Bringing an organization products

Assignment Help Basic Computer Science
Reference no: EM13927292

Introduction

This is an individual project. This project is related to the Case Study project. Each student must complete an Architectural Diagram that illustrates the placement of security and other technologies within the converged network solution. The foundation for this project is the requirements analysis and proposal document that you completed for the Case Study project. The target audience will be the organization's Chief Information Officer (CIO). The Architectural Diagram deliverable is an MS Word document.

Case Study

Company Overview

Universal Transport, Inc. (UTI) is a global logistics provider that offers fully integrated freight and supply chain services through managed warehousing and domestic and international freight forwarding. Services range from door-to-door domestic and international delivery services to total supply chain management. With branches across the United States and Europe and partners worldwide, UTI continues to expand, and it has experienced rapid growth through acquisitions.

Note: The term supply chain refers to all the elements involved in bringing an organization's products from the raw-goods stage to the customer.

The Association for Operations Management (APICS) dictionary ((https://www.apics.org/Resources/APICSDictionary.htm) defines "supply chain management (SCM)" as the design, planning, execution, control, and monitoring of supply chain activities with the objective of creating net value, building a competitive infrastructure, leveraging worldwide logistics, synchronizing supply with demand and measuring performance globally.

The Business Challenge

UTI is competing in an environment where freight transport is as much about keeping customers informed as it is about on-time delivery. The company has adopted web-based technologies for tracking freight, differentiating its services, keeping customers informed, and ensuring the on-time delivery that is UTI's hallmark. As a result, UTI enjoys a very high level of customer satisfaction.

Its mobile workforce has rapidly increased, with drivers using PDAs to scan consignments, which are then synced in real time via GPRS links to headquarters applications that track the consignments. Customers use UTI's web services to view the progress of orders, from dispatch to warehousing to final delivery. Customers also use UTI's web-based systems to create freight documentation and generate reports. With the EDI interface, invoices and payments are transferred directly between the customers' systems and UTI, saving both time and money.

As the company has expanded, the data flowing in the system have increased as well. Now, with more than 5,000 employees and thousands of customers worldwide, UTI is suffering from the effects of explosive growth. Demands on its wide area network (WAN) are exceeding capacity. The main data center has experienced several network outages and unscheduled downtime. The aging ISDN telephone system is failing, as the company has avoided the costly upgrades necessary to keep it operating at optimal performance.

Telephone bills have increased without warning, and the voice mail system is overloaded.

The Opportunity

UTI wants to provide increased bandwidth between all 47 of its US offices and the main data center located in Chicago. There are three regional business centers that have four to eight satellite locations that need to able communicate and exchange data daily. These are located in Chicago, Kansas City, and Tampa. The company desires a reliable and secure network to accommodate its planned growth without exceeding 85% of capacity.

The company does not want to spend any more on telephone services than it does today, and its goal is to upgrade the services while protecting against escalating costs from its ISDN service provider.

Efficiency and productivity goals for this rapidly growing company are of paramount importance, and there is a desire to provide capabilities and services that incorporate technology solutions to improve in those areas as well as retain the high level of customer satisfaction. UTI is also interested in reducing travel between its sites by implementing video conferencing.

In addition, UTI wants to be able to monitor and manage data and voice service and ensure that capacity and performance is consistent with its business needs.

The Deliverable

For this assignment, you will use your proposed solution for the UTI requirements analysis. Briefly describe the proposed technology solution and list the business requirements (including security requirements) that are satisfied. This should be done on one (1) page. Then provide a diagram that illustrates the placement of various communications components within the context of developing an effective, efficient, security posture for the proposed solution for TUI's converged network.

Reference no: EM13927292

Questions Cloud

How do the us and china compare on these dimensions : How do the US and China compare on these dimensions? What should you do if he/she finds the cultural traditions of another country morally offensive
It-corporate transformation : List and explain all the business opportunities or the business values that are created by the network economy.  How do human capital, structural capital, and customer capital differ? Please analyse each and provide supporting facts.
Which value chain model is being used : Describe how this organization utilizes its value chain within that country. Which value chain model is being used?
Describe disrupted effective communication : What issues arose that disrupted effective communication with the group members
Bringing an organization products : This is an individual project. This project is related to the Case Study project. Each student must complete an Architectural Diagram that illustrates the placement of security and other technologies within the converged network solution.
Industrial robot units assigned to each of six task category : An industrial group reports that there were approximately 122,000 industrial robots operating in a region last year. The graph shows the percentages of industrial robot units assigned to each of six task categories.
Hybrid cars are not as efficient as electric cars : Follow the directions below for the completion of your Research Paper Draft 1 (the review of literature). If you have questions, please email your professor for assistance. As always, you may also seek out the guidance of the Success Center; the t..
How does risk management impact an organization : How does risk management impact an organization? A. Affects the survivability B. Increases the profitability C. Does not affect the profitability D. Does not affect the survivability
What are financial markets : What function do they perform?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write a function called class average

Write a function called class Average that takes in an array of numbers and, after normalizing the grades in such a way that the highest corresponds to 100, returns the letter grade of the class average.

  Calculate the sum of all the elements of firstarray

Calculate the sum of all the elements of FirstArray and put the sum in EAX. Use indirect addressing to access the elements of array.

  Identify the system high and system low

Draw a lattice of a 2-element set ordered by inclusion.

  The determinants of the demand for money

1) Formulate the square root rule for optimum transactions balances, and discuss its conclusions with respect to the determinants of the demand for money

  It will be more difficult for them to create exploits

Security through obscurity...this expression suggests that proprietary software is more secure because it is closed. If hackers cannot see the code, then it will be more difficult for them to create exploits...or so the thinking goes.

  What are the server-side attacks

What are the server-side attacks? What are the techniques a developer can employ to minimize these attacks?What are some of the individual rights associated with information privacy? Do expectations of privacy change depending on the individual's env..

  Write a complete java program called scorer

Write a complete Java program called Scorer that declares a 2-dimensional array of doubles called scores with three rows and three columns. Use a nested while loop to get the nine (3 x 3) doubles from the user at the command line. Finally, use a nest..

  Super computer accessories limited

Super Computer Accessories Limited .Every company during its establishment usually among its long-term goals is expansion and development.

  Identify thon raw-war, & waw dopondoncios

Rename the registers (below) to prevent dependency conflicts; identify  initial register values by the subscript "a" and subsequent values by sequential alphabetical letters.

  What is effect of control hazards on cpi for pipeline

What is the effect of control hazards on the CPI for this pipeline? Consider the two cases of "predict branch not taken" and "predict branch taken".

  Your manager has decided that the throughput

Your manager has decided that the throughput of your file server can be improved by replacing your old SCSI-2 host adapter with a "fast and wide" SCSI-3 adapter. It has also been decided that the old SCSI-2 drives will be replaced with "fast and w..

  Write a select statement that returns four columns

Write a Select statement that returns four columns from the Invoices table, named Number, Total, Credits, and Balance

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd