I need help with following assignment: Assignment Content Project implementation is arguably the most exciting stage of the project management process. It is during project implementation that proje
BSA/425
Project Plan Draft
Instructions: Fill out each of the sections below with information relevant to your project. Be sure to include the company name associated with your project.
| Selection Criteria Name | Selection Criteria Description | Selection Criteria Value (Weighting in Points) (score out of 10) |
| Local area network | It connects a group and short-range computers or low-voltage devices | 4 |
| Wide area network | Connecting the computers in a longer distance. | 6 |
| Wireless local area network | Its works like Wi-Fi. Doesn’t need physical devices. | 9 |
| Recommended Network Technologies | Description | Benefits | Aggregate Selection Criteria Score (score out of 10) |
| Software defining networking | It interacts with the device programming interface and allows virtual level capital management | Cost effective, manageable, adaptable and flexible | 3 |
| Multi cloud technology | It uses over two public clouds and several private clouds. | Enable easy storing of data | 6 |
| Edge computing | It brings target applications loser to the action source. | Secured data, cheaper storing services | 7 |
| Selection Criteria Name | Selection Criteria Description | Selection Criteria Value (Weighting in Points) (score out of 10) |
| Setting the company needs | This lets us realize the quality of the vendor we like. | 3 |
| Find the best vendor | We will share our interactions with customers of other vendors | 7 |
| Have agents | The agents must present their vetting suggestions | 6 |
| Vendor Name | Vendor Strengths | Vendor Weaknesses | Products / Services Provided to Project | Aggregate Selection Criteria Score (score out of 10) |
| Alloys | Cost effective, good customer care | The network is affected by heavy storms and rains | Encryption of the company's systems to protect it from unauthorized intrusions | 4 |
| Cisco | Very fast network, 24 hours customer service | Very expensive network | Provide us with heavy network in the company | 8 |
| Aruba | Good network, cheap costs | Network slows down when using their systems | Give us a program in the business to always test and manage the program | 3 |
| Deployment Challenge | Deployment Challenge Description |
| Deploying physical over logical | In the physical networks, the systems are logically connected that protocols and various traffics are used that are physically agnostic and must run them. |
| Scalable and automatic deployment | The networks should not only be automatic but should also be scalable. |
| Deployment that is resilient | It is necessary for the network to respond to defects. The programs are vulnerable to errors but need to track and operate. |
| Bring your own physical network | When the system is deployed in a data center infrastructure, the automated and faster deployment is good. |
| Method Name | Method Description |
| Align technology and strategy | The technology must meet the requirements of the organization and should not be taken on behalf of the company. |
| There should be buy ins communicated | In order to use this technology, contact should be made with the stakeholders |
| The systems that is current should be analyzed | This is used to mean that a new technology is needed or not. |
| There should be training | The workers should be educated and trained on net technologies so they can use it faster. |
| Benefits | Costs | Considerations |
| Hire more staff | $15000 | More productivity |
| New block | $345686 | To install the new technological items and computers |
| Selection Criteria Name | Selection Criteria Description | Selection Criteria Value (Weighting In Points) (score out of 10) |
| Defining terms of reference of study | The purpose which the project needs to be undertaken | |
| Shortlisting 2-3 products | Select the DDBS from some products which corresponds to the key concepts | 7 |
| Evaluating the products | This means that the three are analyzed more closely with the DDBS. | 5 |
| Recommend selection | This results in the proper company following the research and analysis | 8 |
| Recommended Database System | Description | Benefits | Aggregate Selection Criteria Score(score out of 10) |
| Desktop database | It allows users to logically enter and store data. | Allow data to be changed and saved in large quantities. | 3 |
| Relational database | It has a collection of tables known as the schema that build a single server database | This allows the user to save more than a mobile job. | 6 |
| Object oriented | They build item bookshelves and allow access by bookshelf | Allow large amounts of data to be stored | 8 |
| normalization | This collects and partitions data into small components | Helps for the first and last names sorting in records | 6 |
| Selection Criteria Name | Selection Criteria Description | Selection Criteria Value (Weighting In Points) (score out of 10) |
| Cost | The company will have an economical database | 3 |
| Quality and safety | You should not regularly fail the database | 6 |
| Risk | The servers will be free of threats and hackings of all kinds | 9 |
| convenience | This will be effective in businesses that have no previous mistakes | 5 |
| Vendor Name | Vendor Strengths | Vendor Weaknesses | Products / Services Provided To Project | Aggregate Selection Criteria Score(score out of 10) |
| Oracle | Powerful and complex, with cloud support | It manages data as consolidated cloud services and provides training for the employees | 5 | |
| Microsoft SQL | Most used in the world | It is equipped with MS Word, Excel and SharePoint. | 6 | |
| Microsoft access | Used for e-commercial sites | comes with a bureau suite and is easy to run | 7 | |
| Teradata | It is a very large data base | Can manage huge data volumes for big organizations and | 8 |
| Deployment Challenge | Deployment Challenge Description |
| Data security | The rate of hacking and identity misuse has risen |
| performance | Occasionally, the output of databases cannot please the big companies. |
| High availability | The business would not work well if the system does not work properly. |
| Data safety | When program errors occur, data can often be impaired |
| Method Name | Method Description |
| Align technology and strategy | The technology must meet the requirements of the organization and should not be taken on behalf of the company. |
| There should be buy ins communicated | In order to use this technology, contact should be made with the stakeholders |
| The systems that is current should be analyzed | This is used to mean that a new technology is needed or not. |
| There should be training | The workers should be educated and trained on net technologies so they can use it faster. |
| Benefits | Costs | Considerations |
| Buying a new database system | $3467 | It helps the company to better and easier retrieval of its growing data volumes |
| Selection Criteria Name | Selection Criteria Description | Selection Criteria Value (Weighting In Points) (score out of 10) |
| Business and industry expertise | That is the number of IT professionals in the company | 4 |
| Market knowledge | The software will suit our company's demand | 6 |
| Program management capabilities | The plan and mission must be dynamic and centralized management | 3 |
| communication | The program must ensure that good communication exists between departments. | 8 |
| Recommended Software Application | Description | Benefits | Aggregate Selection Criteria Score(score out of 10) |
| Microsoft suite | It includes office word, excel, access outlook etc. | They help us to manage and print our document | 4 |
| Internet browsers | It includes chrome, opera mini, safari, Firefox | They are used for internet access | 6 |
| Mobile piece software | It includes skype for communications, slack and Pandora | They help communication, teamwork and appreciation of music. | 8 |
| Selection Criteria Name | Selection Criteria Description | Selection Criteria Value (Weighting In Points) (score out of 10) |
| Defining the broad needs | This checks the type of application required and if it matches the required application. | 3 |
| Find the expectations of the list of features | With the requisite unique technical functions. These should be clear requirements. | 6 |
| Checking the reporting capabilities | The company's description will be best clarified by the app | 8 |
| Vendor Name | Vendor Strengths | Vendor Weaknesses | Products / Services Provided To Project | Aggregate Selection Criteria Score(score out of 10) |
| EMC | It covers all the products of software revenue | Software maintenance is not included | It provides software that is sophisticated for the company | 3 |
| Salesforce | Covers the software for sales service | Professional service revenues are not included | It comes with marketing applications and cloud app that support the revenues | 7 |
| SUN GUARD | Supports revenues from the FIS global | Software maintenance is not included | The transactions here are calculated as derivative value which is equivalent to straight software license. | 8 |
| Amazon web services | It covers all the products of software revenue | Professional service revenues are not included | It provides software that is sophisticated for the company | 9 |
| Deployment Challenge | Deployment Challenge Description |
| Inadequate knowledge | The employees may not have sufficient software information, but this can be solved by training them |
| Performance | Sometimes the performance of the software can not satisfy the big companies. |
| High availability | The business would definitely not work well if the system does not work properly. |
| Data safety | The question of machine error will sometimes affect the program |
| Method Name | Method Description |
| Align technology and strategy | The technology must meet the requirements of the organization and should not be taken on behalf of the company. |
| There should be buy ins communicated | In order to use this technology, contact should be made with the stakeholders |
| The systems that is current should be analyzed | This will be used to tell there is the need for a new technology or not |
| There should be training | The workers should be educated and trained on net technologies so they can use it faster. |
| Benefits | Costs | Considerations |
| Purchasing new computers | $3544 | It is operated using the company's new software |
| Hiring new staff | $3655 | It ensures that the software is well protected and in good condition |
| Selection Criteria Name | Selection Criteria Description | Selection Criteria Value (Weighting In Points) (score out of 10) |
| Cost | The cloud will be economical for the company | 8 |
| Quality and safety | They cloud should not fail regularly | 10 |
| Risk | The cloud is free of all manner of threats and hackings | 4 |
| convenience | This will be effective in businesses that have no previous mistakes | 3 |
| Recommended Cloud Services | Description | Benefits | Aggregate Selection Criteria Score |
| Dropbox | Has a limit for 2 GB | It is good for light browsers | 9 |
| Google drive | Has capacity for 15 GB | It is good for teams and collaborations | 10 |
| Microsoft OneDrive | Has a limit for 5 GB | It is good for widows programs users | 9 |
| Box | Capacity for 10 GB | Used by the users of enterprise solutions | 6 |
| Selection Criteria Name | Selection Criteria Description | Selection Criteria Value (Weighting In Points) (score out of 10) |
| If they comply with standards | The governments set the standards for cloud service providers | 4 |
| Service roadmap | The company's current goals are addressed in the project | 8 |
| Data security | The suppliers can provide data security to prevent hacking. | 9 |
| The terms of service | If customer service approaches contribute to customer loyalty are acceptable | 4 |
| Vendor Name | Vendor Strengths | Vendor Weaknesses | Products / Services Provided To Project | Aggregate Selection Criteria Score |
| Amazon web services | Provide services such as computer power, database storage among others | Amazon has a weakness in that AWS has more services than any one person can understand. | It helps the users to incorporate it into the product, which is openly which secure | 6 |
| Google cloud | It is among the leading providers | Its relative paucity of regions compared to those other platforms. | You can use it to search YouTube and Google provides services such as data analysis, storage of data, machine learning etc. | 5 |
| IBM cloud | It is fast and improves on the satisfaction of the customer | A lack of vendor supported CRM integration | It provides services like a service platform and a service infrastructure. | 7 |
| Adobe cloud | Is good for video editing, development of webs and so on | The downloads are not portable from computer to computer | They are innovative cloud providers that help store images and site information | 4 |
| Deployment Challenge | Deployment Challenge Description |
| Data security | The rate of hacking and identity misuse has risen |
| performance | Occasionally, the output of databases cannot please the big companies. |
| High availability | The business would not work well if the system does not work properly. |
| Data safety | When program errors occur, data can often be impaired |
| Method Name | Method Description |
| Align technology and strategy | The technology must meet the requirements of the organization and should not be taken on behalf of the company. |
| There should be buy ins communicated | In order to use this technology, contact should be made with the stakeholders |
| The systems that is current should be analyzed | This is used to mean that a new technology is needed or not. |
| There should be training | The workers should be educated and trained on net technologies so they can use it faster. |
| Benefits | Costs | Considerations |
| Hire more staff | $2965 | Who will be used to control the cloud services |