Develop in accordance with the sdlc

Assignment Help Basic Computer Science
Reference no: EM13851127

You are currently the Chief Information Officer (CIO) for an innovative Internet-based company with gross revenues of more than $35 million dollars per year. During an executive leadership meeting, you were told that your company will be merging with a multinational company of equal size and you will be responsible for developing a project plan to strategically integrate all systems, including databases and infrastructure. The Chief Executive Officer has given you sixty (60) days to deliver an information technology project plan in anticipation of the company merger. Your company will be expanding from one (1) floor to three (3) floors within six (6) months. Since this merger will be bringing two (2) fairly equal-sized companies together under one roof, the infrastructure must be redesigned to accommodate the increased needs. Your company currently uses operational systems and relational databases but desires to expand into data warehousing. All information technology (hardware and software) must be redesigned to meet organizational needs. The solution should be implemented in either a hosted solution, on-site solution, or a hybrid model. The CEO is expecting you to integrate different technologies from different solution providers and incorporate industry best practices in connection with the development of technological systems. In addition, the CEO is extremely interested in cloud technologies and virtualization but is leery of security issues; however, the CEO is sure that you will implement proper security protocols. The company currently consists of twenty five (25) employees but is expected to increase to sixty five (65) employees when the merger is complete.

Section 1: Project Introduction

Write a four to six (4-6) page project introduction that documents the current state of the organization prior to any development or enhancements, takes into account all the information given above, and includes the following:

Background information of the company.

Details regarding the type of business activities that the company is involved in.

Speculation on outsourcing and offshoring opportunities.

A description of the current information systems that the company has to support the business. The description should include an overview of the following:

operational systems, databases, and data warehousing.

cloud technology and virtualization.

network infrastructure and security.

Section 2: Project Plan

Use Microsoft Project to:

Create a project plan (summary and detailed) template. The project plan should:

Record all tasks, subtasks, resources, and time related to the project.

Outline the planning, analysis, design, and implementation phases.

Develop in accordance with the SDLC.

Reference no: EM13851127

Questions Cloud

What is liquid metallic hydrogen : What is liquid metallic hydrogen? Which planets contain this substance? What [conditions produce] this form of hydrogen
Find the year when maximum number of faculty : Find the year when maximum number of faculty were hired - List the number of courses (not offerings) taught in 2006 by faculty rank and department excluding the ones with zero courses taught.
Validating the operation of the dhcp server : Screenshots from your client device validating the operation of the DHCP server
Possible federal income tax effects of these transactions : What are the possible Federal income tax effects of these transactions - Comment on the availability of head-of-household filing in each of the following independent situations
Develop in accordance with the sdlc : A description of the current information systems that the company has to support the business. The description should include an overview of the following:
Conduct research on an artist from any movement : Conduct research on an artist from any movement. Choose one of their works. Analyze the image using the four visual cues: color, form, depth, and movement. Explain how the artist makes use of these four cues.
Write a basic 3d model viewer : Uses the provided skeleton code as a foundation for your application. You can modify it as you wish. Can load  model data from the model files with .dat extension provided on the Stream course page (this  functionality is provided in the skeleton cod..
Discuss and critique the two main planning methodologies : Discuss and critique the two main planning methodologies (Population and Institutional) that can be used in developing a health services plan.
Edward recognize income as a result of janets improvements : Discuss the probable justification for each of the following aspects of the tax law - Has the law in part (a) always been the rule and what is the justification, if any, for the current rule?

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  Create a diagram using Visio that lists different IT systems

Identify five different IT systems that have affected business in the past few years (i.e., business software applications, networks, hardware, internet-based technologies, databases).

  Print a header line with appropriate labels for each column

Print a header line with appropriate labels for each column. Format each data line to vertically align each column right-justified.

  Advantages of logging more information to alerts file

What are the advantages of logging more information to the alerts file? What are the disadvantages of logging more information to the alerts file?

  Find the average case complexity of sequential search

Find the average case complexity of sequential search in an array if the probability of accessing the last cell equals 1/2, the probability of the next to the last cell equals 1/4 .

  What exactly active directory folders purposes

Active Directory folders (not shared folders) are unique objects in Active Directory.

  Best practices for internetnetwork security

As you are exploring different ideas for your paper, note the research paper will require you to submit 8-10 double-spaced, typed pages with a minimum of 10 references regarding the topic: Best practices for internet/network security.

  Plan for processing the potential crime incident scene

Describe your plan for processing the potential crime/incident scene. Some of the items you will want to cover include

  Actions-hard disk crash and all data backed up are lost

You come to work on a Monday morning and find that the office computer is not working. The system manager informs everyone that the computer's hard disk crashed and that all datat that wer not backed up are lost. What do you do?

  Calculate interest earned in one year

Calculate the interest earned in 1 year given starting account balance B and annual interest rate I and supposing simple interst, that is no compounding.

  Computer fraud and abuse act

Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act (US Patriot Act), 2001, renewed 2006

  Intrusion detection systems

According to the textbook, Intrusion Detection Systems (IDS), which can be categorized as Host IDS (HIDS) and Network IDS (NIDS), is a means of providing real-time monitoring. Compare and contrast HIDS and NIDS, and provide at least one (1) exa..

  Create a sequentially numbered array

Create a sequentially numbered array of 50 integers. Then use the Random_range procedure to shuffle the array in a random order.(Each number will only appear once in the array.) Display the shuffled array.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd