Running Head: Assignment 5 1
INFRASTRUCTURE AND SECURITY 6
Infrastructure and Security
Ramon O. Crespo
Professor: Roy R. Creasey, Jr., Ph.D.
Strayer University
November 29, 2016
Infrastructure Document
For a company with potential for expansion, the company may be required to integrate their infrastructure to ensure solutions to certain problems are considered. There the company may need to develop infrastructure which contains reliable and effective security protocols. Therefore, to ensure the best network is developed, it means stability, speed and reliability are the major factors that should be considered. On the other hand, the network should be able to ease operations conducted in an organization. In this reference, various aspects like gateways, routers etc should be considered when setting up workstations. (Chou, D., & Sengupta, S. 2008).
There has been the technological advancement and due to this reason technology based infrastructure has been innovated. They have been created and used to partially match the modern world. Cyberspace or the network can be considered to be of much value in terms of information and money. Alternatively, it has lead to extended personal and organizations and reactions. For example, in this case, is that network has become the center of many systems which are used to control and manage infrastructure. I.e. those used in banking, energy delivery etc. therefore networks are the underlying technological that will transform the society on basis of information.
Cyberspace is also very sensitive due to the following failure. Their failure can result due to their complex nature, accident, or hostile intent. Therefore, bad things can happen to the network itself or the infrastructure itself due to this reason when designing a network the design plan needs to consider these aspects. In this regard, bad things can mean delay, damage or disconnect. Their when designing a network the design need to consider this element that may prevent the development of a well-integrated network. These attics are quite common in day to day basis and therefore a network design for a company that is that is expanding should be well implemented to as much as possible to minimize such incidences.
Networks are under threats which are more extensive with respect to the value of infrastructure itself. The design should also consider strategic defense options. Networks are faced with possible disruption and this may have substantive consequences to the economy. Therefore, networks infrastructure should be developed in such a way to prevent potential attackers. For the network to be efficient, it must be highly protected to prevent unauthorized network access. For example, hackers can cause destruction to an organization data. This may affect company productivity. (Radvanovsky, R. S., & McDougall, A. 2009).
Due to the evolution of computer various assumptions have been developed. For example, in this case, is a moder ...
Interactive Powerpoint_How to Master effective communication
Running Head Assignment 5 1INFRASTRUCTURE AND SECURITY6.docx
1. Running Head: Assignment 5 1
INFRASTRUCTURE AND SECURITY 6
Infrastructure and Security
Ramon O. Crespo
Professor: Roy R. Creasey, Jr., Ph.D.
Strayer University
November 29, 2016
Infrastructure Document
For a company with potential for expansion, the company may
be required to integrate their infrastructure to ensure solutions
to certain problems are considered. There the company may
need to develop infrastructure which contains reliable and
effective security protocols. Therefore, to ensure the best
network is developed, it means stability, speed and reliability
2. are the major factors that should be considered. On the other
hand, the network should be able to ease operations conducted
in an organization. In this reference, various aspects like
gateways, routers etc should be considered when setting up
workstations. (Chou, D., & Sengupta, S. 2008).
There has been the technological advancement and due to this
reason technology based infrastructure has been innovated.
They have been created and used to partially match the modern
world. Cyberspace or the network can be considered to be of
much value in terms of information and money. Alternatively, it
has lead to extended personal and organizations and reactions.
For example, in this case, is that network has become the center
of many systems which are used to control and manage
infrastructure. I.e. those used in banking, energy delivery etc.
therefore networks are the underlying technological that will
transform the society on basis of information.
Cyberspace is also very sensitive due to the following failure.
Their failure can result due to their complex nature, accident, or
hostile intent. Therefore, bad things can happen to the network
itself or the infrastructure itself due to this reason when
designing a network the design plan needs to consider these
aspects. In this regard, bad things can mean delay, damage or
disconnect. Their when designing a network the design need to
consider this element that may prevent the development of a
well-integrated network. These attics are quite common in day
to day basis and therefore a network design for a company that
is that is expanding should be well implemented to as much as
possible to minimize such incidences.
Networks are under threats which are more extensive with
respect to the value of infrastructure itself. The design should
also consider strategic defense options. Networks are faced with
possible disruption and this may have substantive consequences
to the economy. Therefore, networks infrastructure should be
developed in such a way to prevent potential attackers. For the
network to be efficient, it must be highly protected to prevent
unauthorized network access. For example, hackers can cause
3. destruction to an organization data. This may affect company
productivity. (Radvanovsky, R. S., & McDougall, A. 2009).
Due to the evolution of computer various assumptions have
been developed. For example, in this case, is a modern
computer which is very spacious, and runs universal protocols.
There they are open to access and due to this reason hackers or
people with bad intention can get in touch to them. To provide
adequate protection of network resources three things are
essential to consider. Confidentiality basically means that only
an authorized person can view a particular data. On the other
hand, the system should encompass integrity. This means that
only authorized users can change particular information. It
should also be possible to detect the authenticity of the data.
In a company that is growing, infrastructure and security
network is another adamant aspect that a designer should
consider. Therefore, they should be aware of possible threats
that at any particular moment could compromise the security.
The main objective of installing a network system is to ensure
the operations of an organization run smoothly. However, cost
factor is an important factor that a designer may need to
consider. An asset is anything of value to an organization.
Therefore, the company should ensure the network is secure.
Hackers are always on the headlines however many
organizations have taken the responsibility of preventing such
risks; therefore, the design should consist of all these
vulnerabilities and the way to handle them. An example is a
vulnerability which is a weakness in a design which is at higher
risk of threat. They are sometimes found in protocols and they
can also be found in applications themselves.
For a company, which is expanding, it is essential for
employees to be safe. For example, in the case of fire in the
building, there should be systems in place that notifies the
personnel in that particular building. Therefore, by effective
physical integration, it is possible to manage and maintain
access. Alternatively, being able to automate an organization
processes it become easier to transfer information between
4. systems and the staff. Therefore, integration of an effective
network create operational efficiencies, reduces risk and it also
improves risk man agent.
The company has chosen various ways of enhancing
infrastructure. The internet technology is changing so rapidly
and therefore any company that remains behind may be forced
out of the market. Therefore, due to this reason business must
keep up with the current trend. Availability of technology is not
so much important is it is not used to make the best out of it. In
the present day, computing has become the background of
network infrastructure in much organization. The reason as to
why a company could be having a big budget in installing
computing system is definitely; because this reason covers the
need of cloud computing in an organization. (Bishop, M. 2003).
Computing needs require regular maintenance and expertise to
handle the network system. Due to company growth relative to
technology has become very complex. Therefore, due to this
complex computing system, it is important to have a company
divided into the various department, i.e. finance department,
communication etc. when this division is done, it requires the
very department to have its software’s. Cloud computing is
when a company anvils the technological services through
services provider. In this case, a ‘cloud’ can be defined is a
number of all possible hardwires, and computing application
which are provided as a single package to an organization or a
company.
5. References
Bishop, M. (2003). What is computer security? IEEE Security &
Privacy, 1(1), 67-69.
Chou, D., & Sengupta, S. (2008). Infrastructure and security.
Practical Guide to Clinical Computing Systems: Design,
Operations, and Infrastructure, 37.
Radvanovsky, R. S., & McDougall, A. (2009). Critical
infrastructure: homeland security and emergency preparedness.
CRC Press
Wallom, D., Turilli, M., Martin, A., Raun, A., Taylor, G.,
Hargreaves, N., & McMoran, A. (2011, November).
MyTrustedCloud: Trusted cloud infrastructure for security-
critical computation and data managment. In Cloud Computing
Technology and Science (CloudCom), 2011 IEEE Third
International Conference on (pp. 247-254). IEEE.
Running head: INSTITUTIONAL CONFLICT 1
INSTITUTIONAL CONFLICT 4
Institutional Conflict
Susan White
Capella University
6. Introduction
Conflict is hardly avoidable especially when interaction is
between two or more people, whether at home or workplace. In
an institution, conflict is possible between a group and
individual, two or more groups, or two or more individuals
(Rahim, 2010). When an organization have to deal with a
conflict, it is fundamental for an institution to ensure they
address the issue other than the people. The following paper
discusses more on institutional conflict.
Explain why institutional conflict is significant. Why does it
matter?
Some of the various institutional conflict may occur when there
is conflict of interest, unclear definition of responsibilities, lack
of interpersonal relationship and resources. A conflict in most
cases will have a negative connotation, but its effects may be
negative and positive. Institutional conflict therefore significant
as the management will have the chance to bring the members
together (Blake & Mouton, 1984). Members get to work
together to solve the conflict, therefore sharing their opinion.
Learning from each other’s opinion helps in improvement of
future communication.
7. The above matters because it dictates the continuity of a
business. Unsolved conflicts may bring about violence, decrease
in company’s productivity, and some members leaving the
organization. Solved conflicts on the other hand allows the
management and members learn more about each (Lipsky &
Seeber, 2006).
Institutional Conflict Problems
As discussed above, several issues as a result of any type of
institutional conflict. The following examples are discussed
herein:
Employee turnover
Members of an institution who are continually frustrated with
the conflict level, may make up their mind to terminate their
membership. This is normally detrimental when a member is a
head of a committee or executive board which may end up
compromising the organizational management (Gordon, 2005).
Increased absenteeism
Conflicts especially in an organization may get tiring. This is
especially one is involved. One keeps avoiding his or her
workplace as a way of avoiding reality on the ground. The
workplace becomes boring a reason for one to continually be
absent.
Increased health claims
Organizational conflicts may cause frustration to a member if
they feel there is no solution on the way any time soon, or if the
feeling is that their opinion is falling on deaf ears. As result,
stress starts being evident, adversely affecting their personal
and professional lives. The member may start experiencing
headaches, overheating, loss of appetite, sleeping problems and
finally they become unapproachable (Rahim & Bonoma, 1979).
Conclusion
Institutional conflicts are a thing that is just inevitable
especially when people are living together. These conflicts are
significant and should be handled professionally so that they
8. don’t cause interruptions to the particular institution. As
demonstrated above, if unresolved they have damaging effects
to the individuals and the institution at large.
References
Blake, R. R., & Mouton, J. S. (1984). Solving costly
organizational conflicts. Jossey-Bass Inc
Pub.
Gordon, D. I. (2005). Organizational Conflicts of Interest: A
Growing Integrity Challenge.
Pub. Cont. LJ, 35, 25.
Lipsky, D. B., & Seeber, R. L. (2006). Managing organizational
conflicts. The Sage
Handbook of Conflict Communication. Thousand Oaks, CA:
Sage Publications, 359-90.
Putnam, L. L., & Wilson, C. E. (1982). Communicative
strategies in organizational conflicts:
Reliability and validity of a measurement scale. Annals of the
International Communication Association, 6(1), 629-652.
Rahim, M. A. (2010). Managing Conflict in Organizations.
Transaction Publishers.
Rahim, A., & Bonoma, T. V. (1979). Managing organizational
conflict: A model for
diagnosis and intervention. Psychological reports.
11. + + +
+ +
fl
Print
Conflict Resolution Scoring Guide
Due Date: End of Unit 10.
Percentage of Course Grade: 15%.
Criteria
Non-performance
Basic
Proficient
Distinguished
Identify variables within an institutional structure that may have
contributed to a conflict.
12%
Does not identify variables within an institutional structure that
may have contributed to a conflict.
Provides minimal information with little detail when identifying
variables within an institutional structure that may have
contributed to a conflict.
Identifies variables within an institutional structure that may
have contributed to a conflict.
Analyzes variables within an organizational structure that may
have contributed to a conflict; identifies assumptions on which
the analysis is based.
Describe how a conflict was resolved.
12%
Does not describe how a conflict was resolved.
Provides minimal information and little detail when describing
how a conflict was resolved.
12. Describes how a conflict was resolved.
Analyzes how a conflict was resolved; evaluates the degree to
which this conflict resolution was effective or ineffective.
Illustrates the evaluation of this conflict resolution with specific
details.
Analyze a conflict situation.
12%
Does not analyze a conflict situation.
Provides minimal information and little detail when analyzing a
conflict situation.
Analyzes a conflict situation.
Analyzes a conflict situation; identifies areas where additional
information is needed to gain a more complete understanding.
Evaluate the degree to which this conflict resolution was
effective or ineffective.
12%
Does not evaluate the degree to which this conflict resolution
was effective or ineffective.
Provides minimal information and little detail when evaluating
the degree to which this conflict resolution was effective or
ineffective.
Evaluates the degree to which this conflict resolution was
effective or ineffective.
Evaluates the degree to which this conflict resolution was
effective or ineffective; impartially considers conflicting
evidence and other perspectives.
Propose a detailed solution to a conflict.
13%
Does not propose detailed solution to a conflict.
Provides minimal information and little detail when proposing a
detailed solution to a conflict.
Proposes a detailed solution to a conflict.
Proposes a detailed solution to a conflict; identifies criteria for
evaluating the proposed solution.
Incorporate conflict resolution readings into a conflict analysis.
13%
13. Does not incorporate conflict resolution readings into a conflict
analysis.
Provides minimal information and little detail when
incorporating conflict resolution readings into a conflict
analysis.
Incorporates conflict resolution readings into a conflict
analysis.
Integrates conflict resolution readings into a conflict analysis;
justifies inclusion and applicability of those specific readings.
Incorporate conflict resolution theory into a conflict analysis.
13%
Does not incorporate resolution theory into a conflict analysis.
Provides minimal information and little detail when
incorporating conflict resolution theory into a conflict analysis.
Incorporates conflict resolution theory into a conflict analysis.
Integrates conflict resolution theory into a conflict analysis;
justifies inclusion and applicability of that specific theory.
Communicate effectively through writing.
13%
Does not communicate effectively through writing.
Ineffectively and inconsistently communicates through writing.
Communicates effectively through writing.
Communicates effectively through writing; writing reflects the
quality and fluency expected of a professional.
Running head: PROJECT INTRODUCTION 1
SECTION 1: PROJECT INTRODUCTION
2
14. Section 1: Project Introduction
Ramon O. Crespo
Professor: Roy R. Creasey, Jr., Ph.D.
Strayer University
October 16, 2016
Section 1: Project Introduction
Introduction
a. Background information of the Company
The company is known for its rampant role in the collection and
analysis of data. The firm has been operational for a duration
almost equalling 2 years and has a total of approximate 20
employees, where 4 have been delegated to the IT department.
Due to the rampant growth that has been exhibited by the firm,
pundits predict that it is going to experience a staggering 60%
growth for the next one and a half year. The organization
collects data by the help of the Web analytics and then
combines it with the data obtained from the operation systems.
Web analytics hold a significant role in majority of the
marketing plans for the business and it involves measuring,
collecting, analysing and then reporting the data collected from
the website for the sake of development and optimization of
usage of web.
The firm is a very young one and hence is struggling to adopt to
the limited technological infrastructure it has to keep it running.
However regardless of this, the firm still anticipates to have the
business expanded in the next half a year by having its
operational activities moved from its current one floor to a
spacious 3 floors. The company has all the information
regarding its operations kept in the form of both hardware and
software and stored on-site.
b. The company’s business
The firm works on web analytics and effective qualitative
15. reportage. The software used by the firm enables it to have high
quality, data collection that is very effective that starts in
minutes without any necessity of additional programing (Aalst,
et al. 2009). Therefore, whether it is a very big document,
review or digital sets of data, the organization will be able to
provide you with analytical services, which will off great help
for you in acquiring answers that are simpler to ambiguous
business queries. The firm is further able to collect native and
email data from almost all the electronic sources, with the
inclusion of the individual computers, storage devices for
mobile media, backup tapes, networks belonging to the
companies, and the mobile devices for personal use (Aalst, et al.
2009). This shows that the company is well equipped to manage
almost all of the devices.
c. The Current Outsourcing and offshoring activities.
Globalization and an increase on the competition on the global
standards have pushed the organization to incorporate a wider
range of economical transfers and the process of exchanging
goods and services, technical knowhow, personnel, and
numerous other related intermediate activities that are part of
the value chains for the global markets. When it comes
outsourcing and offshoring, there is always a very close
relationship amid the locations, motivational standards and the
organizational strategy for the company (Warranty Data
Collection and Analysis. 2011). Technological advancements
will ultimately play great roles in reshaping this subject more in
the organization.
The main reason behind the organization resolving to the
activities related to outsourcing and offshoring when it comes to
knowledge is because the firm has an objective of cementing its
competitive advantage. This will only be achieved through
exploitation of the locally available talent and proficiency in
the host economies.
d. The skilled information personnel in position and their
responsibilities
The following are the duties and the responsibilities of the team
16. that will ensure the fulfilment of the project.
· The Senior Project Director
i. The individual will be in charge of ensuring that the project is
planned, directed and ensures a smooth running of the project.
The individual will also be in charge of ensuring that the
project deliverables and their functions are achieved as stated in
the Charter of the project (Ward, et al. 2006).
ii. He will also be in charge of ensuring that accountability is
maintained when it comes to managing the resources for the
project.
· The Quality Manager and the Technical Lead
i. Will ensure that both the proposed product and that the
qualities of the process for the project are maintained.
ii. Will manage every day’s activities for the project and that
there is a good liaison with the project’s technical management.
iii. Will ensure that the technical disciples regarding the project
are maintained.
iv. Will partner with the IT department to ensure that adequate
technical assistance is accorded to the project handlers.
v. Will be in charge of advising on the insight regarding the
health of the project.
vi. Will be available to offer leadership assistance to the
technical staff throughout the life cycle of the project.
vii. Will provide necessary assistance to the Senior Project
Director in establishing the best technical policies, procedures
and processes for the project.
· Implementation and test lead
Will be in-charge of:
i. Managing the implementation phase of the project.
ii. Providing leadership when it comes to implementation
management by forming, synchronizing, scheduling, and closely
overseeing the activities during implementation phase.
iii. Directing the testing process of the newly created structure.
iv. Will work with with the state and the federal departments to
ensure that the test are carried out as provided for by the law.
17. · Operation Lead
Will be in charge of:
i. Coordinating and supervising how the new system works
e. The particular data collected by the company
f. The information systems that is currently being used by the
company:
· Operational Systems and Databases
Below are some of the operating systems and Databases that the
organization has been using to help with its day to day
activities.
· Operating System
They include:
i. Microsoft.NET 2.0 Framework
ii. ASP.NET 2.0 master pages, the gratified pages and Web
Parts.
iii. Windows Workflow Foundation.
· Databases
i. Business Request Data
ii. Site custom data
iii. InfoPath Forms Services
· Analytics and Interfaces
The most used analytic interface being used by the organization
is the graphic interface.
· Infrastructure and Security
To ensure the security of the collected data, the firm has
resolved to the use of the combination of both the technologies
of the cloud computing and Software-as-as-a-Service (SaaS)
Therefore, when the above outlined structure is thoroughly
implemented by the organization, then the structures it will
have initiated in place will be able to assist with holding the
demand for the expansion that the business will come with.
References
Aalst, W., Joseph, M., Mylopoulos, J., Sadeh, N. M., Shaw, M.
J., Szyperski, C., Gotel, O., ... Meyer-Stabley, B. (2009).
Software Engineering Approaches for Offshore and Outsourced
18. Development: Third International Conference, SEAFOOD 2009,
Zurich, Switzerland, July 2-3, 2009. Proceedings. Berlin,
Heidelberg: Springer Berlin Heidelberg.
Ward, P., & Dafoulas, G. (2006). Database management
systems. London: Thomson.
Warranty Data Collection and Analysis. (2011). London:
Springer-Verlag London Limited.
Running head: PROJECT PLAN 1
PROJECT PLAN
2
Section 2: Project Plan
Ramon O. Crespo
Professor: Roy R. Creasey, Jr., Ph.D.
Strayer University
October 16, 2016
Project Plan for the Organization
Introduction
The organization is proud to be able to review and enter
into a partnership with its customers in goal of overhauling the
19. company visibility. This visibility will be done in hopes to
increase brand awareness while increasing the residential
customer base and the industrial IT services. Through the
improved visual appearance of the company assets the brand
will become known for its appearance and with the known
appearance will make changes within the organization. The
graphics will provide information in regards to the company as
well as local contacts and the company website. With that, the
organization will strive to increase its quality of field service as
well as improve the quality of the customer service through face
to face interactions as well as online and telephone interactions.
To ensure maximum satisfaction of the organization’s
customers, the following Project Implementation plan has been
drafted to assist with ensuring that the project is smoothly and
comprehensively carried out. The refurnishing process of the
organization’s IT department is a very huge project that the
organization would like to capitalize on greatly.
1. The IT Plan
The IT department holds a vital role in the process of
realization of the project. The organization understands this
with a very strong implication. This is why the firm has taken
necessary steps to ensure that the IT plan developed has a close
association with its Business Plan. This Organization’s IT plan
will help in achieving the successes of the project by making
sure that the best IT personnel that bear recommended
qualifications are brought on board. If put to use according to
plan, the plan will prove to be a great tool in assisting with
controlling the activities of the IT department throughout the
whole process.
Roles and responsibilities of Team Members of the Project
The list provided below outlines the duties and the obligations
of the Organization’s project team.
· The Senior Project Director
· In charge of planning directing and overseeing the project, and
making that the project deliverables and its functionality are
realized.
20. · Ensures that there is maintenance of accountability when it
comes to managing all of the resources being used in the
project.
· Acts an intermediary with between the project and its
sponsors.
· The Quality Manager
· In charge of managing the quality of the product and the
process involved in the project.
· Ensures that the traceability matrix of the requirements is
maintained.
· In charge of providing insight into the health of the project.
· The Roles and the duties of:
· The Technical Lead have been clearly outlined.
· The Implementation Lead.
· The Application Support Lead.
· The Test Lead have been properly and thoroughly outlined.
· The Configuration Lead and,
· The Operations Lead have all been clearly outlined on the
Human Resource Plan.
Project Organizational Charts
The graphic structure below, derived from DMOZ - Regional:
North America: United States: Tennessee: Guides and
Directories. (2016), is a representation of the reporting
hierarchy for the project.
The chart below, derived from DMOZ - Regional: North
America: United States: Tennessee: Guides and Directories.
(2016), shows the existing association of the tasks for the
project and the members of the team. All of the changes that are
proposed to the responsibilities of the project must receive a
direct approval from the office of the Project Manager. Proposal
of change will only occur with a basis to the control process of
change for the project. When the change is made, all of the
documents for the project will be updated and then redeployed
in accordance with the procedures.
Roles
24. A – Accountable for ensuring task completion/sign off
C – Consulted before any decisions are made
I – Informed of when an action/decision has been made
Staffing Management Plan
The Staffing Management Plan helps with formalization of the
processes that are used in managing the project. This plan
positions itself with the available processes like refurbishment,
Cultural and People policies, the policies for the supply chain,
and the collective agreements that have been continuously
applied by Organization for its staffing (Water Research
Foundation, September 1, 2011). During the resources
planning, there is significance in considering the resources that
are commonly used in the project and the ones from the external
environment. The Staffing Management Plan will aim to provide
a solution to the required resources to offer support to the
program through the life cycle of the project. However, it is of
significance to note that the details contained in the plan will
only be for the foreseeable future and will be updated with a
continuation of realization of the process.
When it comes to the staffing of the project and the resources,
the requirements will vary with time as the project progresses.
This document will be subjected to continuous updates as
deemed necessary for the phases that are to come. Staff will be
required to report directly to the organizational headquarters.
The staff that will be taken to work for this project will be split
into three main categories. There will be some employed on a
full-time, provisional, or rotational obligations. Finally,
purchased services contracts from the external that includes
Amplified Staff, particular, and accomplished task contracts
will help greatly in bringing in new staff in the course of
realizing the project (Project Management Institute, 2004).
All of the details relating to the staff and the, to be used
resources will be developed and safely stored in the Projects
Business Plan, which is a section of the Organization Business
Plan. The duties of the staff and the planning of the resources
will be put purely on the shoulders of the Project Manager, the
25. top most ranking Vice-President, IT managers and the HR
manager. All of the members at the Organization will be held
accountable for sake of planning of the resources and
identifying the needs of the staff during the process of planning.
2. Quality Management Plan
The activities related to quality assurance and control are of
great significance to the mission of organization. The
realization of the strategic goals for the organization is on a
basis on research products of high quality that the customers
and the public in general can be glad to see branded on the
offices. The organization has a policy that the quality program
is aligned to its mission and the goals of strategic research. The
Executive Director and the firms Director, Subscribers and the
Research Services have been mandated with the duty of seeing
to it that the resources related to personnel and finances are
allocated in the best way possible for the sake of development
and operation of the programs and processes related to quality
(Water Research Foundation, September 1, 2011).
When it comes to the management of the organization, the focus
has been solemnly put on ensuring that the goals of the process
is achieved so that the mission and vision of the organization
are achieved. The quality program is inclusive of the team
members who have basic duties of making the processes,
ensuring that their effectiveness, and overseeing the actions that
will make an improvement in the manner in which the
organization manages quality during and after the project. The
positions held by individuals who help with ensuring quality
include; the Board of Trustees, the Focus Area Council, the
Executive Director, the Quality Assurance Manager, The
Director of the Services related to Subscription and Research,
the Committee in charge of Project Advisory, Finance and
Administration Director, the Contracts Administrators and the
Project Coordinators (Water Research Foundation, September 1,
2011).
With the help of the above named individuals and the outlined
26. plan, the quality of the project as a whole is expected to be of a
very high quality that will satisfy the needs of the Customers.
Procurement Management Plan
The objective and goals of this Procurement Management Plan
is to help the Contacting Authorities and the Technical
Authorities at Organization:
· Adhere to the provisions of the government regarding the
whole process.
· Carry out the whole process of contracting in ways that can
test the scrutiny from the stakeholders when it comes to matters
relating to judiciousness and integrity, facilitation of access,
foster competitiveness, and reflect fairness when it comes to
spending the organizational funds (Project Management
Institute, 2004).
· Ensure that the Contract Regulations outlined by the
Government are applied at all times (Project Management
Institute. (2004).
· Be able to mitigate the associated risks and liability.
References
DMOZ - Regional: North America: United States: Tennessee:
Guides and Directories. (2016). Dmoz.org. Retrieved 12
October 2016, from
http://www.dmoz.org/Regional/North_America/United_States/T
ennessee/Guides_and_Directories
http://www.opg.com/about/regulatory-affairs/Documents/2014-
2015/D2-02-01_Attachment%204-08.pdf
Project Management Institute. (2004). A guide to the project
27. management body of knowledge (PMBOK guide). Newtown
Square, PA: Project Management Institute.
Water Research Foundation, (September 1, 2011). Retrieved on
10th Oct/2016 from
http://www.waterrf.org/funding/Policies/QualityManagementPla
n.pdf
Senior Project Director
Operations Lead
Quality Manager
Implementation Lead
Configuration Lead
Test Lead
Technical Lead
Application Support Lead
Running head: Assignment 4 1
Section 1: Design Document
6
28. Business Analytics
Ramon O. Crespo
Professor: Roy R. Creasey, Jr., Ph.D.
Strayer University
Nobember 21, 2016
Executive Summary
Business intelligence is one of the best technique businesses can
use to get functional intelligence from data. Through this,
businesses can provide required information to people of their
interest at any given time and via correct channels which in turn
can help to create a competitive gain by well-informed decision
making. Almost all businesses have a huge amount of
information that is available as structured data. Based on their
functional activities within the business, this information has
accumulated over time. Therefore, the old-style method may not
be able to utilize the late opportunities provided by this massive
data fully. In that case, the use of business intelligence system
has made work easier by consolidating, analyzing, store and
retrieve accumulated amount of data. This can be achieved by
techniques such as business analytics.
The paper will focus on a preview of business analytics by
defining this into depth term and, also providing its capabilities
along with how it is utilized by business enterprises to gain a
competitive advantage over their competitors.
According to Stubbs, business analytic is a practice of iterative
methodological examination of a business data with prominence
on statistical analysis.Business Analytics is mainly used by
companies devoted to data-driven decision making.The use of
business analytic enables the organization to improve their
business by ensuring optimized decision along with the use of
methods employed in statistics that involve data gathering and
29. analysis (Stubbs, 2013).
By the use of business analytics, the enterprise could
realize the reaction of the products or service from the external
environment such as customers, regions among others. This will
enable them to add features or vary the product or service based
on their customer's demand. The data for the product is
important to any new product line with structures since this can
be used to improve sales in a certain target population.
However, the idea of business analytic is in most cases utilized
by people involved in marketing. Marketers apply this technique
to predict and analyze customer's behavior. Therefore,
statistical techniques are applied based on historical data for
consumer's transactions. Therefore, information and statistics is
the key aspect of business analytics in the organization.
What a company can do with Business Analytics (BA)
Business analytic make use of statistical techniques on past
business performance to improve the new business insight and
initiative business planning. It also involves the use of
practices, skills and application along with some technologies.
The key concepts that always investigated from business
analytics are the information questions like what took place for
the last few years based on sales in a certain region. Also, the
analysis involves what might be taking place then in a certain
place and what might be their predictive performance. Based on
these questions, critical understanding must be enhanced to
answer the questions in a more advanced manner. Therefore, the
only solution to such questions is by use of mathematical
modeling and experimental designs.
Besides, from focusing on these questions, the answers will
always provide the next best action to be taken. The forecast
analysis is the best to decide the steps that the business can use
to either improve the sales of a specific product or change the
variation of a product or service. Business analytics always
focus on more perceptive answers to questions the organization
may require. This includes the perspectives to stay competitive
within their business line. The analysis helps to make proper
30. decisions which will reduce jeopardize in decision-making
(Rajiv Sabherwal, 2011).
Today, the use of business analytics is applicable in almost
all the business in predicting their customer's behavior, the
price range of the product, in logistics along with determining
best transportation routes. Also, the business may employ
business analytic in supply chain operation and in finding the
crucial factors that influence the organization performance,
investments, risk management, issuing credit cards and
maximizing sales.
Environmental requirements for Business Analytics (BA)
For Business Analytics (BA) be utilized fully it requires some
elements to be available. Most important is to identify which
features the process are allied to satisfy and value the
standpoint of the consumer. Business Analytics (BA) can be
performed in presence of the following components;
· Data: this deals with data quality and data sufficiency
requirements for analytics process. Enough data should be
present for modeling, testing and experimenting as analytics
demands. This additionally calls for management and
technology used in the whole Business Analytic process.
· Enterprise: Effective Business Analytics requires an enterprise
view point. In the absence of Enterprise, Business Analytics
initiatives may be confined, and it will be difficult to draw any
important benefits at the enterprise level.
· Leadership: Business Analytics (BA) requires capable and
cross-functional leaders who have strong executive management
support. The management emphasis more than just one project.
The leadership will strive to bring Business Analytics (BA)
based culture in the business environment.
· Targets: These are metrics to track these outcomes of
analytics projects. The metrics can be consumer loyalty, hiring
better corresponding to skill set requirements, increased
performance in the supply chain, and better quantitative risk
leadership.
· Analysts: they must pose high expert capabilities to build the
31. models and arrive at the results.
The figure below shows a data flow diagram in Business
analytics and cloud computing environment.
Conclusion
To sum up, for any business organization to succeed in the
present world market, Business analytics technique is the
stepping stone. I recommend the use of analyses reports made
from business analytic to improve the organization’s
management team to make insightful decisions for business
success.
References
Brijs, B. (2016). Business Analysis for Business Intelligence.
Boca Raton, Florida: CRC Press.
Rajiv Sabherwal, . B.-F. (2011). Business Intelligence:
Practices, Technologies, and Management. Hoboken, New
Jersey: John Wiley & Sons.
Stubbs, E. (2013). Delivering Business Analytics: Practical
Guidelines for Best Practice. Hoboken, New Jersey: John Wiley
& Sons.
Operational Data
Warehouse
Enterprise Data
Warehouse
Big Data
Application Development
Environment
User
Vertical Application
Analytics Library
SALES
33. Q
u
e
u
e
Research and
Development
Running head: PROJECT INCEPTION
1
PROJECT INCEPTION
2
Project Inception
Ramon O. Crespo
Professor: Roy R. Creasey, Jr., Ph.D.
Strayer University
October 30, 2016
34. Project Inception
Having the best information system is always the best desire of
any kind of an organization. The urge is more when the
organization in picture is concerned with the collection and
analysis of data. Hence, ensuring that the quality requirements
documents is completed is something that is important to ensure
that the needs of the user are taken into consideration and that
there is a consideration of their expectations. This due to the
fact that it will enable proper designing of the information
systems and the organizational infrastructure. There is no
necessity of having to outsource any kind of manpower or
technologically advanced equipment because the organization
has some of the best equipment and machines to help with the
due process. To ensure that the expected 20% expansion rate
that is expected for the next coming years does not catch the
organization by a surprise, the following project have been
initiated to help in the due process.
In the bid to have the information systems docket for the
organization renovated, the following practises will be of
significance. The first action that is undertaken is to ensure that
the security of the whole system is fostered in the best way
possible.
· The organization will make use of a centralized system of
storage of information to help with fostering an adequate
relationship and integration between systems and infrastructure,
data and Warehousing, analytics, interfaces and cloud
technology.
· The data collected will be stored and kept in fireproof rooms.
Further, the organization will be reinforced with ultramodern
security surveillance that will be helpful in ensuring that the
data in it stays safe and that any given breach of data will be
taken with the most seriousness it deserves (Garton, &
McCulloch, 2012).
· All of the data in the organization will have secondary storage
systems at offsite locations.
35. · All of the organizational computer systems will be
decentralized to help with easy monitoring of the activities of
the employees when using the organizational computer systems.
· Coastally upgrading of the software being used by the
computer systems for the organization. This will be of very
great significance in fostering the security of IT equipment and
prevent any cases of malware infection.
The following are some of the notable functions that the IT
docket will be in charge of:
· The IT department will be in charge of developing the
developmental requirements of the project in conjunction with
the other departmental, entities of the organization.
· The IT department will engage in necessary advancements that
will provide support for needs of the organization regarding the
management of the information it has and the data collected
(Mazzeo, Bellini., Motta, & IFIP World Computer Congress.
2008).
· The implementation of the plan for the IT department is an
independent process that strongly depends on the way other
dockets manages the information at their disposal.
· The implementation window for the system has undergone
complete compressing hence testing of the new IT system have
to be carried out in a very short duration, with no ample time
(Young, 2006).
· All of the employees in the IT department will constantly be
taken through training exercises to equip them with the best
practises of determining any malicious activities on the
organization’s website. This will help in quick detection and
response to any kind of danger.
36. With this in place, the organization anticipates to experience the
best smooth incorporation of the expansion to assist with
technological advancements in the industry. Being the leading
data collection and analysis firm is the goal of the organization.
References
Garton, C., & McCulloch, E. (2012). Fundamentals of
technology project management. Boise: MC Press Online.
Mazzeo, A., Bellini, R., Motta, G., & IFIP World Computer
Congress. (2008). E-government, ICT professionalism and
competencies, service science: IFIP 20th World Computer
Congress, Industry-Oriented Conferences, September 7-10,
2008, Milano, Italy. New York: Springer.
Young, R. R. (2006). Project requirements: A guide to best
practices. Vienna, Va: Management Concepts.
Running head:ASSIGNMENT 2 1
BUSINESS REQUIREMENTS
6
Business Requirements
Ramon O. Crespo
Professor: Roy R. Creasey, Jr., Ph.D.
Strayer University
October 30, 2016
Business Requirements
37. Project Overview
There is a lot of significance in ensuring that the quality of
business requirements are procured. This will help in ensuring
that the organizational information systems remain one of
quality. Therefore, ensuring that the quality requirements
documents is completed is something that is important to ensure
that the needs of the user are taken into consideration and that
there is a consideration of their expectations (Garton, &
McCulloch, 2012). This due to the fact that it will enable proper
designing of the information systems and the organizational
infrastructure. Therefore, after the 2 years of being operational,
the organization which is based on data collection and its
subsequent analysis has the obligation of creating the best
repository for the data it collects that spans beyond the
standardly recognized data bases. Due to the 20% expansion of
the data warehouse on annually basis, the following project
requirement document will be essential to help cater for the
ever increasing necessity and urgency of requiring storage
space.
The Scope of the Project
This document will provide an address to the requirements to
the renovation of the organization’s information systems. This
is propelled by the necessity of having the best storage space
that will ensure that the data belonging to the organization are
stored in the safest place available and that they are kept up to
date at all times. This is due to the rampant yearly expansion of
the data warehouse. The business requirements for the It
department includes the identification, certification and
management of the information that flows through the stream of
the organization in the best way possible and to ensure that they
are safely stored away from the access of the malicious
individuals who might want to illegally access the contents of
the organizational data (Young, 2006). The business
requirements outlined in this document will be strongly
expected to be enacted by the management at the IT department
and other supporting departments like the finance docket that
38. handles very sensitive information regarding the operations
being conducted by the organization.
Controlling the Project Scope
All of the specified requirements within their documents will be
keenly and thoroughly traced to the recommended deliverables
in the organization to ensure that all of the provisions undergo
proper implementation and testing. To have an adequate
maintenance of a trace to all the requirements for the whole life
cycle of the project, the use of the rational project set will be in
order. The reports that will be extracted from the Rational will
be made as part of this document’s appendix to ensure a
provision of updated snapshot of the repository of the
requirements that covers the management of the plan being
used.
Identification of the possible risks, the constraints, and the
assumptions
Assumptions
The list provided below are some of the assumptions that played
key part on the identification and subsequent development of
the outlined requirements in this document. The assumptions are
aimed at fostering a mutual understanding, quality
communication, and partnership among the stakeholders of the
project.
1. The IT department will be in charge of developing the
developmental requirements of the project in conjunction with
the other departmental, entities of the organization.
2. The IT department will engage in necessary advancements
that will provide support for needs of the organization regarding
the management of the information it has and the data collected.
3. The organization will enhance its current internal systems
and the existing processes to help with aligning them to adhere
to the requirements of the network directory provider and the
best requirements of data that the overall organizational plan
has.
Constraints
39. The list provided below shows the encountered constraints that
worked to oppose the realization of the requirements of the
project. The constraints of the project are the factors that works
against realization of the projects or those that tend to limit
realizing the results that are desired (like the satisfying
requirements, meeting the goals of the project, and achieving
the success measures for the project) as this document states.
1. All of the functionality of the management plan to the
organization must be kept operation at all times so as to help
with the yearly expansion that is expected to stand at 20%
(Mazzeo, Bellini, Motta, & IFIP World Computer Congress.
2008). To ensure that this deadline is met on a constant basis,
adequate plans must be certified and approved by the top
management at the firm.
Risks
The list provided below are some of the recognizable risks that
are associated with the realization of the project. The risks have
the ability of creating issues that may intern cause uncertain
effects on the ongoing project hence making the realization of
the results to be in jeopardy. They include:
1. The implementation of the plan for the IT department is an
independent process that strongly depends on the way other
dockets manages the information at their disposal.
2. The implementation window for the system has undergone
complete compressing hence testing of the new IT system have
to be carried out in a very short duration, with no ample time.
3. The stakeholders will have reduced amount of time to prepare
the plans they have for the organization and to have the very
plans incorporated into the mainstream of the organizational
information system.
The organization uses a centralized system of storage of
information to help with fostering an adequate relationship and
integration between systems and infrastructure, data and
Warehousing, analytics, interfaces and cloud technology. All of
the data collected will be stored and kept in fireproof rooms.
Further, the organization will be reinforced with ultramodern
40. security surveillance that will be helpful in ensuring that the
data in it stays safe and that any given breach of data will be
taken with the most seriousness it deserves (Films for the
Humanities & Sciences (Firm), Films Media Group., & Video
Education Australasia. 2011). Further, all of the computer
systems in the organization will be decentralized to help with
easy monitoring of the activities of the employees when using
the organizational computer systems.
The Potential Outsourcing or Offshoring Needs
Based on the current technologically advanced systems that the
organization uses, there will be no need of outsourcing any
further facilities. Instead, the available ones will be constantly
upgraded to ensure that they stay at par and offer protection
against any malicious acts by the hackers. With this, the
organization’s data will be strong and be able to detect and act
on any kind of malware sent to it by third party individual.
References
Films for the Humanities & Sciences (Firm), Films Media
Group., & Video Education Australasia. (2011). ICT Project
Management. New York, N.Y: Films Media Group.
Garton, C., & McCulloch, E. (2012). Fundamentals of
technology project management. Boise: MC Press Online.
Mazzeo, A., Bellini, R., Motta, G., & IFIP World Computer
Congress. (2008). E-government, ICT professionalism and
competencies, service science: IFIP 20th World Computer
Congress, Industry-Oriented Conferences, September 7-10,
2008, Milano, Italy. New York: Springer.
Young, R. R. (2006). Project requirements: A guide to best
practices. Vienna, Va: Management Concepts.