The united states from lower slovenia

Assignment Help Basic Computer Science
Reference no: EM131034354

Business Case

Ernest Rasche and his wife, Estelle, immigrated to the United States from Lower Slovenia in 1921, settling in Muncie Indiana. Rasche had been a talented plumber in the old country; he quickly found work at the XYZ Plumbing Supply Company. Nine years later, with his life savings and a small loan from the Second National Bank of Muncie, Rasche was able to purchase the XYZ Plumbing Supply Company from its owner, who had decided to retire. The Rasches had five children. One by one each child left home, starting his or her own franchise of the XYZ Plumbing Supply Company in a different city.

Over the years the XYZ Plumbing Supply Company and its franchises proved quite successful. There are now a total of twenty-three offices across the United States. Each has its own IT department, servers, and network attached storage (NAS). All use the same business applications: Accounts Payable, Accounts Receivable, General Ledger, Inventory Management, as well as their own customer-facing website.

George Rasche, Ernest Rasche's grandson, is currently CEO of XYZ Plumbing Supply Company, Inc. Martha Wilson, XYZ's Chief Technical Officer (CTO), has proposed to Rasche that they centralize IT by developing a private cloud. Her proposal is to buy commercial blade servers, racks, and NAS from the Acme Computer Company. Zenith Software will be responsible for porting the current business applications to the private cloud. Argos Data Centers, Inc., will upgrade the physical facility to ensure adequate cooling, power, and physical security. The private cloud will be operated and maintained by the XYZ Plumbing Supply Company IT department. Rasche agrees to the plan, proving that (1) operations will not be disrupted, and (2) work will be completed in 18 months. Martha Wilson will be the Project Manager.

Assignment 3: Work Breakdown Structure (WBS) (20 points)

Develop a WBS for this Project. DO NOT DEVELOP A GANTT CHART. All I want to see is a task decomposition. See Marchewka p. 133, Figure 5.9 for an example. Insert your WBS below.

<insert WBS here>

Assignment 4: Risks (10 points)

Fill in the following:

Internal Negative Risk 1: __________________________________________

Internal Negative Risk 2: __________________________________________

Internal Negative Risk 3: __________________________________________

External Negative Risk 1: __________________________________________

External Negative Risk 2: __________________________________________

External Negative Risk 3: __________________________________________

External Negative Risk 4: __________________________________________

External Negative Risk 5: __________________________________________

Internal Positive Risk 1: __________________________________________

External Positive Risk 2: __________________________________________

Assignment 5: Risk Management (18 points)

For each negative risk above, indicate whether you will avoid, accept, mitigate, or transfer the risk, and how (2-3 sentences).

Internal Negative Risk 1: accept, avoid, mitigate, or transfer (choose 1)

How?

Internal Negative Risk 2: accept, avoid, mitigate, or transfer (choose 1)

How?

Internal Negative Risk 3: accept, avoid, mitigate, or transfer (choose 1)

How?

External Negative Risk 1: accept, avoid, mitigate, or transfer (choose 1)

How?

External Negative Risk 2: accept, avoid, mitigate, or transfer (choose 1)

How?

External Negative Risk 3: accept, avoid, mitigate, or transfer (choose 1)

How?

External Negative Risk 4: accept, avoid, mitigate, or transfer (choose 1)

How?

External Negative Risk 5: accept, avoid, mitigate, or transfer (choose 1)

How?

Assignment 6: Outsourcing (20 points)

List five potential mistakes XYZ may make in outsourcing parts of this project. Explain how they can mitigate or avoid each mistake (2-3 sentences).

1. Mistake: _____________________________________________

Mitigate/Avoid: _____________________________________________

2. Mistake: _____________________________________________

Mitigate/Avoid: _____________________________________________

3. Mistake: _____________________________________________

Mitigate/Avoid: _____________________________________________

4. Mistake: _____________________________________________

Mitigate/Avoid: _____________________________________________

5. Mistake: _____________________________________________

Mitigate/Avoid: _____________________________________________

Reference no: EM131034354

Questions Cloud

Company a acquires company b. neither company : Company A acquires Company B. Neither company has an organization-wide Human Resources Risk Mitigation policy or process. Both companies know that, if they continue to grow, an organization-wide Human Resources Risk
Determine the work done on the piston by the gas : Determine the work done on the piston by the gas, in kJ/kg of mixture. Treat the water vapor as an ideal gas.
How to unlock iphone6 : How to unlock iphone6 because i forgot the password and apple ID?
Briefly describe the nibr : Discuss two (2) of these reasons. Do you believe that the government has the obligation to provide victim compensation? Provide two (2) supporting facts to justify your position.
The united states from lower slovenia : Ernest Rasche and his wife, Estelle, immigrated to the United States from Lower Slovenia in 1921, settling in Muncie Indiana. Rasche had been a talented plumber in the old country; he quickly found work at the XYZ Plumbing Supply Company.
What is the partial pressure of n2 in the mixture : A rigid tank is divided into two compartments by a partition. One compartment contains 3 kmol of N2 at 600 kPa and the other compartment contains 7 kmol of CO2 at 200 kPa.
What technologies are responsible for the recent increases : What technologies are responsible for the recent increases in transmission rates, both for fiber-optic cable and wifi?
Explain the phase transition phenomenon : Explain the phase transition phenomenon observed in 3-SAT - 'What can be said about the computation complexity of the problem X2. Is X2 NP-HARD
Use a wrapper class to convert : The BufferReader class's readLine method returns a line from a file as a String. If you need to perform calculations, you will need to convert the String object into a number. You can use a wrapper class to convert.

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd