Illustrate interface that organizational users will utilize

Assignment Help Computer Network Security
Reference no: EM131175137

Information Systems Paper

Project Deliverable: Analytics, Interfaces, and Cloud Technology

This assignment consists of two sections: a design document and a revised Gantt chart or project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

Large companies have been using the power of business analytics for quite a while now. Your company desires to get in on the action; company executives believe that using advanced data analysis will enable the company to make smarter decisions and improve business performance. Business analytics gives companies the ability to look at past realizations and performance as well as set up new expectations and performance goals. Analytics-as-a-Service is a new delivery model that uses cloud technology to provide business insights without enormous infrastructure enhancements. The executive team has heard great things about analytics and cloud technology but is apprehensive because they are unfamiliar with the look and feel of the technology. The executive team is interested in your recommendations and eagerly awaiting your forward-thinking viewpoint.

Section 1: Design Document

1. Write a four to six page design document in which you:

• Support the need for the use of analytics and cloud technology within this company.

• Create a workflow diagram to illustrate how analytics and cloud technology could align with the company's business processes. Note: The graphically depicted solution is not included in the required page length but must be included in the design document appendix.

• Create three to five screen layouts that illustrate the interface that organizational users will utilize. Note: The graphically depicted solution is not included in the required page length but must be included in the design document appendix.

• Give one recommendation for solution providers that could help your company secure a firm advantage by using analytics and cloud technology.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

• Include charts or diagrams created in MS Visio or Dia as an appendix of the design document. All references to these diagrams must be included in the body of the design document.

Section 2: Revised Project Plan

Use Microsoft Project to:

2. Update the project plan fromProject Deliverable 3: Database and Data Warehousing Design, with three to five new project tasks each consisting of five to ten sub-tasks.

The specific course learning outcomes associated with this assignment are:

• Demonstrate an understanding of existing and emerging information technologies, the functions of IS, and its impact on the organizational operations.

• Evaluate an organization through the lens of non-IT senior management in deciding how information systems enable core and supportive business processes as well as those that interface with suppliers and customers.

• Use technology and information resources to research issues in information systems.

• Write clearly and concisely about strategic issues and practices in the information systems domain using proper writing mechanics and technical style conventions.

Reference no: EM131175137

Questions Cloud

Determine the following statements : Atmospheric pressure is about 80 kPa (absolute). Water pressure at the base of a water tower is 600 kPa (gauge).
Explain how unions human resources management personnel : Assess the following statement, "Workers in the modern workplaces of America are well protected and well supported." Explain whether you agree or disagree with this statement, based on what you now know about government interventions, unions, HRM,..
Difference between recirculating and noncirculating : What is the difference between recirculating and noncirculating hot water systems, and where would the circulating system most likely be used?
Research environment management issues : 1. Research environment management issues for the workplace and state why these issues should be taken into consideration when planning and managing an organisation operations.
Illustrate interface that organizational users will utilize : Create three to five screen layouts that illustrate the interface that organizational users will utilize. Note: The graphically depicted solution is not included in the required page length but must be included in the design document appendix.
How change in income affect the familys emergency fund needs : The Hernandez family is experiencing some financial pressures, even though the couple has a combined income of $66,000.- How will this change in income affect the family's emergency fund needs?
What types of accommodations might be requested for group : There are other groups that are also protected by the ADA. Does the law protect each of the groups listed below? What types of accommodations might be requested for each group?
Levels of conceptualizing leadership : Pick any one of these levels of conceptualizing leadership and argue that it is the most important and useful for defining, describing and explaining leadership: intra-individual, dyadic, group, OR organizational.
Which will pay her r1 million at the end of each year : Jia has just won a R20 million lottery, which will pay her R1 million at the end of each year for 20 years.- . What will you tell her?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Explain how outsourcing can be used for risk transference

Describe how outsourcing can be used for risk transference. Name and briefly describe two examples/cases of risk transference in Australia that you believe this type of risk management helps to protect organisations interest. How is an application ..

  Describe the purpose of a risk assessment

Describe the purpose of a risk assessment , risk scope and identify critical areas for an assessment.

  It infrastructure management what to do for task 2a

what to do for task 2a 15 ltbrgt ltbrgtsubmit your enterprise architect blog as a single page with the web address of

  Explaining wan links for point-to-point home office address

Servers, administrative and support users 2 subnets with 50 hosts for faculty & student labs 10 or more WAN links for point-to-point home office address. Design the subnet?

  Analyse security procedures

Analyse security procedures

  Identify the common targets of malware

Identify the common targets of malware. Explain why these targets are so attractive to hackers and what they benefit from each and determine the best practices that should be implemented by the security department to help reduce the risks of malware..

  Discuss primary challenges related to maintaining security

Distributed applications and cloud computing have become a viable option within the LAN-to-WAN Domain. Discuss the primary challenges related to maintaining the security of both applications and data in such an environment

  Review an article which focuses on the basics of

write 400-600 words that respond to the following questions with your thoughts ideas and comments. this will be the

  Problems related to e commerce

Question 1: What are some elements of securing online transactions? Question 2: What are some elements of administering an e-commerce site?

  Security through obscurity in a computer situation

Give an example of security through obscurity in a computer situation. Give an example of security through obscurity in a situation not involving computers. Is security through obscurity an effective countermeasure in either example?

  Examine major challenge of enforcing policy concerning byod

Describe at least two (2) types of loss that can occur that a standard homeowners insurance policy does not cover. List and examine the major challenges of enforcing policies concerning BYOD, portable and mobile devices.

  Internet security cryptography

Public-key cryptography standards (PKCS) (Wang, 2012) are standards widely used by the Internet security community. For this Discussion, you will choose one of these standards and explain what it does.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd