The united states from lower slovenia

Assignment Help Basic Computer Science
Reference no: EM131034354

Business Case

Ernest Rasche and his wife, Estelle, immigrated to the United States from Lower Slovenia in 1921, settling in Muncie Indiana. Rasche had been a talented plumber in the old country; he quickly found work at the XYZ Plumbing Supply Company. Nine years later, with his life savings and a small loan from the Second National Bank of Muncie, Rasche was able to purchase the XYZ Plumbing Supply Company from its owner, who had decided to retire. The Rasches had five children. One by one each child left home, starting his or her own franchise of the XYZ Plumbing Supply Company in a different city.

Over the years the XYZ Plumbing Supply Company and its franchises proved quite successful. There are now a total of twenty-three offices across the United States. Each has its own IT department, servers, and network attached storage (NAS). All use the same business applications: Accounts Payable, Accounts Receivable, General Ledger, Inventory Management, as well as their own customer-facing website.

George Rasche, Ernest Rasche's grandson, is currently CEO of XYZ Plumbing Supply Company, Inc. Martha Wilson, XYZ's Chief Technical Officer (CTO), has proposed to Rasche that they centralize IT by developing a private cloud. Her proposal is to buy commercial blade servers, racks, and NAS from the Acme Computer Company. Zenith Software will be responsible for porting the current business applications to the private cloud. Argos Data Centers, Inc., will upgrade the physical facility to ensure adequate cooling, power, and physical security. The private cloud will be operated and maintained by the XYZ Plumbing Supply Company IT department. Rasche agrees to the plan, proving that (1) operations will not be disrupted, and (2) work will be completed in 18 months. Martha Wilson will be the Project Manager.

Assignment 3: Work Breakdown Structure (WBS) (20 points)

Develop a WBS for this Project. DO NOT DEVELOP A GANTT CHART. All I want to see is a task decomposition. See Marchewka p. 133, Figure 5.9 for an example. Insert your WBS below.

<insert WBS here>

Assignment 4: Risks (10 points)

Fill in the following:

Internal Negative Risk 1: __________________________________________

Internal Negative Risk 2: __________________________________________

Internal Negative Risk 3: __________________________________________

External Negative Risk 1: __________________________________________

External Negative Risk 2: __________________________________________

External Negative Risk 3: __________________________________________

External Negative Risk 4: __________________________________________

External Negative Risk 5: __________________________________________

Internal Positive Risk 1: __________________________________________

External Positive Risk 2: __________________________________________

Assignment 5: Risk Management (18 points)

For each negative risk above, indicate whether you will avoid, accept, mitigate, or transfer the risk, and how (2-3 sentences).

Internal Negative Risk 1: accept, avoid, mitigate, or transfer (choose 1)

How?

Internal Negative Risk 2: accept, avoid, mitigate, or transfer (choose 1)

How?

Internal Negative Risk 3: accept, avoid, mitigate, or transfer (choose 1)

How?

External Negative Risk 1: accept, avoid, mitigate, or transfer (choose 1)

How?

External Negative Risk 2: accept, avoid, mitigate, or transfer (choose 1)

How?

External Negative Risk 3: accept, avoid, mitigate, or transfer (choose 1)

How?

External Negative Risk 4: accept, avoid, mitigate, or transfer (choose 1)

How?

External Negative Risk 5: accept, avoid, mitigate, or transfer (choose 1)

How?

Assignment 6: Outsourcing (20 points)

List five potential mistakes XYZ may make in outsourcing parts of this project. Explain how they can mitigate or avoid each mistake (2-3 sentences).

1. Mistake: _____________________________________________

Mitigate/Avoid: _____________________________________________

2. Mistake: _____________________________________________

Mitigate/Avoid: _____________________________________________

3. Mistake: _____________________________________________

Mitigate/Avoid: _____________________________________________

4. Mistake: _____________________________________________

Mitigate/Avoid: _____________________________________________

5. Mistake: _____________________________________________

Mitigate/Avoid: _____________________________________________

Reference no: EM131034354

Questions Cloud

Company a acquires company b. neither company : Company A acquires Company B. Neither company has an organization-wide Human Resources Risk Mitigation policy or process. Both companies know that, if they continue to grow, an organization-wide Human Resources Risk
Determine the work done on the piston by the gas : Determine the work done on the piston by the gas, in kJ/kg of mixture. Treat the water vapor as an ideal gas.
How to unlock iphone6 : How to unlock iphone6 because i forgot the password and apple ID?
Briefly describe the nibr : Discuss two (2) of these reasons. Do you believe that the government has the obligation to provide victim compensation? Provide two (2) supporting facts to justify your position.
The united states from lower slovenia : Ernest Rasche and his wife, Estelle, immigrated to the United States from Lower Slovenia in 1921, settling in Muncie Indiana. Rasche had been a talented plumber in the old country; he quickly found work at the XYZ Plumbing Supply Company.
What is the partial pressure of n2 in the mixture : A rigid tank is divided into two compartments by a partition. One compartment contains 3 kmol of N2 at 600 kPa and the other compartment contains 7 kmol of CO2 at 200 kPa.
What technologies are responsible for the recent increases : What technologies are responsible for the recent increases in transmission rates, both for fiber-optic cable and wifi?
Explain the phase transition phenomenon : Explain the phase transition phenomenon observed in 3-SAT - 'What can be said about the computation complexity of the problem X2. Is X2 NP-HARD
Use a wrapper class to convert : The BufferReader class's readLine method returns a line from a file as a String. If you need to perform calculations, you will need to convert the String object into a number. You can use a wrapper class to convert.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Explain dispatcher and data access object design

Prepare a two page paper comparing and contrasting five of design. Dispatcher - controls client access and re-directs or dispatches client requests to proper party which can be located on same or different tier.

  Include the terms iterative and recursive query

Describe the process a client would perform to resolve the name yahoo.com. Assume that the full DNS names resolution process must be performed. Include the terms iterative and recursive query

  Write a class encapsulating the concept of a rational number

Write a class encapsulating the concept of a rational number, assuming a rational number has the following attributes: an integer representing the numerator of the rational number another integer representing the denominator of the rational number

  Consider the following hypothesis test

Consider the following hypothesis test. H0: μ ≤40 H1: μ >40

  Explain how determine the process state and what are states

Explain how to determine the process state and what are the states a process can be in. (Hint: use the man pages! You may have to do some cross referencing

  Actions for network devices, topologies, and network attacks

Identify the malicious threat sources to physical security and their corresponding countermeasures

  Where identifier is any valid identifier

Where identifier is any valid identifier and namespace-body is the set of classes, objects and functions that are included within the namespace.

  How management use smith systems consulting as outside

How Boardman Management Group should utilize Smith Systems Consulting as an outside consultant for this project. Include a discussion of why the specific elements of your plan are important.

  Describes the movement of inventory

Create a decision table that describes the movement of inventory and draw a decision tree that describes the merchandise inventory management process.

  What is the output of the following oddstuff method

What is the output of the following oddStuff method?

  What are the phases of an attack

What are the phases of an attack? Based on what you have read, which step is the "most important?" Explain. Why is it important to understand these phases once an attack is detected? How does knowing about these phases help you? In your opinion, is a..

  Work for gto broadband industries

You work for GTO Broadband Industries, a business that offers rural broadband Internet service and network server management. One of your jobs at the company is to present the company's services to local government and community meetings. Your b..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd