The united states from lower slovenia

Assignment Help Basic Computer Science
Reference no: EM131034354

Business Case

Ernest Rasche and his wife, Estelle, immigrated to the United States from Lower Slovenia in 1921, settling in Muncie Indiana. Rasche had been a talented plumber in the old country; he quickly found work at the XYZ Plumbing Supply Company. Nine years later, with his life savings and a small loan from the Second National Bank of Muncie, Rasche was able to purchase the XYZ Plumbing Supply Company from its owner, who had decided to retire. The Rasches had five children. One by one each child left home, starting his or her own franchise of the XYZ Plumbing Supply Company in a different city.

Over the years the XYZ Plumbing Supply Company and its franchises proved quite successful. There are now a total of twenty-three offices across the United States. Each has its own IT department, servers, and network attached storage (NAS). All use the same business applications: Accounts Payable, Accounts Receivable, General Ledger, Inventory Management, as well as their own customer-facing website.

George Rasche, Ernest Rasche's grandson, is currently CEO of XYZ Plumbing Supply Company, Inc. Martha Wilson, XYZ's Chief Technical Officer (CTO), has proposed to Rasche that they centralize IT by developing a private cloud. Her proposal is to buy commercial blade servers, racks, and NAS from the Acme Computer Company. Zenith Software will be responsible for porting the current business applications to the private cloud. Argos Data Centers, Inc., will upgrade the physical facility to ensure adequate cooling, power, and physical security. The private cloud will be operated and maintained by the XYZ Plumbing Supply Company IT department. Rasche agrees to the plan, proving that (1) operations will not be disrupted, and (2) work will be completed in 18 months. Martha Wilson will be the Project Manager.

Assignment 3: Work Breakdown Structure (WBS) (20 points)

Develop a WBS for this Project. DO NOT DEVELOP A GANTT CHART. All I want to see is a task decomposition. See Marchewka p. 133, Figure 5.9 for an example. Insert your WBS below.

<insert WBS here>

Assignment 4: Risks (10 points)

Fill in the following:

Internal Negative Risk 1: __________________________________________

Internal Negative Risk 2: __________________________________________

Internal Negative Risk 3: __________________________________________

External Negative Risk 1: __________________________________________

External Negative Risk 2: __________________________________________

External Negative Risk 3: __________________________________________

External Negative Risk 4: __________________________________________

External Negative Risk 5: __________________________________________

Internal Positive Risk 1: __________________________________________

External Positive Risk 2: __________________________________________

Assignment 5: Risk Management (18 points)

For each negative risk above, indicate whether you will avoid, accept, mitigate, or transfer the risk, and how (2-3 sentences).

Internal Negative Risk 1: accept, avoid, mitigate, or transfer (choose 1)

How?

Internal Negative Risk 2: accept, avoid, mitigate, or transfer (choose 1)

How?

Internal Negative Risk 3: accept, avoid, mitigate, or transfer (choose 1)

How?

External Negative Risk 1: accept, avoid, mitigate, or transfer (choose 1)

How?

External Negative Risk 2: accept, avoid, mitigate, or transfer (choose 1)

How?

External Negative Risk 3: accept, avoid, mitigate, or transfer (choose 1)

How?

External Negative Risk 4: accept, avoid, mitigate, or transfer (choose 1)

How?

External Negative Risk 5: accept, avoid, mitigate, or transfer (choose 1)

How?

Assignment 6: Outsourcing (20 points)

List five potential mistakes XYZ may make in outsourcing parts of this project. Explain how they can mitigate or avoid each mistake (2-3 sentences).

1. Mistake: _____________________________________________

Mitigate/Avoid: _____________________________________________

2. Mistake: _____________________________________________

Mitigate/Avoid: _____________________________________________

3. Mistake: _____________________________________________

Mitigate/Avoid: _____________________________________________

4. Mistake: _____________________________________________

Mitigate/Avoid: _____________________________________________

5. Mistake: _____________________________________________

Mitigate/Avoid: _____________________________________________

Reference no: EM131034354

Questions Cloud

Company a acquires company b. neither company : Company A acquires Company B. Neither company has an organization-wide Human Resources Risk Mitigation policy or process. Both companies know that, if they continue to grow, an organization-wide Human Resources Risk
Determine the work done on the piston by the gas : Determine the work done on the piston by the gas, in kJ/kg of mixture. Treat the water vapor as an ideal gas.
How to unlock iphone6 : How to unlock iphone6 because i forgot the password and apple ID?
Briefly describe the nibr : Discuss two (2) of these reasons. Do you believe that the government has the obligation to provide victim compensation? Provide two (2) supporting facts to justify your position.
The united states from lower slovenia : Ernest Rasche and his wife, Estelle, immigrated to the United States from Lower Slovenia in 1921, settling in Muncie Indiana. Rasche had been a talented plumber in the old country; he quickly found work at the XYZ Plumbing Supply Company.
What is the partial pressure of n2 in the mixture : A rigid tank is divided into two compartments by a partition. One compartment contains 3 kmol of N2 at 600 kPa and the other compartment contains 7 kmol of CO2 at 200 kPa.
What technologies are responsible for the recent increases : What technologies are responsible for the recent increases in transmission rates, both for fiber-optic cable and wifi?
Explain the phase transition phenomenon : Explain the phase transition phenomenon observed in 3-SAT - 'What can be said about the computation complexity of the problem X2. Is X2 NP-HARD
Use a wrapper class to convert : The BufferReader class's readLine method returns a line from a file as a String. If you need to perform calculations, you will need to convert the String object into a number. You can use a wrapper class to convert.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Embedding the presidents

1. Create a web page that shows presidents by century. Keep it simple! 2. Load the USPresidents.xml through JavaScript. Leverage the ict4540min.js unless you are a JavaScript whiz! The zip file is here: ict4540JS.zip

  Rbocs in mfj to retain control of yellow pages

One way to provide additional revenues for the RBOCs in the MFJ was to retain control of the Yellow Pages.

  Possible particle configurations

consider a system with n=15 bins that can be filled with exactly one and only one particle. Assume there are two types of particles: type 1 and type 2.

  Determine if a number is factor or not

Implement a program to count the frequencyofwords in a text file. Thetext file is partitioned intoNsegments. Each segment is processed by a separate thread that outputs the intermediate frequencycount for its segment. The main process waits until ..

  Develop an effective research plan considering context

Develop an effective research plan considering context, research questions, sources, timeline, and larger implications for writing a formal research report

  An ideal embedded operating system

In an ideal embedded operating system, would all non-kernel threads always execute at lower priority than interrupts? Why?

  Identify scanning-enumeration tools about attack framework

Research and recommend at least 2 scanning and enumeration tools that your organization could use. Perform a scan against your home/personal machine or network, and supply the following information about your organization:

  Investigating storage options

Dan is a small business owner who depends on his computer to keep track of customer and sales data. He is investigating storage options because it is critical for him to ensure that his data is safe in the event of a computer failure.

  Explain computer software required to make computers work

Develop 5- to 7-slide PowerPoint presentation, providing the overview of how computers are used. Distinguish various kinds of computer software required to make computers work.

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Explaining laws dealing with computer crimes

Write and explain three recent laws dealing with computer crimes.

  Describe a scenario in which a network sniffer is warranted

Describe a scenario in which a network sniffer is warranted

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd