with the collection and
analysis of data. Hence, ensuring that the quality requirements
documents is completed is something that is important to ensure
that the needs of the user are taken into consideration and that
there is a consideration of their expectations. This due to the
fact that it will enable proper designing of the information
systems and the organizational infrastructure. There is no
necessity of having to outsource any kind of manpower or
technologically advanced equipment because the organization
has some of the best equipment and machines to help with the
due process. To ensure that the expected 20% expansion rate
that is expected for the next coming years does not catch the
organization by a surprise, the following project have been
initiated to help in the due process.
In the bid to have the information systems docket for the
organization renovated, the following practises will be of
significance. The first action that is undertaken is to ensure that
the security of the whole system is fostered in the best way
possible.
· The organization will make use of a centralized system of
storage of information to help with fostering an adequate
relationship and integration between systems and infrastructure,
data and Warehousing, analytics, interfaces and cloud
technology.
· The data collected will be stored and kept in fireproof rooms.
Further, the organization will be reinforced with ultramodern
security surveillance that will be helpful in ensuring that the
data in it stays safe and that any given breach of data will be
taken with the most seriousness it deserves (Garton, &
McCulloch, 2012).
· All of the data in the organization will have secondary storage
systems at offsite locations.
· All of the organizational computer systems will be
decentralized to help with easy monitoring of the activities of
the employees when using the organizational computer systems.
· Coastally upgrading of the software being used by the
computer systems for the organization. This will be of very
great significance in fostering the security of IT equipment and
prevent any cases of malware infection.
The following are some of the notable functions that the IT
docket will be in charge of:
· The IT department will be in charge of developing the
developmental requirements of the project in conjunction with
the other departmental, entities of the organization.
· The IT department will engage in necessary advancements that
will provide support for needs of the organization regarding the
management of the information it has and the data collected
(Mazzeo, Bellini., Motta, & IFIP World Computer Congress.
2008).
· The implementation of the plan for the IT department is an
independent process that strongly depends on the way other
dockets manages the information at their disposal.
· The implementation window for the system has undergone
complete compressing hence testing of the new IT system have
to be carried out in a very short duration, with no ample time
(Young, 2006).
· All of the employees in the IT department will constantly be
taken through training exercises to equip them with the best
practises of determining any malicious activities on the
organization’s website. This will help in quick detection and
response to any kind of danger.
With this in place, the organization anticipates to experience the
best smooth incorporation of the expansion to assist with
technological advancements in the industry. Being the leading
data collection and analysis firm is the goal of the organization.
References
Garton, C., & McCulloch, E. (2012). Fundamentals of
technology project management. Boise: MC Press Online.
Mazzeo, A., Bellini, R., Motta, G., & IFIP World Computer
Congress. (2008). E-government, ICT professionalism and
competencies, service science: IFIP 20th World Computer
Congress, Industry-Oriented Conferences, September 7-10,
2008, Milano, Italy. New York: Springer.
Young, R. R. (2006). Project requirements: A guide to best
practices. Vienna, Va: Management Concepts.
Running head:ASSIGNMENT 2 1
BUSINESS REQUIREMENTS
6
Business Requirements
Ramon O. Crespo
Professor: Roy R. Creasey, Jr., Ph.D.
Strayer University
October 30, 2016
Business Requirements
Project Overview
There is a lot of significance in ensuring that the quality of
business requirements are procured. This will help in ensuring
that the organizational information systems remain one of
quality. Therefore, ensuring that the quality requirements
documents is completed is something that is important to ensure
that the needs of the user are taken into consideration and that
there is a consideration of their expectations (Garton, &
McCulloch, 2012). This due to the fact that it will enable proper
designing of the information systems and the organizational
infrastructure. Therefore, after the 2 years of being operational,
the organization which is based on data collection and its
subsequent analysis has the obligation of creating the best
repository for the data it collects that spans beyond the
standardly recognized data bases. Due to the 20% expansion of
the data warehouse on annually basis, the following project
requirement document will be essential to help cater for the
ever increasing necessity and urgency of requiring storage
space.
The Scope of the Project
This document will provide an address to the requirements to
the renovation of the organization’s information systems. This
is propelled by the necessity of having the best storage space
that will ensure that the data belonging to the organization are
stored in the safest place available and that they are kept up to
date at all times. This is due to the rampant yearly expansion of
the data warehouse. The business requirements for the It
department includes the identification, certification and
management of the information that flows through the stream of
the organization in the best way possible and to ensure that they
are safely stored away from the access of the malicious
individuals who might want to illegally access the contents of
the organizational data (Young, 2006). The business
requirements outlined in this document will be strongly
expected to be enacted by the management at the IT department
and other supporting departments like the finance docket that
handles very sensitive information regarding the operations
being conducted by the organization.
Controlling the Project Scope
All of the specified requirements within their documents will be
keenly and thoroughly traced to the recommended deliverables
in the organization to ensure that all of the provisions undergo
proper implementation and testing. To have an adequate
maintenance of a trace to all the requirements for the whole life
cycle of the project, the use of the rational project set will be in
order. The reports that will be extracted from the Rational will
be made as part of this document’s appendix to ensure a
provision of updated snapshot of the repository of the
requirements that covers the management of the plan being
used.
Identification of the possible risks, the constraints, and the
assumptions
Assumptions
The list provided below are some of the assumptions that played
key part on the identification and subsequent development of
the outlined requirements in this document. The assumptions are
aimed at fostering a mutual understanding, quality
communication, and partnership among the stakeholders of the
project.
1. The IT department will be in charge of developing the
developmental requirements of the project in conjunction with
the other departmental, entities of the organization.
2. The IT department will engage in necessary advancements
that will provide support for needs of the organization regarding
the management of the information it has and the data collected.
3. The organization will enhance its current internal systems
and the existing processes to help with aligning them to adhere
to the requirements of the network directory provider and the
best requirements of data that the overall organizational plan
has.
Constraints
The list provided below shows the encountered constraints that
worked to oppose the realization of the requirements of the
project. The constraints of the project are the factors that works
against realization of the projects or those that tend to limit
realizing the results that are desired (like the satisfying
requirements, meeting the goals of the project, and achieving
the success measures for the project) as this document states.
1. All of the functionality of the management plan to the
organization must be kept operation at all times so as to help
with the yearly expansion that is expected to stand at 20%
(Mazzeo, Bellini, Motta, & IFIP World Computer Congress.
2008). To ensure that this deadline is met on a constant basis,
adequate plans must be certified and approved by the top
management at the firm.
Risks
The list provided below are some of the recognizable risks that
are associated with the realization of the project. The risks have
the ability of creating issues that may intern cause uncertain
effects on the ongoing project hence making the realization of
the results to be in jeopardy. They include:
1. The implementation of the plan for the IT department is an
independent process that strongly depends on the way other
dockets manages the information at their disposal.
2. The implementation window for the system has undergone
complete compressing hence testing of the new IT system have
to be carried out in a very short duration, with no ample time.
3. The stakeholders will have reduced amount of time to prepare
the plans they have for the organization and to have the very
plans incorporated into the mainstream of the organizational
information system.
The organization uses a centralized system of storage of
information to help with fostering an adequate relationship and
integration between systems and infrastructure, data and
Warehousing, analytics, interfaces and cloud technology. All of
the data collected will be stored and kept in fireproof rooms.
Further, the organization will be reinforced with ultramodern
security surveillance that will be helpful in ensuring that the
data in it stays safe and that any given breach of data will be
taken with the most seriousness it deserves (Films for the
Humanities & Sciences (Firm), Films Media Group., & Video
Education Australasia. 2011). Further, all of the computer
systems in the organization will be decentralized to help with
easy monitoring of the activities of the employees when using
the organizational computer systems.
The Potential Outsourcing or Offshoring Needs
Based on the current technologically advanced systems that the
organization uses, there will be no need of outsourcing any
further facilities. Instead, the available ones will be constantly
upgraded to ensure that they stay at par and offer protection
against any malicious acts by the hackers. With this, the
organization’s data will be strong and be able to detect and act
on any kind of malware sent to it by third party individual.
References
Films for the Humanities & Sciences (Firm), Films Media
Group., & Video Education Australasia. (2011). ICT Project
Management. New York, N.Y: Films Media Group.
Garton, C., & McCulloch, E. (2012). Fundamentals of
technology project management. Boise: MC Press Online.
Mazzeo, A., Bellini, R., Motta, G., & IFIP World Computer
Congress. (2008). E-government, ICT professionalism and
competencies, service science: IFIP 20th World Computer
Congress, Industry-Oriented Conferences, September 7-10,
2008, Milano, Italy. New York: Springer.
Young, R. R. (2006). Project requirements: A guide to best
practices. Vienna, Va: Management Concepts.
Running Head Assignment 5 1INFRASTRUCTURE AND SECURITY6.docx

More Related Content

Similar to Running Head Assignment 5 1INFRASTRUCTURE AND SECURITY6.docx

Running head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docx
Running head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docxRunning head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docx
Running head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docxjeanettehully
 
Architecture Framework for Resolution of System Complexity in an Enterprise
Architecture Framework for Resolution of System Complexity in an EnterpriseArchitecture Framework for Resolution of System Complexity in an Enterprise
Architecture Framework for Resolution of System Complexity in an EnterpriseIOSR Journals
 
Causes And Consequences Of Data Leakage
Causes And Consequences Of Data LeakageCauses And Consequences Of Data Leakage
Causes And Consequences Of Data LeakagePatty Buckley
 
OverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateKashif Ali
 
COMMONALITY AND DIVERSITY OF OPERATING SYSTEMS .docx
COMMONALITY AND DIVERSITY OF OPERATING SYSTEMS                .docxCOMMONALITY AND DIVERSITY OF OPERATING SYSTEMS                .docx
COMMONALITY AND DIVERSITY OF OPERATING SYSTEMS .docxmccormicknadine86
 
Week 1 Answer It is important to understand human beings and t.docx
Week 1 Answer  It is important to understand human beings and t.docxWeek 1 Answer  It is important to understand human beings and t.docx
Week 1 Answer It is important to understand human beings and t.docxjessiehampson
 
SYSTEM CONFIGURATION TOOLS
SYSTEM CONFIGURATION TOOLSSYSTEM CONFIGURATION TOOLS
SYSTEM CONFIGURATION TOOLSArArSavidad
 
1st Reply to Discussion, Project Management (Minimum 250 Words)I.docx
1st Reply to Discussion, Project Management (Minimum 250 Words)I.docx1st Reply to Discussion, Project Management (Minimum 250 Words)I.docx
1st Reply to Discussion, Project Management (Minimum 250 Words)I.docxvickeryr87
 
Posting 1 Reply required for belowBusiness costs or risks of p.docx
Posting 1  Reply required for belowBusiness costs or risks of p.docxPosting 1  Reply required for belowBusiness costs or risks of p.docx
Posting 1 Reply required for belowBusiness costs or risks of p.docxharrisonhoward80223
 
Strategic HRM Plan Grading GuideHRM498 Version 42.docx
Strategic HRM Plan Grading GuideHRM498 Version 42.docxStrategic HRM Plan Grading GuideHRM498 Version 42.docx
Strategic HRM Plan Grading GuideHRM498 Version 42.docxflorriezhamphrey3065
 
ISSC481_Term_Paper_John_Intindolo
ISSC481_Term_Paper_John_IntindoloISSC481_Term_Paper_John_Intindolo
ISSC481_Term_Paper_John_IntindoloJohn Intindolo
 
Replies Required for below Posting 1 user security awarene.docx
Replies Required for below  Posting 1  user security awarene.docxReplies Required for below  Posting 1  user security awarene.docx
Replies Required for below Posting 1 user security awarene.docxsodhi3
 
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docx
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docxRunning head INTERNET OF THINGS1INTERNET OF THINGS10.docx
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docxcowinhelen
 
Information Security And The Healthcare
Information Security And The HealthcareInformation Security And The Healthcare
Information Security And The HealthcareTracy Berry
 
Research proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comResearch proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comPhD Assistance
 
Securing a Collaborative Environment
Securing a Collaborative EnvironmentSecuring a Collaborative Environment
Securing a Collaborative EnvironmentJoseph Pidala
 
7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docx7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docxsleeperharwell
 
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docxaulasnilda
 

Similar to Running Head Assignment 5 1INFRASTRUCTURE AND SECURITY6.docx (18)

Running head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docx
Running head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docxRunning head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docx
Running head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docx
 
Architecture Framework for Resolution of System Complexity in an Enterprise
Architecture Framework for Resolution of System Complexity in an EnterpriseArchitecture Framework for Resolution of System Complexity in an Enterprise
Architecture Framework for Resolution of System Complexity in an Enterprise
 
Causes And Consequences Of Data Leakage
Causes And Consequences Of Data LeakageCauses And Consequences Of Data Leakage
Causes And Consequences Of Data Leakage
 
OverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrate
 
COMMONALITY AND DIVERSITY OF OPERATING SYSTEMS .docx
COMMONALITY AND DIVERSITY OF OPERATING SYSTEMS                .docxCOMMONALITY AND DIVERSITY OF OPERATING SYSTEMS                .docx
COMMONALITY AND DIVERSITY OF OPERATING SYSTEMS .docx
 
Week 1 Answer It is important to understand human beings and t.docx
Week 1 Answer  It is important to understand human beings and t.docxWeek 1 Answer  It is important to understand human beings and t.docx
Week 1 Answer It is important to understand human beings and t.docx
 
SYSTEM CONFIGURATION TOOLS
SYSTEM CONFIGURATION TOOLSSYSTEM CONFIGURATION TOOLS
SYSTEM CONFIGURATION TOOLS
 
1st Reply to Discussion, Project Management (Minimum 250 Words)I.docx
1st Reply to Discussion, Project Management (Minimum 250 Words)I.docx1st Reply to Discussion, Project Management (Minimum 250 Words)I.docx
1st Reply to Discussion, Project Management (Minimum 250 Words)I.docx
 
Posting 1 Reply required for belowBusiness costs or risks of p.docx
Posting 1  Reply required for belowBusiness costs or risks of p.docxPosting 1  Reply required for belowBusiness costs or risks of p.docx
Posting 1 Reply required for belowBusiness costs or risks of p.docx
 
Strategic HRM Plan Grading GuideHRM498 Version 42.docx
Strategic HRM Plan Grading GuideHRM498 Version 42.docxStrategic HRM Plan Grading GuideHRM498 Version 42.docx
Strategic HRM Plan Grading GuideHRM498 Version 42.docx
 
ISSC481_Term_Paper_John_Intindolo
ISSC481_Term_Paper_John_IntindoloISSC481_Term_Paper_John_Intindolo
ISSC481_Term_Paper_John_Intindolo
 
Replies Required for below Posting 1 user security awarene.docx
Replies Required for below  Posting 1  user security awarene.docxReplies Required for below  Posting 1  user security awarene.docx
Replies Required for below Posting 1 user security awarene.docx
 
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docx
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docxRunning head INTERNET OF THINGS1INTERNET OF THINGS10.docx
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docx
 
Information Security And The Healthcare
Information Security And The HealthcareInformation Security And The Healthcare
Information Security And The Healthcare
 
Research proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comResearch proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.com
 
Securing a Collaborative Environment
Securing a Collaborative EnvironmentSecuring a Collaborative Environment
Securing a Collaborative Environment
 
7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docx7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docx
 
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
 

More from susanschei

Src TemplateStandard Recipe CardName of dishSpanish Vegie Tray Ba.docx
Src TemplateStandard Recipe CardName of dishSpanish Vegie Tray Ba.docxSrc TemplateStandard Recipe CardName of dishSpanish Vegie Tray Ba.docx
Src TemplateStandard Recipe CardName of dishSpanish Vegie Tray Ba.docxsusanschei
 
SPT 208 Final Project Guidelines and Rubric Overview .docx
SPT 208 Final Project Guidelines and Rubric  Overview .docxSPT 208 Final Project Guidelines and Rubric  Overview .docx
SPT 208 Final Project Guidelines and Rubric Overview .docxsusanschei
 
Ssalinas_ThreeMountainsRegionalHospitalCodeofEthics73119.docxR.docx
Ssalinas_ThreeMountainsRegionalHospitalCodeofEthics73119.docxR.docxSsalinas_ThreeMountainsRegionalHospitalCodeofEthics73119.docxR.docx
Ssalinas_ThreeMountainsRegionalHospitalCodeofEthics73119.docxR.docxsusanschei
 
Spring 2020Professor Tim SmithE mail [email protected]Teach.docx
Spring 2020Professor Tim SmithE mail [email protected]Teach.docxSpring 2020Professor Tim SmithE mail [email protected]Teach.docx
Spring 2020Professor Tim SmithE mail [email protected]Teach.docxsusanschei
 
Spring 2020 – Business Continuity & Disaster R.docx
Spring 2020 – Business Continuity & Disaster R.docxSpring 2020 – Business Continuity & Disaster R.docx
Spring 2020 – Business Continuity & Disaster R.docxsusanschei
 
Sports Business Landscape Graphic OrganizerContent.docx
Sports Business Landscape Graphic OrganizerContent.docxSports Business Landscape Graphic OrganizerContent.docx
Sports Business Landscape Graphic OrganizerContent.docxsusanschei
 
Spring 2020Carlow University Department of Psychology & Co.docx
Spring 2020Carlow University Department of Psychology & Co.docxSpring 2020Carlow University Department of Psychology & Co.docx
Spring 2020Carlow University Department of Psychology & Co.docxsusanschei
 
SPOTLIGHT ON STRATEGY FOR TURBULENT TIMESSpotlight ARTWORK.docx
SPOTLIGHT ON STRATEGY FOR TURBULENT TIMESSpotlight ARTWORK.docxSPOTLIGHT ON STRATEGY FOR TURBULENT TIMESSpotlight ARTWORK.docx
SPOTLIGHT ON STRATEGY FOR TURBULENT TIMESSpotlight ARTWORK.docxsusanschei
 
Sport Ticket sales staff trainingChapter 4Sales .docx
Sport Ticket sales staff trainingChapter 4Sales .docxSport Ticket sales staff trainingChapter 4Sales .docx
Sport Ticket sales staff trainingChapter 4Sales .docxsusanschei
 
SPOTLIGHT ARTWORK Do Ho Suh, Floor, 1997–2000, PVC figures, gl.docx
SPOTLIGHT ARTWORK Do Ho Suh, Floor, 1997–2000, PVC figures, gl.docxSPOTLIGHT ARTWORK Do Ho Suh, Floor, 1997–2000, PVC figures, gl.docx
SPOTLIGHT ARTWORK Do Ho Suh, Floor, 1997–2000, PVC figures, gl.docxsusanschei
 
Sponsorship Works 2018 8PROJECT DETAILSSponsorship tit.docx
Sponsorship Works 2018 8PROJECT DETAILSSponsorship tit.docxSponsorship Works 2018 8PROJECT DETAILSSponsorship tit.docx
Sponsorship Works 2018 8PROJECT DETAILSSponsorship tit.docxsusanschei
 
SPM 4723 Annotated Bibliography You second major proje.docx
SPM 4723 Annotated Bibliography You second major proje.docxSPM 4723 Annotated Bibliography You second major proje.docx
SPM 4723 Annotated Bibliography You second major proje.docxsusanschei
 
Speech Environment and Recording Requirements• You must have a.docx
Speech Environment and Recording Requirements• You must have a.docxSpeech Environment and Recording Requirements• You must have a.docx
Speech Environment and Recording Requirements• You must have a.docxsusanschei
 
Sped4 Interview 2.10.17 Audio.m4aJodee [000008] And we are .docx
Sped4 Interview 2.10.17 Audio.m4aJodee [000008] And we are .docxSped4 Interview 2.10.17 Audio.m4aJodee [000008] And we are .docx
Sped4 Interview 2.10.17 Audio.m4aJodee [000008] And we are .docxsusanschei
 
Speech Recognition in the Electronic Health Record (2013 u.docx
Speech Recognition in the Electronic Health Record (2013 u.docxSpeech Recognition in the Electronic Health Record (2013 u.docx
Speech Recognition in the Electronic Health Record (2013 u.docxsusanschei
 
Sped Focus Group.m4aJodee [000001] This is a focus group wi.docx
Sped Focus Group.m4aJodee [000001] This is a focus group wi.docxSped Focus Group.m4aJodee [000001] This is a focus group wi.docx
Sped Focus Group.m4aJodee [000001] This is a focus group wi.docxsusanschei
 
Specialized Terms 20.0 Definitions and examples of specialized.docx
Specialized Terms 20.0 Definitions and examples of specialized.docxSpecialized Terms 20.0 Definitions and examples of specialized.docx
Specialized Terms 20.0 Definitions and examples of specialized.docxsusanschei
 
Special notes Media and the media are plural and take plural verb.docx
Special notes Media and the media are plural and take plural verb.docxSpecial notes Media and the media are plural and take plural verb.docx
Special notes Media and the media are plural and take plural verb.docxsusanschei
 
SPECIAL ISSUE ON POLITICAL VIOLENCEResearch on Social Move.docx
SPECIAL ISSUE ON POLITICAL VIOLENCEResearch on Social Move.docxSPECIAL ISSUE ON POLITICAL VIOLENCEResearch on Social Move.docx
SPECIAL ISSUE ON POLITICAL VIOLENCEResearch on Social Move.docxsusanschei
 
SPECIAL ISSUE CRITICAL REALISM IN IS RESEARCHCRITICAL RE.docx
SPECIAL ISSUE  CRITICAL REALISM IN IS RESEARCHCRITICAL RE.docxSPECIAL ISSUE  CRITICAL REALISM IN IS RESEARCHCRITICAL RE.docx
SPECIAL ISSUE CRITICAL REALISM IN IS RESEARCHCRITICAL RE.docxsusanschei
 

More from susanschei (20)

Src TemplateStandard Recipe CardName of dishSpanish Vegie Tray Ba.docx
Src TemplateStandard Recipe CardName of dishSpanish Vegie Tray Ba.docxSrc TemplateStandard Recipe CardName of dishSpanish Vegie Tray Ba.docx
Src TemplateStandard Recipe CardName of dishSpanish Vegie Tray Ba.docx
 
SPT 208 Final Project Guidelines and Rubric Overview .docx
SPT 208 Final Project Guidelines and Rubric  Overview .docxSPT 208 Final Project Guidelines and Rubric  Overview .docx
SPT 208 Final Project Guidelines and Rubric Overview .docx
 
Ssalinas_ThreeMountainsRegionalHospitalCodeofEthics73119.docxR.docx
Ssalinas_ThreeMountainsRegionalHospitalCodeofEthics73119.docxR.docxSsalinas_ThreeMountainsRegionalHospitalCodeofEthics73119.docxR.docx
Ssalinas_ThreeMountainsRegionalHospitalCodeofEthics73119.docxR.docx
 
Spring 2020Professor Tim SmithE mail [email protected]Teach.docx
Spring 2020Professor Tim SmithE mail [email protected]Teach.docxSpring 2020Professor Tim SmithE mail [email protected]Teach.docx
Spring 2020Professor Tim SmithE mail [email protected]Teach.docx
 
Spring 2020 – Business Continuity & Disaster R.docx
Spring 2020 – Business Continuity & Disaster R.docxSpring 2020 – Business Continuity & Disaster R.docx
Spring 2020 – Business Continuity & Disaster R.docx
 
Sports Business Landscape Graphic OrganizerContent.docx
Sports Business Landscape Graphic OrganizerContent.docxSports Business Landscape Graphic OrganizerContent.docx
Sports Business Landscape Graphic OrganizerContent.docx
 
Spring 2020Carlow University Department of Psychology & Co.docx
Spring 2020Carlow University Department of Psychology & Co.docxSpring 2020Carlow University Department of Psychology & Co.docx
Spring 2020Carlow University Department of Psychology & Co.docx
 
SPOTLIGHT ON STRATEGY FOR TURBULENT TIMESSpotlight ARTWORK.docx
SPOTLIGHT ON STRATEGY FOR TURBULENT TIMESSpotlight ARTWORK.docxSPOTLIGHT ON STRATEGY FOR TURBULENT TIMESSpotlight ARTWORK.docx
SPOTLIGHT ON STRATEGY FOR TURBULENT TIMESSpotlight ARTWORK.docx
 
Sport Ticket sales staff trainingChapter 4Sales .docx
Sport Ticket sales staff trainingChapter 4Sales .docxSport Ticket sales staff trainingChapter 4Sales .docx
Sport Ticket sales staff trainingChapter 4Sales .docx
 
SPOTLIGHT ARTWORK Do Ho Suh, Floor, 1997–2000, PVC figures, gl.docx
SPOTLIGHT ARTWORK Do Ho Suh, Floor, 1997–2000, PVC figures, gl.docxSPOTLIGHT ARTWORK Do Ho Suh, Floor, 1997–2000, PVC figures, gl.docx
SPOTLIGHT ARTWORK Do Ho Suh, Floor, 1997–2000, PVC figures, gl.docx
 
Sponsorship Works 2018 8PROJECT DETAILSSponsorship tit.docx
Sponsorship Works 2018 8PROJECT DETAILSSponsorship tit.docxSponsorship Works 2018 8PROJECT DETAILSSponsorship tit.docx
Sponsorship Works 2018 8PROJECT DETAILSSponsorship tit.docx
 
SPM 4723 Annotated Bibliography You second major proje.docx
SPM 4723 Annotated Bibliography You second major proje.docxSPM 4723 Annotated Bibliography You second major proje.docx
SPM 4723 Annotated Bibliography You second major proje.docx
 
Speech Environment and Recording Requirements• You must have a.docx
Speech Environment and Recording Requirements• You must have a.docxSpeech Environment and Recording Requirements• You must have a.docx
Speech Environment and Recording Requirements• You must have a.docx
 
Sped4 Interview 2.10.17 Audio.m4aJodee [000008] And we are .docx
Sped4 Interview 2.10.17 Audio.m4aJodee [000008] And we are .docxSped4 Interview 2.10.17 Audio.m4aJodee [000008] And we are .docx
Sped4 Interview 2.10.17 Audio.m4aJodee [000008] And we are .docx
 
Speech Recognition in the Electronic Health Record (2013 u.docx
Speech Recognition in the Electronic Health Record (2013 u.docxSpeech Recognition in the Electronic Health Record (2013 u.docx
Speech Recognition in the Electronic Health Record (2013 u.docx
 
Sped Focus Group.m4aJodee [000001] This is a focus group wi.docx
Sped Focus Group.m4aJodee [000001] This is a focus group wi.docxSped Focus Group.m4aJodee [000001] This is a focus group wi.docx
Sped Focus Group.m4aJodee [000001] This is a focus group wi.docx
 
Specialized Terms 20.0 Definitions and examples of specialized.docx
Specialized Terms 20.0 Definitions and examples of specialized.docxSpecialized Terms 20.0 Definitions and examples of specialized.docx
Specialized Terms 20.0 Definitions and examples of specialized.docx
 
Special notes Media and the media are plural and take plural verb.docx
Special notes Media and the media are plural and take plural verb.docxSpecial notes Media and the media are plural and take plural verb.docx
Special notes Media and the media are plural and take plural verb.docx
 
SPECIAL ISSUE ON POLITICAL VIOLENCEResearch on Social Move.docx
SPECIAL ISSUE ON POLITICAL VIOLENCEResearch on Social Move.docxSPECIAL ISSUE ON POLITICAL VIOLENCEResearch on Social Move.docx
SPECIAL ISSUE ON POLITICAL VIOLENCEResearch on Social Move.docx
 
SPECIAL ISSUE CRITICAL REALISM IN IS RESEARCHCRITICAL RE.docx
SPECIAL ISSUE  CRITICAL REALISM IN IS RESEARCHCRITICAL RE.docxSPECIAL ISSUE  CRITICAL REALISM IN IS RESEARCHCRITICAL RE.docx
SPECIAL ISSUE CRITICAL REALISM IN IS RESEARCHCRITICAL RE.docx
 

Recently uploaded

Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 

Recently uploaded (20)

Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 

Running Head Assignment 5 1INFRASTRUCTURE AND SECURITY6.docx

  • 1. Running Head: Assignment 5 1 INFRASTRUCTURE AND SECURITY 6 Infrastructure and Security Ramon O. Crespo Professor: Roy R. Creasey, Jr., Ph.D. Strayer University November 29, 2016 Infrastructure Document For a company with potential for expansion, the company may be required to integrate their infrastructure to ensure solutions to certain problems are considered. There the company may need to develop infrastructure which contains reliable and effective security protocols. Therefore, to ensure the best network is developed, it means stability, speed and reliability
  • 2. are the major factors that should be considered. On the other hand, the network should be able to ease operations conducted in an organization. In this reference, various aspects like gateways, routers etc should be considered when setting up workstations. (Chou, D., & Sengupta, S. 2008). There has been the technological advancement and due to this reason technology based infrastructure has been innovated. They have been created and used to partially match the modern world. Cyberspace or the network can be considered to be of much value in terms of information and money. Alternatively, it has lead to extended personal and organizations and reactions. For example, in this case, is that network has become the center of many systems which are used to control and manage infrastructure. I.e. those used in banking, energy delivery etc. therefore networks are the underlying technological that will transform the society on basis of information. Cyberspace is also very sensitive due to the following failure. Their failure can result due to their complex nature, accident, or hostile intent. Therefore, bad things can happen to the network itself or the infrastructure itself due to this reason when designing a network the design plan needs to consider these aspects. In this regard, bad things can mean delay, damage or disconnect. Their when designing a network the design need to consider this element that may prevent the development of a well-integrated network. These attics are quite common in day to day basis and therefore a network design for a company that is that is expanding should be well implemented to as much as possible to minimize such incidences. Networks are under threats which are more extensive with respect to the value of infrastructure itself. The design should also consider strategic defense options. Networks are faced with possible disruption and this may have substantive consequences to the economy. Therefore, networks infrastructure should be developed in such a way to prevent potential attackers. For the network to be efficient, it must be highly protected to prevent unauthorized network access. For example, hackers can cause
  • 3. destruction to an organization data. This may affect company productivity. (Radvanovsky, R. S., & McDougall, A. 2009). Due to the evolution of computer various assumptions have been developed. For example, in this case, is a modern computer which is very spacious, and runs universal protocols. There they are open to access and due to this reason hackers or people with bad intention can get in touch to them. To provide adequate protection of network resources three things are essential to consider. Confidentiality basically means that only an authorized person can view a particular data. On the other hand, the system should encompass integrity. This means that only authorized users can change particular information. It should also be possible to detect the authenticity of the data. In a company that is growing, infrastructure and security network is another adamant aspect that a designer should consider. Therefore, they should be aware of possible threats that at any particular moment could compromise the security. The main objective of installing a network system is to ensure the operations of an organization run smoothly. However, cost factor is an important factor that a designer may need to consider. An asset is anything of value to an organization. Therefore, the company should ensure the network is secure. Hackers are always on the headlines however many organizations have taken the responsibility of preventing such risks; therefore, the design should consist of all these vulnerabilities and the way to handle them. An example is a vulnerability which is a weakness in a design which is at higher risk of threat. They are sometimes found in protocols and they can also be found in applications themselves. For a company, which is expanding, it is essential for employees to be safe. For example, in the case of fire in the building, there should be systems in place that notifies the personnel in that particular building. Therefore, by effective physical integration, it is possible to manage and maintain access. Alternatively, being able to automate an organization processes it become easier to transfer information between
  • 4. systems and the staff. Therefore, integration of an effective network create operational efficiencies, reduces risk and it also improves risk man agent. The company has chosen various ways of enhancing infrastructure. The internet technology is changing so rapidly and therefore any company that remains behind may be forced out of the market. Therefore, due to this reason business must keep up with the current trend. Availability of technology is not so much important is it is not used to make the best out of it. In the present day, computing has become the background of network infrastructure in much organization. The reason as to why a company could be having a big budget in installing computing system is definitely; because this reason covers the need of cloud computing in an organization. (Bishop, M. 2003). Computing needs require regular maintenance and expertise to handle the network system. Due to company growth relative to technology has become very complex. Therefore, due to this complex computing system, it is important to have a company divided into the various department, i.e. finance department, communication etc. when this division is done, it requires the very department to have its software’s. Cloud computing is when a company anvils the technological services through services provider. In this case, a ‘cloud’ can be defined is a number of all possible hardwires, and computing application which are provided as a single package to an organization or a company.
  • 5. References Bishop, M. (2003). What is computer security? IEEE Security & Privacy, 1(1), 67-69. Chou, D., & Sengupta, S. (2008). Infrastructure and security. Practical Guide to Clinical Computing Systems: Design, Operations, and Infrastructure, 37. Radvanovsky, R. S., & McDougall, A. (2009). Critical infrastructure: homeland security and emergency preparedness. CRC Press Wallom, D., Turilli, M., Martin, A., Raun, A., Taylor, G., Hargreaves, N., & McMoran, A. (2011, November). MyTrustedCloud: Trusted cloud infrastructure for security- critical computation and data managment. In Cloud Computing Technology and Science (CloudCom), 2011 IEEE Third International Conference on (pp. 247-254). IEEE. Running head: INSTITUTIONAL CONFLICT 1 INSTITUTIONAL CONFLICT 4 Institutional Conflict Susan White Capella University
  • 6. Introduction Conflict is hardly avoidable especially when interaction is between two or more people, whether at home or workplace. In an institution, conflict is possible between a group and individual, two or more groups, or two or more individuals (Rahim, 2010). When an organization have to deal with a conflict, it is fundamental for an institution to ensure they address the issue other than the people. The following paper discusses more on institutional conflict. Explain why institutional conflict is significant. Why does it matter? Some of the various institutional conflict may occur when there is conflict of interest, unclear definition of responsibilities, lack of interpersonal relationship and resources. A conflict in most cases will have a negative connotation, but its effects may be negative and positive. Institutional conflict therefore significant as the management will have the chance to bring the members together (Blake & Mouton, 1984). Members get to work together to solve the conflict, therefore sharing their opinion. Learning from each other’s opinion helps in improvement of future communication.
  • 7. The above matters because it dictates the continuity of a business. Unsolved conflicts may bring about violence, decrease in company’s productivity, and some members leaving the organization. Solved conflicts on the other hand allows the management and members learn more about each (Lipsky & Seeber, 2006). Institutional Conflict Problems As discussed above, several issues as a result of any type of institutional conflict. The following examples are discussed herein: Employee turnover Members of an institution who are continually frustrated with the conflict level, may make up their mind to terminate their membership. This is normally detrimental when a member is a head of a committee or executive board which may end up compromising the organizational management (Gordon, 2005). Increased absenteeism Conflicts especially in an organization may get tiring. This is especially one is involved. One keeps avoiding his or her workplace as a way of avoiding reality on the ground. The workplace becomes boring a reason for one to continually be absent. Increased health claims Organizational conflicts may cause frustration to a member if they feel there is no solution on the way any time soon, or if the feeling is that their opinion is falling on deaf ears. As result, stress starts being evident, adversely affecting their personal and professional lives. The member may start experiencing headaches, overheating, loss of appetite, sleeping problems and finally they become unapproachable (Rahim & Bonoma, 1979). Conclusion Institutional conflicts are a thing that is just inevitable especially when people are living together. These conflicts are significant and should be handled professionally so that they
  • 8. don’t cause interruptions to the particular institution. As demonstrated above, if unresolved they have damaging effects to the individuals and the institution at large. References Blake, R. R., & Mouton, J. S. (1984). Solving costly organizational conflicts. Jossey-Bass Inc Pub. Gordon, D. I. (2005). Organizational Conflicts of Interest: A Growing Integrity Challenge. Pub. Cont. LJ, 35, 25. Lipsky, D. B., & Seeber, R. L. (2006). Managing organizational conflicts. The Sage Handbook of Conflict Communication. Thousand Oaks, CA: Sage Publications, 359-90. Putnam, L. L., & Wilson, C. E. (1982). Communicative strategies in organizational conflicts: Reliability and validity of a measurement scale. Annals of the International Communication Association, 6(1), 629-652. Rahim, M. A. (2010). Managing Conflict in Organizations. Transaction Publishers. Rahim, A., & Bonoma, T. V. (1979). Managing organizational conflict: A model for diagnosis and intervention. Psychological reports.
  • 11. + + + + + fl Print Conflict Resolution Scoring Guide Due Date: End of Unit 10. Percentage of Course Grade: 15%. Criteria Non-performance Basic Proficient Distinguished Identify variables within an institutional structure that may have contributed to a conflict. 12% Does not identify variables within an institutional structure that may have contributed to a conflict. Provides minimal information with little detail when identifying variables within an institutional structure that may have contributed to a conflict. Identifies variables within an institutional structure that may have contributed to a conflict. Analyzes variables within an organizational structure that may have contributed to a conflict; identifies assumptions on which the analysis is based. Describe how a conflict was resolved. 12% Does not describe how a conflict was resolved. Provides minimal information and little detail when describing how a conflict was resolved.
  • 12. Describes how a conflict was resolved. Analyzes how a conflict was resolved; evaluates the degree to which this conflict resolution was effective or ineffective. Illustrates the evaluation of this conflict resolution with specific details. Analyze a conflict situation. 12% Does not analyze a conflict situation. Provides minimal information and little detail when analyzing a conflict situation. Analyzes a conflict situation. Analyzes a conflict situation; identifies areas where additional information is needed to gain a more complete understanding. Evaluate the degree to which this conflict resolution was effective or ineffective. 12% Does not evaluate the degree to which this conflict resolution was effective or ineffective. Provides minimal information and little detail when evaluating the degree to which this conflict resolution was effective or ineffective. Evaluates the degree to which this conflict resolution was effective or ineffective. Evaluates the degree to which this conflict resolution was effective or ineffective; impartially considers conflicting evidence and other perspectives. Propose a detailed solution to a conflict. 13% Does not propose detailed solution to a conflict. Provides minimal information and little detail when proposing a detailed solution to a conflict. Proposes a detailed solution to a conflict. Proposes a detailed solution to a conflict; identifies criteria for evaluating the proposed solution. Incorporate conflict resolution readings into a conflict analysis. 13%
  • 13. Does not incorporate conflict resolution readings into a conflict analysis. Provides minimal information and little detail when incorporating conflict resolution readings into a conflict analysis. Incorporates conflict resolution readings into a conflict analysis. Integrates conflict resolution readings into a conflict analysis; justifies inclusion and applicability of those specific readings. Incorporate conflict resolution theory into a conflict analysis. 13% Does not incorporate resolution theory into a conflict analysis. Provides minimal information and little detail when incorporating conflict resolution theory into a conflict analysis. Incorporates conflict resolution theory into a conflict analysis. Integrates conflict resolution theory into a conflict analysis; justifies inclusion and applicability of that specific theory. Communicate effectively through writing. 13% Does not communicate effectively through writing. Ineffectively and inconsistently communicates through writing. Communicates effectively through writing. Communicates effectively through writing; writing reflects the quality and fluency expected of a professional. Running head: PROJECT INTRODUCTION 1 SECTION 1: PROJECT INTRODUCTION 2
  • 14. Section 1: Project Introduction Ramon O. Crespo Professor: Roy R. Creasey, Jr., Ph.D. Strayer University October 16, 2016 Section 1: Project Introduction Introduction a. Background information of the Company The company is known for its rampant role in the collection and analysis of data. The firm has been operational for a duration almost equalling 2 years and has a total of approximate 20 employees, where 4 have been delegated to the IT department. Due to the rampant growth that has been exhibited by the firm, pundits predict that it is going to experience a staggering 60% growth for the next one and a half year. The organization collects data by the help of the Web analytics and then combines it with the data obtained from the operation systems. Web analytics hold a significant role in majority of the marketing plans for the business and it involves measuring, collecting, analysing and then reporting the data collected from the website for the sake of development and optimization of usage of web. The firm is a very young one and hence is struggling to adopt to the limited technological infrastructure it has to keep it running. However regardless of this, the firm still anticipates to have the business expanded in the next half a year by having its operational activities moved from its current one floor to a spacious 3 floors. The company has all the information regarding its operations kept in the form of both hardware and software and stored on-site. b. The company’s business The firm works on web analytics and effective qualitative
  • 15. reportage. The software used by the firm enables it to have high quality, data collection that is very effective that starts in minutes without any necessity of additional programing (Aalst, et al. 2009). Therefore, whether it is a very big document, review or digital sets of data, the organization will be able to provide you with analytical services, which will off great help for you in acquiring answers that are simpler to ambiguous business queries. The firm is further able to collect native and email data from almost all the electronic sources, with the inclusion of the individual computers, storage devices for mobile media, backup tapes, networks belonging to the companies, and the mobile devices for personal use (Aalst, et al. 2009). This shows that the company is well equipped to manage almost all of the devices. c. The Current Outsourcing and offshoring activities. Globalization and an increase on the competition on the global standards have pushed the organization to incorporate a wider range of economical transfers and the process of exchanging goods and services, technical knowhow, personnel, and numerous other related intermediate activities that are part of the value chains for the global markets. When it comes outsourcing and offshoring, there is always a very close relationship amid the locations, motivational standards and the organizational strategy for the company (Warranty Data Collection and Analysis. 2011). Technological advancements will ultimately play great roles in reshaping this subject more in the organization. The main reason behind the organization resolving to the activities related to outsourcing and offshoring when it comes to knowledge is because the firm has an objective of cementing its competitive advantage. This will only be achieved through exploitation of the locally available talent and proficiency in the host economies. d. The skilled information personnel in position and their responsibilities The following are the duties and the responsibilities of the team
  • 16. that will ensure the fulfilment of the project. · The Senior Project Director i. The individual will be in charge of ensuring that the project is planned, directed and ensures a smooth running of the project. The individual will also be in charge of ensuring that the project deliverables and their functions are achieved as stated in the Charter of the project (Ward, et al. 2006). ii. He will also be in charge of ensuring that accountability is maintained when it comes to managing the resources for the project. · The Quality Manager and the Technical Lead i. Will ensure that both the proposed product and that the qualities of the process for the project are maintained. ii. Will manage every day’s activities for the project and that there is a good liaison with the project’s technical management. iii. Will ensure that the technical disciples regarding the project are maintained. iv. Will partner with the IT department to ensure that adequate technical assistance is accorded to the project handlers. v. Will be in charge of advising on the insight regarding the health of the project. vi. Will be available to offer leadership assistance to the technical staff throughout the life cycle of the project. vii. Will provide necessary assistance to the Senior Project Director in establishing the best technical policies, procedures and processes for the project. · Implementation and test lead Will be in-charge of: i. Managing the implementation phase of the project. ii. Providing leadership when it comes to implementation management by forming, synchronizing, scheduling, and closely overseeing the activities during implementation phase. iii. Directing the testing process of the newly created structure. iv. Will work with with the state and the federal departments to ensure that the test are carried out as provided for by the law.
  • 17. · Operation Lead Will be in charge of: i. Coordinating and supervising how the new system works e. The particular data collected by the company f. The information systems that is currently being used by the company: · Operational Systems and Databases Below are some of the operating systems and Databases that the organization has been using to help with its day to day activities. · Operating System They include: i. Microsoft.NET 2.0 Framework ii. ASP.NET 2.0 master pages, the gratified pages and Web Parts. iii. Windows Workflow Foundation. · Databases i. Business Request Data ii. Site custom data iii. InfoPath Forms Services · Analytics and Interfaces The most used analytic interface being used by the organization is the graphic interface. · Infrastructure and Security To ensure the security of the collected data, the firm has resolved to the use of the combination of both the technologies of the cloud computing and Software-as-as-a-Service (SaaS) Therefore, when the above outlined structure is thoroughly implemented by the organization, then the structures it will have initiated in place will be able to assist with holding the demand for the expansion that the business will come with. References Aalst, W., Joseph, M., Mylopoulos, J., Sadeh, N. M., Shaw, M. J., Szyperski, C., Gotel, O., ... Meyer-Stabley, B. (2009). Software Engineering Approaches for Offshore and Outsourced
  • 18. Development: Third International Conference, SEAFOOD 2009, Zurich, Switzerland, July 2-3, 2009. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg. Ward, P., & Dafoulas, G. (2006). Database management systems. London: Thomson. Warranty Data Collection and Analysis. (2011). London: Springer-Verlag London Limited. Running head: PROJECT PLAN 1 PROJECT PLAN 2 Section 2: Project Plan Ramon O. Crespo Professor: Roy R. Creasey, Jr., Ph.D. Strayer University October 16, 2016 Project Plan for the Organization Introduction The organization is proud to be able to review and enter into a partnership with its customers in goal of overhauling the
  • 19. company visibility. This visibility will be done in hopes to increase brand awareness while increasing the residential customer base and the industrial IT services. Through the improved visual appearance of the company assets the brand will become known for its appearance and with the known appearance will make changes within the organization. The graphics will provide information in regards to the company as well as local contacts and the company website. With that, the organization will strive to increase its quality of field service as well as improve the quality of the customer service through face to face interactions as well as online and telephone interactions. To ensure maximum satisfaction of the organization’s customers, the following Project Implementation plan has been drafted to assist with ensuring that the project is smoothly and comprehensively carried out. The refurnishing process of the organization’s IT department is a very huge project that the organization would like to capitalize on greatly. 1. The IT Plan The IT department holds a vital role in the process of realization of the project. The organization understands this with a very strong implication. This is why the firm has taken necessary steps to ensure that the IT plan developed has a close association with its Business Plan. This Organization’s IT plan will help in achieving the successes of the project by making sure that the best IT personnel that bear recommended qualifications are brought on board. If put to use according to plan, the plan will prove to be a great tool in assisting with controlling the activities of the IT department throughout the whole process. Roles and responsibilities of Team Members of the Project The list provided below outlines the duties and the obligations of the Organization’s project team. · The Senior Project Director · In charge of planning directing and overseeing the project, and making that the project deliverables and its functionality are realized.
  • 20. · Ensures that there is maintenance of accountability when it comes to managing all of the resources being used in the project. · Acts an intermediary with between the project and its sponsors. · The Quality Manager · In charge of managing the quality of the product and the process involved in the project. · Ensures that the traceability matrix of the requirements is maintained. · In charge of providing insight into the health of the project. · The Roles and the duties of: · The Technical Lead have been clearly outlined. · The Implementation Lead. · The Application Support Lead. · The Test Lead have been properly and thoroughly outlined. · The Configuration Lead and, · The Operations Lead have all been clearly outlined on the Human Resource Plan. Project Organizational Charts The graphic structure below, derived from DMOZ - Regional: North America: United States: Tennessee: Guides and Directories. (2016), is a representation of the reporting hierarchy for the project. The chart below, derived from DMOZ - Regional: North America: United States: Tennessee: Guides and Directories. (2016), shows the existing association of the tasks for the project and the members of the team. All of the changes that are proposed to the responsibilities of the project must receive a direct approval from the office of the Project Manager. Proposal of change will only occur with a basis to the control process of change for the project. When the change is made, all of the documents for the project will be updated and then redeployed in accordance with the procedures. Roles
  • 21. Infrastructure Preparation Requirements Gathering Design Configuration Development Implementation Software Testing Conduct Training Stakeholder Communication Management Senior Project Director A A R R C C I Quality Manager A R C C I Technical Lead A R Implementation Lead I A
  • 22. R C I I Application Support Lead A C R I I Test Lead A C R C C I Configuration Lead R A R C I Operation Lead C
  • 23. C Project Sponsor C C C I I I I Steering Committee I I I I C C A IV& V C C C C C I I Agency Subject Matter Experts R I C Key: R – Responsible for completing the work
  • 24. A – Accountable for ensuring task completion/sign off C – Consulted before any decisions are made I – Informed of when an action/decision has been made Staffing Management Plan The Staffing Management Plan helps with formalization of the processes that are used in managing the project. This plan positions itself with the available processes like refurbishment, Cultural and People policies, the policies for the supply chain, and the collective agreements that have been continuously applied by Organization for its staffing (Water Research Foundation, September 1, 2011). During the resources planning, there is significance in considering the resources that are commonly used in the project and the ones from the external environment. The Staffing Management Plan will aim to provide a solution to the required resources to offer support to the program through the life cycle of the project. However, it is of significance to note that the details contained in the plan will only be for the foreseeable future and will be updated with a continuation of realization of the process. When it comes to the staffing of the project and the resources, the requirements will vary with time as the project progresses. This document will be subjected to continuous updates as deemed necessary for the phases that are to come. Staff will be required to report directly to the organizational headquarters. The staff that will be taken to work for this project will be split into three main categories. There will be some employed on a full-time, provisional, or rotational obligations. Finally, purchased services contracts from the external that includes Amplified Staff, particular, and accomplished task contracts will help greatly in bringing in new staff in the course of realizing the project (Project Management Institute, 2004). All of the details relating to the staff and the, to be used resources will be developed and safely stored in the Projects Business Plan, which is a section of the Organization Business Plan. The duties of the staff and the planning of the resources will be put purely on the shoulders of the Project Manager, the
  • 25. top most ranking Vice-President, IT managers and the HR manager. All of the members at the Organization will be held accountable for sake of planning of the resources and identifying the needs of the staff during the process of planning. 2. Quality Management Plan The activities related to quality assurance and control are of great significance to the mission of organization. The realization of the strategic goals for the organization is on a basis on research products of high quality that the customers and the public in general can be glad to see branded on the offices. The organization has a policy that the quality program is aligned to its mission and the goals of strategic research. The Executive Director and the firms Director, Subscribers and the Research Services have been mandated with the duty of seeing to it that the resources related to personnel and finances are allocated in the best way possible for the sake of development and operation of the programs and processes related to quality (Water Research Foundation, September 1, 2011). When it comes to the management of the organization, the focus has been solemnly put on ensuring that the goals of the process is achieved so that the mission and vision of the organization are achieved. The quality program is inclusive of the team members who have basic duties of making the processes, ensuring that their effectiveness, and overseeing the actions that will make an improvement in the manner in which the organization manages quality during and after the project. The positions held by individuals who help with ensuring quality include; the Board of Trustees, the Focus Area Council, the Executive Director, the Quality Assurance Manager, The Director of the Services related to Subscription and Research, the Committee in charge of Project Advisory, Finance and Administration Director, the Contracts Administrators and the Project Coordinators (Water Research Foundation, September 1, 2011). With the help of the above named individuals and the outlined
  • 26. plan, the quality of the project as a whole is expected to be of a very high quality that will satisfy the needs of the Customers. Procurement Management Plan The objective and goals of this Procurement Management Plan is to help the Contacting Authorities and the Technical Authorities at Organization: · Adhere to the provisions of the government regarding the whole process. · Carry out the whole process of contracting in ways that can test the scrutiny from the stakeholders when it comes to matters relating to judiciousness and integrity, facilitation of access, foster competitiveness, and reflect fairness when it comes to spending the organizational funds (Project Management Institute, 2004). · Ensure that the Contract Regulations outlined by the Government are applied at all times (Project Management Institute. (2004). · Be able to mitigate the associated risks and liability. References DMOZ - Regional: North America: United States: Tennessee: Guides and Directories. (2016). Dmoz.org. Retrieved 12 October 2016, from http://www.dmoz.org/Regional/North_America/United_States/T ennessee/Guides_and_Directories http://www.opg.com/about/regulatory-affairs/Documents/2014- 2015/D2-02-01_Attachment%204-08.pdf Project Management Institute. (2004). A guide to the project
  • 27. management body of knowledge (PMBOK guide). Newtown Square, PA: Project Management Institute. Water Research Foundation, (September 1, 2011). Retrieved on 10th Oct/2016 from http://www.waterrf.org/funding/Policies/QualityManagementPla n.pdf Senior Project Director Operations Lead Quality Manager Implementation Lead Configuration Lead Test Lead Technical Lead Application Support Lead Running head: Assignment 4 1 Section 1: Design Document 6
  • 28. Business Analytics Ramon O. Crespo Professor: Roy R. Creasey, Jr., Ph.D. Strayer University Nobember 21, 2016 Executive Summary Business intelligence is one of the best technique businesses can use to get functional intelligence from data. Through this, businesses can provide required information to people of their interest at any given time and via correct channels which in turn can help to create a competitive gain by well-informed decision making. Almost all businesses have a huge amount of information that is available as structured data. Based on their functional activities within the business, this information has accumulated over time. Therefore, the old-style method may not be able to utilize the late opportunities provided by this massive data fully. In that case, the use of business intelligence system has made work easier by consolidating, analyzing, store and retrieve accumulated amount of data. This can be achieved by techniques such as business analytics. The paper will focus on a preview of business analytics by defining this into depth term and, also providing its capabilities along with how it is utilized by business enterprises to gain a competitive advantage over their competitors. According to Stubbs, business analytic is a practice of iterative methodological examination of a business data with prominence on statistical analysis.Business Analytics is mainly used by companies devoted to data-driven decision making.The use of business analytic enables the organization to improve their business by ensuring optimized decision along with the use of methods employed in statistics that involve data gathering and
  • 29. analysis (Stubbs, 2013). By the use of business analytics, the enterprise could realize the reaction of the products or service from the external environment such as customers, regions among others. This will enable them to add features or vary the product or service based on their customer's demand. The data for the product is important to any new product line with structures since this can be used to improve sales in a certain target population. However, the idea of business analytic is in most cases utilized by people involved in marketing. Marketers apply this technique to predict and analyze customer's behavior. Therefore, statistical techniques are applied based on historical data for consumer's transactions. Therefore, information and statistics is the key aspect of business analytics in the organization. What a company can do with Business Analytics (BA) Business analytic make use of statistical techniques on past business performance to improve the new business insight and initiative business planning. It also involves the use of practices, skills and application along with some technologies. The key concepts that always investigated from business analytics are the information questions like what took place for the last few years based on sales in a certain region. Also, the analysis involves what might be taking place then in a certain place and what might be their predictive performance. Based on these questions, critical understanding must be enhanced to answer the questions in a more advanced manner. Therefore, the only solution to such questions is by use of mathematical modeling and experimental designs. Besides, from focusing on these questions, the answers will always provide the next best action to be taken. The forecast analysis is the best to decide the steps that the business can use to either improve the sales of a specific product or change the variation of a product or service. Business analytics always focus on more perceptive answers to questions the organization may require. This includes the perspectives to stay competitive within their business line. The analysis helps to make proper
  • 30. decisions which will reduce jeopardize in decision-making (Rajiv Sabherwal, 2011). Today, the use of business analytics is applicable in almost all the business in predicting their customer's behavior, the price range of the product, in logistics along with determining best transportation routes. Also, the business may employ business analytic in supply chain operation and in finding the crucial factors that influence the organization performance, investments, risk management, issuing credit cards and maximizing sales. Environmental requirements for Business Analytics (BA) For Business Analytics (BA) be utilized fully it requires some elements to be available. Most important is to identify which features the process are allied to satisfy and value the standpoint of the consumer. Business Analytics (BA) can be performed in presence of the following components; · Data: this deals with data quality and data sufficiency requirements for analytics process. Enough data should be present for modeling, testing and experimenting as analytics demands. This additionally calls for management and technology used in the whole Business Analytic process. · Enterprise: Effective Business Analytics requires an enterprise view point. In the absence of Enterprise, Business Analytics initiatives may be confined, and it will be difficult to draw any important benefits at the enterprise level. · Leadership: Business Analytics (BA) requires capable and cross-functional leaders who have strong executive management support. The management emphasis more than just one project. The leadership will strive to bring Business Analytics (BA) based culture in the business environment. · Targets: These are metrics to track these outcomes of analytics projects. The metrics can be consumer loyalty, hiring better corresponding to skill set requirements, increased performance in the supply chain, and better quantitative risk leadership. · Analysts: they must pose high expert capabilities to build the
  • 31. models and arrive at the results. The figure below shows a data flow diagram in Business analytics and cloud computing environment. Conclusion To sum up, for any business organization to succeed in the present world market, Business analytics technique is the stepping stone. I recommend the use of analyses reports made from business analytic to improve the organization’s management team to make insightful decisions for business success. References Brijs, B. (2016). Business Analysis for Business Intelligence. Boca Raton, Florida: CRC Press. Rajiv Sabherwal, . B.-F. (2011). Business Intelligence: Practices, Technologies, and Management. Hoboken, New Jersey: John Wiley & Sons. Stubbs, E. (2013). Delivering Business Analytics: Practical Guidelines for Best Practice. Hoboken, New Jersey: John Wiley & Sons. Operational Data Warehouse Enterprise Data Warehouse Big Data Application Development Environment User Vertical Application Analytics Library SALES
  • 33. Q u e u e Research and Development Running head: PROJECT INCEPTION 1 PROJECT INCEPTION 2 Project Inception Ramon O. Crespo Professor: Roy R. Creasey, Jr., Ph.D. Strayer University October 30, 2016
  • 34. Project Inception Having the best information system is always the best desire of any kind of an organization. The urge is more when the organization in picture is concerned with the collection and analysis of data. Hence, ensuring that the quality requirements documents is completed is something that is important to ensure that the needs of the user are taken into consideration and that there is a consideration of their expectations. This due to the fact that it will enable proper designing of the information systems and the organizational infrastructure. There is no necessity of having to outsource any kind of manpower or technologically advanced equipment because the organization has some of the best equipment and machines to help with the due process. To ensure that the expected 20% expansion rate that is expected for the next coming years does not catch the organization by a surprise, the following project have been initiated to help in the due process. In the bid to have the information systems docket for the organization renovated, the following practises will be of significance. The first action that is undertaken is to ensure that the security of the whole system is fostered in the best way possible. · The organization will make use of a centralized system of storage of information to help with fostering an adequate relationship and integration between systems and infrastructure, data and Warehousing, analytics, interfaces and cloud technology. · The data collected will be stored and kept in fireproof rooms. Further, the organization will be reinforced with ultramodern security surveillance that will be helpful in ensuring that the data in it stays safe and that any given breach of data will be taken with the most seriousness it deserves (Garton, & McCulloch, 2012). · All of the data in the organization will have secondary storage systems at offsite locations.
  • 35. · All of the organizational computer systems will be decentralized to help with easy monitoring of the activities of the employees when using the organizational computer systems. · Coastally upgrading of the software being used by the computer systems for the organization. This will be of very great significance in fostering the security of IT equipment and prevent any cases of malware infection. The following are some of the notable functions that the IT docket will be in charge of: · The IT department will be in charge of developing the developmental requirements of the project in conjunction with the other departmental, entities of the organization. · The IT department will engage in necessary advancements that will provide support for needs of the organization regarding the management of the information it has and the data collected (Mazzeo, Bellini., Motta, & IFIP World Computer Congress. 2008). · The implementation of the plan for the IT department is an independent process that strongly depends on the way other dockets manages the information at their disposal. · The implementation window for the system has undergone complete compressing hence testing of the new IT system have to be carried out in a very short duration, with no ample time (Young, 2006). · All of the employees in the IT department will constantly be taken through training exercises to equip them with the best practises of determining any malicious activities on the organization’s website. This will help in quick detection and response to any kind of danger.
  • 36. With this in place, the organization anticipates to experience the best smooth incorporation of the expansion to assist with technological advancements in the industry. Being the leading data collection and analysis firm is the goal of the organization. References Garton, C., & McCulloch, E. (2012). Fundamentals of technology project management. Boise: MC Press Online. Mazzeo, A., Bellini, R., Motta, G., & IFIP World Computer Congress. (2008). E-government, ICT professionalism and competencies, service science: IFIP 20th World Computer Congress, Industry-Oriented Conferences, September 7-10, 2008, Milano, Italy. New York: Springer. Young, R. R. (2006). Project requirements: A guide to best practices. Vienna, Va: Management Concepts. Running head:ASSIGNMENT 2 1 BUSINESS REQUIREMENTS 6 Business Requirements Ramon O. Crespo Professor: Roy R. Creasey, Jr., Ph.D. Strayer University October 30, 2016 Business Requirements
  • 37. Project Overview There is a lot of significance in ensuring that the quality of business requirements are procured. This will help in ensuring that the organizational information systems remain one of quality. Therefore, ensuring that the quality requirements documents is completed is something that is important to ensure that the needs of the user are taken into consideration and that there is a consideration of their expectations (Garton, & McCulloch, 2012). This due to the fact that it will enable proper designing of the information systems and the organizational infrastructure. Therefore, after the 2 years of being operational, the organization which is based on data collection and its subsequent analysis has the obligation of creating the best repository for the data it collects that spans beyond the standardly recognized data bases. Due to the 20% expansion of the data warehouse on annually basis, the following project requirement document will be essential to help cater for the ever increasing necessity and urgency of requiring storage space. The Scope of the Project This document will provide an address to the requirements to the renovation of the organization’s information systems. This is propelled by the necessity of having the best storage space that will ensure that the data belonging to the organization are stored in the safest place available and that they are kept up to date at all times. This is due to the rampant yearly expansion of the data warehouse. The business requirements for the It department includes the identification, certification and management of the information that flows through the stream of the organization in the best way possible and to ensure that they are safely stored away from the access of the malicious individuals who might want to illegally access the contents of the organizational data (Young, 2006). The business requirements outlined in this document will be strongly expected to be enacted by the management at the IT department and other supporting departments like the finance docket that
  • 38. handles very sensitive information regarding the operations being conducted by the organization. Controlling the Project Scope All of the specified requirements within their documents will be keenly and thoroughly traced to the recommended deliverables in the organization to ensure that all of the provisions undergo proper implementation and testing. To have an adequate maintenance of a trace to all the requirements for the whole life cycle of the project, the use of the rational project set will be in order. The reports that will be extracted from the Rational will be made as part of this document’s appendix to ensure a provision of updated snapshot of the repository of the requirements that covers the management of the plan being used. Identification of the possible risks, the constraints, and the assumptions Assumptions The list provided below are some of the assumptions that played key part on the identification and subsequent development of the outlined requirements in this document. The assumptions are aimed at fostering a mutual understanding, quality communication, and partnership among the stakeholders of the project. 1. The IT department will be in charge of developing the developmental requirements of the project in conjunction with the other departmental, entities of the organization. 2. The IT department will engage in necessary advancements that will provide support for needs of the organization regarding the management of the information it has and the data collected. 3. The organization will enhance its current internal systems and the existing processes to help with aligning them to adhere to the requirements of the network directory provider and the best requirements of data that the overall organizational plan has. Constraints
  • 39. The list provided below shows the encountered constraints that worked to oppose the realization of the requirements of the project. The constraints of the project are the factors that works against realization of the projects or those that tend to limit realizing the results that are desired (like the satisfying requirements, meeting the goals of the project, and achieving the success measures for the project) as this document states. 1. All of the functionality of the management plan to the organization must be kept operation at all times so as to help with the yearly expansion that is expected to stand at 20% (Mazzeo, Bellini, Motta, & IFIP World Computer Congress. 2008). To ensure that this deadline is met on a constant basis, adequate plans must be certified and approved by the top management at the firm. Risks The list provided below are some of the recognizable risks that are associated with the realization of the project. The risks have the ability of creating issues that may intern cause uncertain effects on the ongoing project hence making the realization of the results to be in jeopardy. They include: 1. The implementation of the plan for the IT department is an independent process that strongly depends on the way other dockets manages the information at their disposal. 2. The implementation window for the system has undergone complete compressing hence testing of the new IT system have to be carried out in a very short duration, with no ample time. 3. The stakeholders will have reduced amount of time to prepare the plans they have for the organization and to have the very plans incorporated into the mainstream of the organizational information system. The organization uses a centralized system of storage of information to help with fostering an adequate relationship and integration between systems and infrastructure, data and Warehousing, analytics, interfaces and cloud technology. All of the data collected will be stored and kept in fireproof rooms. Further, the organization will be reinforced with ultramodern
  • 40. security surveillance that will be helpful in ensuring that the data in it stays safe and that any given breach of data will be taken with the most seriousness it deserves (Films for the Humanities & Sciences (Firm), Films Media Group., & Video Education Australasia. 2011). Further, all of the computer systems in the organization will be decentralized to help with easy monitoring of the activities of the employees when using the organizational computer systems. The Potential Outsourcing or Offshoring Needs Based on the current technologically advanced systems that the organization uses, there will be no need of outsourcing any further facilities. Instead, the available ones will be constantly upgraded to ensure that they stay at par and offer protection against any malicious acts by the hackers. With this, the organization’s data will be strong and be able to detect and act on any kind of malware sent to it by third party individual. References Films for the Humanities & Sciences (Firm), Films Media Group., & Video Education Australasia. (2011). ICT Project Management. New York, N.Y: Films Media Group. Garton, C., & McCulloch, E. (2012). Fundamentals of technology project management. Boise: MC Press Online. Mazzeo, A., Bellini, R., Motta, G., & IFIP World Computer Congress. (2008). E-government, ICT professionalism and competencies, service science: IFIP 20th World Computer Congress, Industry-Oriented Conferences, September 7-10, 2008, Milano, Italy. New York: Springer. Young, R. R. (2006). Project requirements: A guide to best practices. Vienna, Va: Management Concepts.