Project Deliverables
Project Deliverables
Project Deliverables
Business Requirements
Student Name
Course
University
Professor
Date
RUNNING HEAD: Business Requirements 2
Introduction
Username is a global company that is objected in offering quality services to its clients
through collection and analysis of data. This company has been in the market for over three years
and offering quality services to its clients. Most institutions go through a long process in analysis
and collection of data, for instance, the company has to monitor the number of traffic a particular
site has, by the number of clicks in the links or some main keyword names used to get into the
site directly or indirectly. Username Company is a data analytic company that uses web analytics
programs and software’s to analyze big data and its intentions is to realize the statistical dream of
However, Usernames has recently had a tremendous growth of over 15% within a period
of three years, also as per the estimations this rate is expected to increase in future(Becker,
2002). Growth and development can only be achieved through following the current information
systems requirements and ensuring that the systems are designed to suit the basic functionalities
of the entire institution. Nevertheless, this company needs resourceful and skilled personnel’s to
foster growth and development through technological infrastructure that are potential to the
institution.
Companies that are global require being dependent upon the geographic regions through
which some of the projects are located. Some of the factors that make the company dependent as
per the geographic locations include, human capital, the IT infrastructure and cost. The
technology sector has turned to be much easier than before because of the life of everyone
involving the IT networking people that has changed and become much better than before.
RUNNING HEAD: Business Requirements 3
However, the scope of this project entails the objectives, deliverables, cost and deadlines. The
major goal of Username Company is come up with quality design systems that will be able to
meet client’s requirements and expectations. The system to be implemented will be user friendly,
easy to be used by any client, and will work as per the user requirements.
Nonetheless, the Username Company will collect information from the clients by
conducting a feasibility study, analyze the data collected, design the system, develop the required
IT system, implement, test if it works well, and at the end be able to integrate the system through
the required use guidelines. Username Company aims to deliver the implemented project within
the expected deadline to the client so that it can serve its purpose. The project is estimated to take
three months and the cost that will be incurred in developing the application amounts to $4000-
$6000 in US Dollars. Nevertheless, the document explaining the requirements of the system will
The process to control the scope is always done at the moment when unexpected changes
occur in the project. The process of controlling the scopes involves the comparison between the
state of the project against the base lined information of the scope. Controlling the scope can be
conducted through quality control, cost control, risk control, and schedule control. However, in
deep description quality control includes the process of monitoring the implemented project
Cost control involves ensuring that the budget for the entire project is well monitored
also the project’s budget is determined and in case the costs have elevated the corrective action is
taken.. On the other hand, schedule control is involved in determining if the scheduled tasks have
been altered or not, however it’s done to monitor if there any changes that might have been
RUNNING HEAD: Business Requirements 4
caused by the company or whether they followed the required events. The Username company
has skilled personnel’s who work with the project manager in developing a management plan so
The process of implementing a proposed system is not an easy task and especially
involves a lot of risks and constraints that if not well considered the project might fail.
Assumptions, is what the company believes to be true in future. They are based on knowledge
and experience of the organization. The assumptions made in this company therefore are of great
significance as they play a role in risk management (Kehal, & Singh, 2006). Nevertheless,
possible risks comprises of threats, ransom-ware hackers, cyber bullies and entities that lead to
threats that may lead to different ways through which they can infiltrate into companies systems
and gain access to unauthorized information that can lead to stealing of sensitive data. However,
another risk involved is input injection. Input injection comprises of SQL injection that is aimed
in targeting the entire database systems especially for the big companies. The following are some
Human resource refers to the employed personnel’s in the company. However, each and
every employee has a different potential according to what he or she is specified to perform.
Company employing the skilled employees who are right for the job is constraint; therefore all
In the implementation of programs and software’s the right options on which technology
to use is an important factor towards development of a system. Choosing the right technology is
of great significance since it will determine the end product. In the process of IT infrastructure
system it’s important to implement the right technology that will ensure that the project will be
the best.
The location at which the offices of the organization will be located should be in specific
and key factors must be considered before selection. The offices should be distributed to all
destinations where the company has clients so that it be easy to handle most of the issues that
cannot be dealt with online. Some of the factors uses while choosing correct locations include
availability of the resources and the bunch of opportunities for the business growth.
technology are concerned. The integration of the systems being developed with other networking
infrastructures is important because it ensures that the systems work perfectly without failure.
However, through the use of different integration technological approaches will help in
a. Cloud technology
Cloud computing is a technology that is significant towards the storage of data in the
servers so that it is safe and can be accessed more easily. In cloud computing data is stored in the
clouds through virtual servers that are capable of being accessed over the world through the
RUNNING HEAD: Business Requirements 6
internet. However, any implemented system should be integrated through the use of cloud
computing technology to make it more efficient and faster (Columbus, 2014). Nevertheless, data
ware housing which will be discussed in this paper will be implemented with the cloud
computing approach. The data for the system is usually stored in the main server and can be
when required this helps to reduce the time required to main the data, costs required to maintain
the data, and also increase the speed of the systems because of the less data storage at regional
level.
b. Data Warehousing
The process of storing data from all the IT infrastructure offices at one particular
destination is called data warehousing. A data warehouse is a location at which huge volumes of
data are stored from all the offices within different institutions all over the world and can access
the data from the same point. However, it’s through single stop way that will provide the various
offices to access the data at any point of time. Database management can also be done through
data warehousing which incorporates different databases by ensuring that there is transparency
and reducing the cost of data maintenance. Nevertheless maintaining data through the warehouse
is very easy and cheap as it in building transparency and reducing cost allied with the relational
databases.
c. Security
Security is key when matters concerning data are involved because of attacks and threats
from intruders who are willing to get access to the raw data. However, through the use cloud
technology and the process of virtualization has contributed to the rise of security in data. The
RUNNING HEAD: Business Requirements 7
data that is stored in the servers can get accessed by unauthorized people through hacking and
To be able to reduce the risks involved in data storage its highly recommended to secure
all the locations and encrypt the data. Through the use secured firewalls and protocols is
d. Network
Networking is compulsory element in the field of business in ensuring that there is expansion
across all companies associated with the Username Company because it will promote growth and
prosperity of the organization. To ensure the network connections work in diverse hardware
requirements they should be installed and optical fibers used to expand the intranet of the
company.
Human Capital
In the implementation of the project to completely work the Username Company need to have a
Infrastructure Administrator
This is the expert who will be responsible of administrative roles of the developed system
infrastructure. The main roles of the admin will be to ensure that there is proper connection of
Application Administrator
This personnel is entitled with a responsibility controlling the network the network of the
implemented system. The application administrator must be versatile with skills in maintenance
of a system.
Support Team
This is a key team towards the maintenance of the application in terms of infrastructure and the
network. However, this team works hand in hand with the application admin and the
infrastructure administrator.
Utilization of Resources
Through the process of utilization of resources will ensure that the entire project is implemented
under a strong networking ground so as to meet all the user requirements. The project team will
be involved in the implementation process must be skilled so as they can solve the complex
tasks.
The Username Company is required to outsource the project so that it can be able to gain
maximum benefits through reducing the cost. However, the company should ensure that it
locates offices to different parts of the world so as to ensure there is condition of work ethic.
Experts with diverse skills should be deployed in these offices to make sure that they take care of
the application and offer services to the clients. Nevertheless, outsourcing the application
infrastructure to a different company is cost effective and time bound (Ullrich, 2016).
The local from the locations where the company has offices at will ensure that they are
aware of the environment and can be of help more in implementing the application
infrastructure, because these clients have knowledge about the hardware apparatuses and the
RUNNING HEAD: Business Requirements 9
locations in which they are purchased from and can do better purchases. The clients having the
know-how on the markets will help the customers them to reduce the needed time for using the
offices there. Data collection can also be outsourced to various small companies.
Outsourcing: Outsourcing is a process of getting goods and services from other suppliers outside
IT Infrastructure: The system infrastructure refers to the hardware requirement of the institution.
Database: a database is a collection of data and information that is organized in a way that it can
Datawarehouse: This is defined as a storage house where the documents in an organization are
stored.
Offshoring: offshoring is the relocation of organizations processes from one country to the other.
For the project to be of success cost should be well distributed in key areas of implementation.
Cost distribution will be crossed all along to the major entities associated with implementation of
the project such as development, operation, software and hardware. Both the hardware and
software processes must be included the cost that is related with the procurement of the
hardware. The procurement of the software that will be used in the development of the project
will also require some cost for their licensing. Nevertheless, the expected operations are direct
expenses and comprise of the cost related activities such as website, database administration
labor costs, help desk, and tech support. There are also wages that must be paid to the experts
RUNNING HEAD: Business Requirements 10
that will be conducting the development of the project and also the compensation to the
outsourced institutions.
Conclusion
Username Company will be at the end be able to implement the project only if it follows
the necessary procedures through incorporating the required technologies and approaches that
aim in acquiring a quality business requirement. The development process will incur risks and
constraints that can be convoluted to the company and hence it will restrain them for
development of the infrastructure and security measure that it outsources to other institutions.
References
Becker, S. A. (2002). Data warehousing and web engineering. Hershey, PA: IRM Press.
Project Management Institute. (2004). Newtown Square, Pa: Project Management Institute.
Kehal, H. S., & Singh, V. P. (2006). A socio-economic perspective. Hershey, PA: Idea Group
Pub.
Ullrich, J., Cropper, J., Frühwirt, P., & Weippl, E. (2016). The role and security of firewalls in