Discuss about the Management Services Of ABC Revamp Project.
ABC Limited is a Singapore based firm that is into logistics management services. Services provided by the company include warehousing, logistics, contained deport management and transport management. Its clients include both local and international organizations like Mitsui O.S.K. Lines and A.P. Moller-Maersk A/S.
The valuation of the company is more than $1 billion after 30 years of working. The aim of this project is the enhance the IT infrastructure of the security unit of the company which operates with the offshore marine for the oil and gas distribution. For this revamp, the total budget allotted is SGD 90,000 and the specifications are approved. The schedule is also allotted for a definite period to achieve the targets of this project.
The key deliverables of this revamping project include:
The project have certain technical requirements:
Exclusions
Benefit
Strategic Alignment
The project is suggested for the company with an aim to satisfy their growing needs. It must facilitate business processes and increases the company revenues. The company should either perform as pr customer expectations or should exceed them.
Product requirement |
Deliverable component |
Install Windows server 2010 |
windows server 2010 to be installed on all computers |
Install Anti-virus |
An updated version of anti-virus has to be installed on all machines |
Network connectivity |
Full network access to be provided to all machines |
Upgrade software |
All software should be upgrades on all systems. |
WBS |
Task Name |
Duration |
1 |
IT Infrastructure Enhancement |
190 days |
1.1 |
Planning |
39 days |
1.1.1 |
Requirement Analysis |
5 days |
1.1.2 |
Feasibility study & Feasibility Analysis Report Submission |
5 days |
1.1.3 |
Creation of Project Plan |
3 days |
1.1.4 |
Finalize the list of delivery items |
3 days |
1.1.5 |
Prepare communication plan |
5 days |
1.1.6 |
Creation of Test Plan |
5 days |
1.1.7 |
Creation of Change Request Plan |
5 days |
1.1.8 |
Prepare Risk Management & Mitigation Plan |
5 days |
1.1.9 |
Signoffs |
3 days |
1.2 |
Design & Analysis |
85 days |
1.2.1 |
Hardware Configuration |
30 days |
1.2.1.1 |
Perform compatibility study |
10 days |
1.2.1.2 |
Perform market survey |
7 days |
1.2.1.3 |
Creation of configuration Plan (Computers) |
5 days |
1.2.1.4 |
Submission of material – bill |
5 days |
1.2.1.5 |
Approval on the bill Amount |
3 days |
1.2.2 |
Vendor Selection |
45 days |
1.2.2.1 |
Submission of tender for hardware |
15 days |
1.2.2.2 |
Checklist preparation for vendor selection |
5 days |
1.2.2.3 |
Identify hardware vendors |
5 days |
1.2.2.4 |
Set-up |
20 days |
1.2.3 |
Data Backup |
10 days |
1.3 |
Purchase & Store |
36 days |
1.3.1 |
Raise purchase order for hardware |
11 days |
1.3.1.1 |
Checking the quality of the hardware |
5 days |
1.3.1.2 |
Transfer the parts in the warehouse |
6 days |
1.3.2 |
Install |
25 days |
1.3.2.1 |
Machine identifications for hardware upgrade |
4 days |
1.3.2.2 |
Software installation on identified machines |
3 days |
1.3.2.3 |
Demo Presentation to the company management |
3 days |
1.3.2.4 |
Perform Enhancement to the client |
15 days |
1.4 |
Test and deployment |
30 days |
1.4.1 |
Machine Test |
24 days |
1.4.1.1 |
Machine Portability Testing |
20 days |
1.4.1.2 |
Sign-offs |
4 days |
1.4.2 |
Network testing |
6 days |
1.4.2.1 |
Check the connectivity and data flow in machine placed on the network |
3 days |
1.4.2.2 |
Sign-offs |
3 days |
Change Request: Domain networking |
|
Project: Revamp Project |
Date: 20/01/15 |
Change Requestor: Management board |
Change No: 1 |
Change Category (Check all that apply): ? Schedule ? Cost ? Scope ? Requirements/Deliverables ? Testing/Quality ? Resources |
|
Does this Change Affect (Check all that apply): ? Corrective Action ? Preventative Action ? Defect Repair ? Updates ? Other |
|
Describe the Change Being Requested: One of the change requested is the addition of a security layer in the upgraded machines. The machines have to be placed on the company network and all the connecting services like mailing and file hosting have to be banned on these machines. The changes required are important to the company as they are related to security which is crucial aspect of the company. Significant time as well as efforts would be needed to make these changes. The changes would prevent employees for making use of company systems for personal use. Thus, these systems would be safe and the security solutions that would be enabled would further strengthen the security by preventing it from virus attacks. The transferring of the domain on which services would be placed would require additional port for support from the server. This would require construction of port holders for all the systems. On upgraded machines, CISCO agent would also be provided. |
|
Describe the Reason for the Change: Security has been a major concern for the company for long and thus, an upgrading with addition of security layer was sought. The company systems also faced virus attacks in past due to the lack of proper security. The company has planned to upgrade one unit as a pilot. After this installation, it was realized that more than one employees were using a single system. Moreover, some of them were not well accustomed to working machines and thus, there was a risk that they could end up installing an unofficial software or do personal activities like emailing. This would make the system vulnerable. Thus, changes in registry would not be allowed such that users can only open the company permitted websites. |
|
Alternatives Considered: Requested change can be managed without the allotment of additional resource and thus, no alternative is suggested. |
|
Technical Changes Required for implementation: · The network engineer would be given responsibility for installing CISCO software on the systems · Additional ports that are required and the CISCO software would be purchased |
|
Risks due to these Change: · There can be added cost to the budget due to additional port requirements. |
|
Estimated Resources and Costs for Implementing Change: · Resources would be used for ports set-up and CISCO installation · The cost of the change is $50,000. |
|
Disposition: ? Approve ? Reject ? Defer |
|
Justification of Approval, Rejection, or Deferral: Reason for change is logical. |
WBS ID |
Task Name |
1.5 |
Domain networking |
1.5.1 |
Purchase ports and set-up materials |
1.5.2 |
Identify port locations |
1.5.3 |
Identify and set-up ports |
1.5.4 |
Identify server machine |
1.5.5 |
Set-up server machine |
1.5.6 |
Connect machine ports to server ports |
1.5.7 |
Place machines on company domain |
1.5.8 |
Install CISCO software |
1.5.9 |
Test machines |
1.5.10 |
Sign-offs |
The subsequent outputs are the result of the project-
The requirement for the aggressive system of information was caused due to the tactical pro-notation of the tourism focused government established society, located in Canada. The main aim of the system was the generation of timely and high quality intelligence which would assist the numerous managers of production to take tactical actions and decisions so that the Canadian Tourism Industry is benefitted. The explanation of the advantages of the system is provided below-
The major goals of the specific agency of the government is collection of intelligence, processing and utilizing it so that it can be used for promotion and marketing of Canada as a destination for tourists. Additionally, other goals consists of helping the neighboring tourist agencies and companies, offers them with critical intelligence which might assist them in serving consumers better, offers them with operational support and other objectives. Keeping this in consideration, the aggressive system of intelligence is focused on bridging the gap by providing superior quality intelligence like the dynamics of the market, competitions and other various activities.
The authority had taken into assumption numerous things which were not true, in every regard. This was clearly expressed in ways which were lacking either the proper experience in regards to the development of the system or the management of the project or they were too sluggish while the project was going on. A proper plan for the project is not made on the basis of unrealistic suppositions. The project needed realistic suppositions which are based on broad contextual research. The biggest mistake which was made by the main management was to initiate the whole project on the basis of various suppositions. The first and major supposition was the fact that only one model of aggressive system of information was present and that this model was sufficient for the entire project. The management was not knowledgeable regarding the numerous system of intelligence – which were being presently used – within the market have been personalized and modified in accordance with the requirements and wants of a specific company. Due to this misinterpretation or lack of comprehension, the authority made a decision to duplicate attributes of the present model within their patented and future aggressive system of information. Additionally, they believed that the present system can be transferred without any alterations being done. The plan of the project was the most critical phase of all the project phases. If anything which might get sabotaged during this phase, the whole project might be sabotaged and a digestive system could be produced which might be quite hazardous. This supposition was done at the very start and it proved to be quite successful, but it may have been a failure. This is due to the fact that a complicated system of information is unique to the company and an individual system which works for all companies is quite rare.
A precise instance for a proper planning of a project was the time when the authority took the decision to locate the proper standards of the industry and the finest practices. They precisely segmented the whole team of the project into two teams – the 1st team were the internal team who were accountable for creating the groundwork, interface and handling the critical functional components of the whole project. The 2nd team were the external team. This team was made up of consultants and specialists of the industry who were assumed to do the proper research so that the finest practices and standards of the industry. If a project has the real-world standards, standards of the industry and uses the finest practices, it will assist in production of a properly efficient and approved system. This will additionally assist in the production of systems that are powerful, simple to create and straightforward to integrate. On top of this, the project that utilizes the finest practices and benchmarks tend to be more complete and successful.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download