Project Plan is attached that was submitted last week. It needs to be updated with 3 changes listed below. Please read assignment entirely. Needs to be based on Lowkey Inc and the plan attached.
For this assignment, you will compile research and create a supporting research report. Then, based on your research, you will identify and explain the rationale for three improvements to the project plan you submitted last week. I need the project plan updated and the Support Research Report filled out. Two documents.
Compile additional research on your project’s industry, recommended technology vendors, and the categories presented in the supporting research report. You may want to include the
Gartner Group
and
Forrester Research
in your list of organizations to research.
Complete the
Supporting Research Report
template.
Create a second draft of your project plan. Highlight in yellow at least three changes you made to the network, database, and/or cloud solutions within the second draft based on the in-depth research you conducted this week and explain why you made the changes.
Submit your Supporting Research Report and second draft.
BSA/425 v1.3
BSA/425 v1.3
Page 11 of 11
Project Plan Draft
Fill out each of the sections below with information relevant to your project. Be sure to include the company name associated with your project.
Lowkey Inc
Network Technology Selection Criteria |
||||||||||||||||||||||||||||||||||
Selection Criteria Name |
Selection Criteria Description |
Selection Criteria Value (Weighting in Points) |
||||||||||||||||||||||||||||||||
Wide Area Network |
This ty0pe of network connects computers within a long distance |
10 |
||||||||||||||||||||||||||||||||
Accessibility |
The system should be easily accessible to users |
20 |
||||||||||||||||||||||||||||||||
security |
The technology’s integrity should not be interfered with by hackers and malicious parties |
30 |
||||||||||||||||||||||||||||||||
Compatibility |
It should be compatible with all the information resources that the firm uses. |
Network Technology Recommendation |
||||||||||||||||||||
Recommended Network Technologies |
Description |
Benefits |
Aggregate Selection Criteria Score |
|||||||||||||||||
Emails |
Promotes communication cross different parties |
Facilitates communication with customers |
40 |
|||||||||||||||||
Firewalls |
This resource safeguards the firm’s network from unauthorized access and disruptions |
Prevents fraudulent activities |
||||||||||||||||||
Artificial Intelligence |
Enhances the efficiency of the network |
Integrates the services and key procedures, thus improving changes adopted |
||||||||||||||||||
Internetworking tools |
Promotes integrated communication to attain networking goals |
Increases the efficiency of communication |
Network Technology Vendor Selection Criteria |
|
Price |
The cost of purchasing the network infrastructures |
Quality |
The efficiency and effectiveness of the technologies in attaining their goals |
Proximity |
Physical distance from the firm |
After Sales Service |
The services provided by the firm following the purchase of the systems |
Network Technology Recommended Vendors |
|||||||||||||||
Vendor Name |
Vendor Strengths |
Vendor Weaknesses |
Products/Services Provided to Project |
||||||||||||
Cisco |
Cost-efficient and responsive customer care |
Highly responsive |
Encryption can safeguard the network against interceptions |
50 |
|||||||||||
Alloys |
Fast network connectivity |
Network fluctuates |
They can offer heavy network |
||||||||||||
Oracle |
Low cost |
Highly expensive |
Provides a repair and maintenance software |
Network Technology Deployment Challenge s |
|||||||
Deployment Challenge |
Deployment Challenge Description |
||||||
Deployment of physical over logical controls |
Physical network appliances are linked using protocols while in logical networks, there is utilization of different traffics that are agnostic to physical |
||||||
Scalable deployments |
The networks should be both automatic and scalable |
||||||
High costs |
High deployment costs is a challenge |
||||||
Inaccessibility |
Insufficient accessibility approach is a major problem |
Technology Adoption Methods |
|||||||||
Method Name |
Method Description |
||||||||
The adoption occurs when the new system is introduced while the old one is still in use |
|||||||||
Phased |
Gradually replacing small parts of the old system with the new one until it is fully implemented |
||||||||
Piloting |
Using a small group of users to test the new system before it is widely adopted |
||||||||
Direct Adoption |
Implementing a new system radically |
Cost/Benefit Considerations |
||||||||
Costs |
Considerations | |||||||
Increased efficiency |
Personnel |
Hiring the most qualified pool of IT professionals |
||||||
Flexibility |
Organizational expenses |
Training employees to adapt to the new technology |
||||||
Cost cutting |
Cost of tools |
Seek the vendors who provide cost-effective and quality hardware and software technologies |
||||||
Access and availability |
Maintenance costs |
Repair and maintenance must be done regularly |
Database System Selection Criteria |
||||
Operational consideration |
Ability to manage failure recovery and maintain availability |
|||
Security |
The database’s integrity should not be tampered with |
|||
Development consideration |
The openness of the support options |
|||
Commercial consideration |
Its potential commercial importance and benefits |
Database System Recommendation |
||
Recommended Database System |
||
Relational database management system |
Comprises multiple tables of data with rows and columns that relate to each other |
These databases are more flexible |
Hierarchical database systems |
This model resembles a tree structure, with pre-defined relationships |
Requires users to pass hierarchies to access the required data, hence secure |
Network database systems |
Supports many to many relationships |
Can promote integration of systems |
Object-oriented database systems |
Information is represented as objects |
Supports different forms of programming |
Database System Vendor Selection Criteria |
|
Usability |
User friendliness and ease of use |
Visualization and reporting |
Ease of visually analyzing and displaying data and results |
Ability to be stored securely |
|
Functionality |
Ability to meet business requirements |
Database System Recommended Vendors |
||||||
Has syntax enhancements and performance improvements |
expensive |
Multitenancy, database in-memory, and database Sharding |
||||
Microsoft |
Ease of use and high availability |
Challenges in seamlessly integrating high volumes of corporate data |
SQL Server |
|||
IBM |
Can accommodate big data |
Expensive |
IDM DB2 |
|||
Knack |
Provides many tools for online databases |
It is highly customized |
Knack |
Database System Deployment Challenges |
|||
Data security |
The organization may lack resources for securing its database |
||
Performance |
The database may have harsh performance criteria |
||
Resource utilization |
The database may not have the best hardware available to run on |
||
High availability |
In case the single server goes down, the firm’s operations are paralyzed |
Software Application Selection Criteria |
|
Suitability |
Ability to provide appropriate set of functions |
Accuracy |
Ability to provide the right or agreed results |
Interoperability |
Ability to interact with one or more specified systems |
Ability to provide mechanisms to prevent the accidental or deliberate interference with integrity |
Software Application Recommendation |
||
Recommended Software Application |
||
ERP |
Integrated software for managing and coordinating all the business activities |
It provides real-time standardization and streamlining of business processes. |
Office production software |
Producing and compiling information, such as documents and reports |
Reduces and heaps of paperwork |
CRM |
Facilitates interactions with customers |
Can be used to analyze customer trends and preferences |
MIS |
Facilitates gathering, analyzing, and disseminated data for organizational operations |
Informs company decision-making |
Software Application Vendor Selection Criteria |
|
Rates |
The vendors should not be too expensive |
Main areas of expertise |
Relevance of the software to the business functions |
Certification |
Must have local and international certification |
Should have an information security plan |
Software Application Recommended Vendors |
|||
Can customize to the business’s needs |
costly |
Microsoft Office |
|
They install and configure them for firms |
Scalability and integration challenges |
Sterling Order Management |
|
Portability |
Expensive |
Oracle CRM |
|
SAP |
Multiple database support |
Very complex to use |
SAP ERP |
Software Application Deployment Challenges |
|
Misaligned expectations |
Project teams and stakeholders may differ on the needs and requirements of the software |
Data integrity |
Lack of an effective strategy for securing data |
Insufficient training tools |
Employees maybe insufficiently prepared tom operate the software |
Testing problems |
Lack of a testing and maintenance tool |
Technology Adoption Methods
Method Name
Method Description
Parallel Approach
The adoption occurs when the new system is introduced while the old one is still in use
Phased
Gradually replacing small parts of the old system with the new one until it is fully implemented
Piloting
Using a small group of users to test the new system before it is widely adopted
Direct Adoption
Implementing a new system radically
Cost/Benefit Considerations
Benefits
Costs
Considerations
Increased efficiency
Personnel
Hiring the most qualified pool of IT professionals
Flexibility
Organizational expenses
Training employees to adapt to the new technology
Cost cutting
Cost of tools
Seek the vendors who provide cost-effective and quality hardware and software technologies
Access and availability
Maintenance costs
Repair and maintenance must be done regularly
Cloud Services Selection Criteria |
|
Compliance with standards |
Compliance with government and professional regulations |
Service roadmap |
Current goals and objectives of the vendors |
Terms of service |
If they do not have tough terms and conditions |
Ability to secure the data |
Cloud Services Recommendation |
|||||
Recommended Cloud Services |
|||||
Amazon |
Provides additional services, such as storage and security |
Support users to integrate with business |
|||
Google Cloud |
Can provide free packages |
Supports all organizational functions |
|||
Fast response to customer enquiries |
Can provide platform as a service |
||||
Adobe |
Ideal for supporting publishing and editing |
it is a creative cloud system |
Cloud Services Recommended Vendors |
|
Cannot be customized |
Amazon Cloud |
Slow responsiveness to customer inquiries |
|
IBM Cloud |
|
Only ideal for media and publishing |
Adobe |
Cloud Services Deployment Challenges |
|
Increased incidences of hacking of cloud resources |
|
Performance issues |
Disruptions from vendors due to maintenance |
Availability problems |
Lack of availability of services when technical issues emerge |
Data safety |
Data may be affected when the computer systems are infected by viruses |
Technology Adoption Methods
Method Name
Method Description
Parallel Approach
The adoption occurs when the new system is introduced while the old one is still in use
Phased
Gradually replacing small parts of the old system with the new one until it is fully implemented
Piloting
Using a small group of users to test the new system before it is widely adopted
Direct Adoption
Implementing a new system radically
Increase in efficiency |
$4000 |
Installing efficient and state-of-the art hardware and software resources to speed up business transactions |
Reduction in costs |
$3000 |
Eliminating heaps of paperwork |
Hiring more staff |
$10000 |
Individuals who will operate or control the cloud resources |
Purchasing more computer resources |
$5000 |
Devices should be purchased to support the running of the cloud computing system |
Copyright 2020 by University of Phoenix. All rights reserved.
Copyright 2020 by University of Phoenix. All rights reserved.
BSA/425 v1.3
BSA/425 v1.3
Page 2 of 2
Supporting Research Report
Fill out each section with information relevant to your project. Be sure to include the name and purpose of your project.
Supporting Research Report for:
Project name:
Purpose of project:
·
Executive Summary
· Industry Background
· Technology Trends
· Project Approach
· Selected Vendors
· Alternative Approach
· Impact Analysis
· Cost-Benefit Analysis
· Financial Analysis
·
Risk Analysis
Copyright 2020 by University of Phoenix. All rights reserved.
Copyright 2020 by University of Phoenix. All rights reserved.
We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.
Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.
Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.
Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.
Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.
Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.
We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.
Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.
You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.
Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.
Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.
You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.
You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.
Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.
We create perfect papers according to the guidelines.
We seamlessly edit out errors from your papers.
We thoroughly read your final draft to identify errors.
Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!
Dedication. Quality. Commitment. Punctuality
Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.
We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.
We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.
We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.
We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.