Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Project Deliverables

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 10
At a glance
Powered by AI
The key takeaways are that Username Company is a data analytics company that has experienced significant growth and now needs to develop new systems to continue meeting client needs and expectations. It needs to carefully consider requirements, costs, timelines and resources to ensure a successful project.

The major goal of the project is to develop a user-friendly system that meets client requirements and expectations. It aims to collect requirements, design, develop, implement, test and integrate a new system within 3 months for a cost of $4000-6000.

The major steps involved are conducting a feasibility study, analyzing collected data, designing the system, developing the required IT system, implementing it, testing it works properly, and integrating it with use guidelines.

RUNNING HEAD: Business Requirements 1

Business Requirements

Student Name

Course

University

Professor

Date
RUNNING HEAD: Business Requirements 2

Introduction

Username is a global company that is objected in offering quality services to its clients

through collection and analysis of data. This company has been in the market for over three years

and offering quality services to its clients. Most institutions go through a long process in analysis

and collection of data, for instance, the company has to monitor the number of traffic a particular

site has, by the number of clicks in the links or some main keyword names used to get into the

site directly or indirectly. Username Company is a data analytic company that uses web analytics

programs and software’s to analyze big data and its intentions is to realize the statistical dream of

clean data analysis.

However, Usernames has recently had a tremendous growth of over 15% within a period

of three years, also as per the estimations this rate is expected to increase in future(Becker,

2002). Growth and development can only be achieved through following the current information

systems requirements and ensuring that the systems are designed to suit the basic functionalities

of the entire institution. Nevertheless, this company needs resourceful and skilled personnel’s to

foster growth and development through technological infrastructure that are potential to the

institution.

Description and definition of scope of the project

Companies that are global require being dependent upon the geographic regions through

which some of the projects are located. Some of the factors that make the company dependent as

per the geographic locations include, human capital, the IT infrastructure and cost. The

technology sector has turned to be much easier than before because of the life of everyone

involving the IT networking people that has changed and become much better than before.
RUNNING HEAD: Business Requirements 3

However, the scope of this project entails the objectives, deliverables, cost and deadlines. The

major goal of Username Company is come up with quality design systems that will be able to

meet client’s requirements and expectations. The system to be implemented will be user friendly,

easy to be used by any client, and will work as per the user requirements.

Nonetheless, the Username Company will collect information from the clients by

conducting a feasibility study, analyze the data collected, design the system, develop the required

IT system, implement, test if it works well, and at the end be able to integrate the system through

the required use guidelines. Username Company aims to deliver the implemented project within

the expected deadline to the client so that it can serve its purpose. The project is estimated to take

three months and the cost that will be incurred in developing the application amounts to $4000-

$6000 in US Dollars. Nevertheless, the document explaining the requirements of the system will

be available in the first month of the project to reduce delays.

Speculation on how to control the scope

The process to control the scope is always done at the moment when unexpected changes

occur in the project. The process of controlling the scopes involves the comparison between the

state of the project against the base lined information of the scope. Controlling the scope can be

conducted through quality control, cost control, risk control, and schedule control. However, in

deep description quality control includes the process of monitoring the implemented project

complies with the required quality standards.

Cost control involves ensuring that the budget for the entire project is well monitored

also the project’s budget is determined and in case the costs have elevated the corrective action is

taken.. On the other hand, schedule control is involved in determining if the scheduled tasks have

been altered or not, however it’s done to monitor if there any changes that might have been
RUNNING HEAD: Business Requirements 4

caused by the company or whether they followed the required events. The Username company

has skilled personnel’s who work with the project manager in developing a management plan so

they are well versed with sampling knowledge.

Identify possible risks, constraints, and assumptions.

The process of implementing a proposed system is not an easy task and especially

developing an IT system. Maintaining an infrastructure of the system is challenging because it

involves a lot of risks and constraints that if not well considered the project might fail.

Assumptions, is what the company believes to be true in future. They are based on knowledge

and experience of the organization. The assumptions made in this company therefore are of great

significance as they play a role in risk management (Kehal, & Singh, 2006). Nevertheless,

possible risks comprises of threats, ransom-ware hackers, cyber bullies and entities that lead to

threats that may lead to different ways through which they can infiltrate into companies systems

and gain access to unauthorized information that can lead to stealing of sensitive data. However,

another risk involved is input injection. Input injection comprises of SQL injection that is aimed

in targeting the entire database systems especially for the big companies. The following are some

of the constraints involved in the project.

a. Selecting the correct Human resources

Human resource refers to the employed personnel’s in the company. However, each and

every employee has a different potential according to what he or she is specified to perform.

Company employing the skilled employees who are right for the job is constraint; therefore all

the skilled personnel’s are the epitome towards development of a IT infrastructure.


RUNNING HEAD: Business Requirements 5

b. Choosing Right Technology

In the implementation of programs and software’s the right options on which technology

to use is an important factor towards development of a system. Choosing the right technology is

of great significance since it will determine the end product. In the process of IT infrastructure

system it’s important to implement the right technology that will ensure that the project will be

the best.

c. Using the correct locations

The location at which the offices of the organization will be located should be in specific

and key factors must be considered before selection. The offices should be distributed to all

destinations where the company has clients so that it be easy to handle most of the issues that

cannot be dealt with online. Some of the factors uses while choosing correct locations include

availability of the resources and the bunch of opportunities for the business growth.

The required integration of implemented infrastructure with other system

Username Company is aimed at ensuring that it expands in height as far as matters of

technology are concerned. The integration of the systems being developed with other networking

infrastructures is important because it ensures that the systems work perfectly without failure.

However, through the use of different integration technological approaches will help in

determining the success of the project.

a. Cloud technology

Cloud computing is a technology that is significant towards the storage of data in the

servers so that it is safe and can be accessed more easily. In cloud computing data is stored in the

clouds through virtual servers that are capable of being accessed over the world through the
RUNNING HEAD: Business Requirements 6

internet. However, any implemented system should be integrated through the use of cloud

computing technology to make it more efficient and faster (Columbus, 2014). Nevertheless, data

ware housing which will be discussed in this paper will be implemented with the cloud

computing approach. The data for the system is usually stored in the main server and can be

when required this helps to reduce the time required to main the data, costs required to maintain

the data, and also increase the speed of the systems because of the less data storage at regional

level.

b. Data Warehousing

The process of storing data from all the IT infrastructure offices at one particular

destination is called data warehousing. A data warehouse is a location at which huge volumes of

data are stored from all the offices within different institutions all over the world and can access

the data from the same point. However, it’s through single stop way that will provide the various

offices to access the data at any point of time. Database management can also be done through

data warehousing which incorporates different databases by ensuring that there is transparency

and reducing the cost of data maintenance. Nevertheless maintaining data through the warehouse

is very easy and cheap as it in building transparency and reducing cost allied with the relational

databases.

c. Security

Security is key when matters concerning data are involved because of attacks and threats

from intruders who are willing to get access to the raw data. However, through the use cloud

technology and the process of virtualization has contributed to the rise of security in data. The
RUNNING HEAD: Business Requirements 7

data that is stored in the servers can get accessed by unauthorized people through hacking and

use of malwares to access it virtually in the servers (Tallman, 2002).

To be able to reduce the risks involved in data storage its highly recommended to secure

all the locations and encrypt the data. Through the use secured firewalls and protocols is

important since they will increase data security.

d. Network

Networking is compulsory element in the field of business in ensuring that there is expansion

across all companies associated with the Username Company because it will promote growth and

prosperity of the organization. To ensure the network connections work in diverse hardware

requirements they should be installed and optical fibers used to expand the intranet of the

company.

Human Capital and their proper utilization

 Human Capital

In the implementation of the project to completely work the Username Company need to have a

team of experts under the following categories.

 Infrastructure Administrator

This is the expert who will be responsible of administrative roles of the developed system

infrastructure. The main roles of the admin will be to ensure that there is proper connection of

networks between different locations. However, network requirements comprises of

hardware/network side implementation.


RUNNING HEAD: Business Requirements 8

 Application Administrator

This personnel is entitled with a responsibility controlling the network the network of the

implemented system. The application administrator must be versatile with skills in maintenance

of a system.

 Support Team

This is a key team towards the maintenance of the application in terms of infrastructure and the

network. However, this team works hand in hand with the application admin and the

infrastructure administrator.

 Utilization of Resources

Through the process of utilization of resources will ensure that the entire project is implemented

under a strong networking ground so as to meet all the user requirements. The project team will

be involved in the implementation process must be skilled so as they can solve the complex

tasks.

Outsourcing or off shoring needs of the project

The Username Company is required to outsource the project so that it can be able to gain

maximum benefits through reducing the cost. However, the company should ensure that it

locates offices to different parts of the world so as to ensure there is condition of work ethic.

Experts with diverse skills should be deployed in these offices to make sure that they take care of

the application and offer services to the clients. Nevertheless, outsourcing the application

infrastructure to a different company is cost effective and time bound (Ullrich, 2016).

The local from the locations where the company has offices at will ensure that they are

aware of the environment and can be of help more in implementing the application

infrastructure, because these clients have knowledge about the hardware apparatuses and the
RUNNING HEAD: Business Requirements 9

locations in which they are purchased from and can do better purchases. The clients having the

know-how on the markets will help the customers them to reduce the needed time for using the

offices there. Data collection can also be outsourced to various small companies.

Relevant terms used in the project.

Outsourcing: Outsourcing is a process of getting goods and services from other suppliers outside

or foreign supplies in the plan from an internal source.

IT Infrastructure: The system infrastructure refers to the hardware requirement of the institution.

Database: a database is a collection of data and information that is organized in a way that it can

be accessed and managed.

Datawarehouse: This is defined as a storage house where the documents in an organization are

stored.

Offshoring: offshoring is the relocation of organizations processes from one country to the other.

Interface: an interface is a point where two systems meet and interact.

Cost projections for staffing, infrastructure, and other resources:

For the project to be of success cost should be well distributed in key areas of implementation.

Cost distribution will be crossed all along to the major entities associated with implementation of

the project such as development, operation, software and hardware. Both the hardware and

software processes must be included the cost that is related with the procurement of the

hardware. The procurement of the software that will be used in the development of the project

will also require some cost for their licensing. Nevertheless, the expected operations are direct

expenses and comprise of the cost related activities such as website, database administration

labor costs, help desk, and tech support. There are also wages that must be paid to the experts
RUNNING HEAD: Business Requirements 10

that will be conducting the development of the project and also the compensation to the

outsourced institutions.

Conclusion

Username Company will be at the end be able to implement the project only if it follows

the necessary procedures through incorporating the required technologies and approaches that

aim in acquiring a quality business requirement. The development process will incur risks and

constraints that can be convoluted to the company and hence it will restrain them for

development of the infrastructure and security measure that it outsources to other institutions.

References

Becker, S. A. (2002). Data warehousing and web engineering. Hershey, PA: IRM Press.

Project Management Institute. (2004).  Newtown Square, Pa: Project Management Institute.

Kehal, H. S., & Singh, V. P. (2006).  A socio-economic perspective. Hershey, PA: Idea Group

Pub.

Tallman, S., & Fladmoe-Lindquist, K. (2002). Internationalization, globalization, and capability-

based strategy. California Management Review, 45(1), 116-135.

Ullrich, J., Cropper, J., Frühwirt, P., & Weippl, E. (2016). The role and security of firewalls in

cyber-physical cloud computing. EURASIP Journal on Information Security, 2016(1), 18.

You might also like