Determine who is attending conferences and events

Assignment Help Management Information Sys
Reference no: EM131257158

Scenario

You have been asked to be the project manager for the development of an information technology (IT) project. The system to be developed will allow a large company to coordinate and maintain records of the professional development of its employees. The company has over 30,000 employees who are located in four sites: Florida, Colorado, Illinois, and Texas. The system needs to allow employees to locate and schedule professional development activities that are relevant to their positions. Sophisticated search capabilities are required, and the ability to add scheduled events to the employees' calendars is desired. The system needs to support social networking to allow employees to determine who is attending conferences and events. This will promote fostering relationships and ensure coverage of conferences that are considered of high importance.

Once an activity has been completed, employees will use the system to submit the documentation. The system should support notifications to management personnel whenever their direct reports have submitted documentation. The system should also notify employees if their deadline to complete professional-development requirements is approaching and is not yet satisfied.

There are several types of architectural views. For the given scenario, develop 2 architectural views.

There must be enough detail for the design to be handed off to an implementation team.

I need 2-4 pages.

Reference no: EM131257158

Questions Cloud

How exceptional customer service generate customer loyalty : How can you maximize a customer's expectations and perceptions about the customer service your company provides? How does exceptional customer service generate customer loyalty
List three management effectiveness metrics for scale : What are some of the advantages of using a distributed network management system in the corporate enterprise? What are some of the concerns that must be considered in order to provide an integrated network management solution to the enterprise?
How do markets allocate resources : How do markets allocate resources? How do taxes affect market outcomes? How do the effects depend on whether the tax is imposed on buyers or sellers?
In what ways could the ritz carlton monitor its success : In what ways could the Ritz-Carlton monitor its success in achieving quality? - Why might it cost the Ritz-Carlton less to "do things right" the first time?
Determine who is attending conferences and events : Once an activity has been completed, employees will use the system to submit the documentation. The system should support notifications to management personnel whenever their direct reports have submitted documentation. The system should also noti..
What is customer service in today business environment : First, you will explore the field of customer service and consider the following questions carefully. Write a minimum of one paragraph for each topic. What is customer service in today's business environment
Private savings and investments related together : How are public savings, national savings, private savings and investments related together?
What type of supervisor do most employees like to work for : What type of supervisor do most employees like to work for? Would they select a traditional, innovative, or supportive supervisor? Do you believe that employee personalities may influence what type of supervisor is favored?
What are some of the natural consequences of borrowing money : Thread: The world of finance teaches that borrowing money can be a high-risk, high-reward option. Scripture has some passages that seem to clearly warn people to be cautious about getting into debt. What are some of the natural consequences of borrow..

Reviews

Write a Review

Management Information Sys Questions & Answers

  Different components of security auditing architectre

Explain different components of security auditing architecture. How is computer security influenced by Security awareness, training, and education

  Creates a competitive advantage for the company

Imagine that a company has developed an advanced technology that allows it to reduce its data center requirements by an unprecedented amount, and creates a competitive advantage for the company in the data center market

  What steps would you take to bring facility into compliance

Read the article in the e-Activity. It suggests that many medical facilities may have been complacent about data security. If your were a CSO (Chief Security Officer) or CCO (Chief Compliance Officer) of a facility that did not have good access ..

  It researchresearch and apply the content from a minimum of

it researchresearch and apply the content from a minimum of three recent articles about a topic of interest.produce a

  What type of control would you use

If you were creating an application to allow college students to declare their major, what type of control would you use to represent choices for the major

  Compare types and role of distributed software architecture

Determine whether or not there are definite characteristics of organizations that are more likely to use cloud computing than other organizations. Provide a rationale for your response.

  Identify the data components of each object

Identify all the (relevant) nouns and verbs. From the list of nouns, select the objects. Identify the data components of each object.

  Discuss value and security risks of virtual private network

Discuss the value and security risks of virtual private network (VPN) usage. Discuss how an organization can enable business needs while limiting risk with proper use of VPNs and related solutions, such as desktop virtualization. 200 words

  Can an individual succeed when a system fails

Important information about Systems Thinking - What is the relationship between systems thinking and individual success within an organization? Can an individual succeed when a system fails?

  What are some of the measures database administrators

This addresses data security, hierarchy, & related issues and what are some of the measures database administrators take to provide secured operation across a business organization?

  The literature review section describes in detail other

the literature review section describes in detail other studies that have been conducted that deal with the same or

  Determine the allocation of variable costs

Allocation of variable costs - What amount of variable costs will be allocated when a division uses a minute of computer time?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd