What should a project coordinator from valley enterprises

Assignment Help Computer Engineering
Reference no: EM131166103

MANAGING A LATE PROJECT: WHEN TO SAY "WHEN"?

System projects are notorious for being late and over budget. When should management stop a project that is late or costing more than the intended budget? Consider this case: Valley Enterprises opted to implement Voice over Internet Protocol (VoIP) service in its Phoenix, Arizona, service area. The company has 15 locations in the Phoenix area, all with local area networks and all with secure Wi-Fi connections. The company's current phone system was designed and implemented in the 1950s, when Valley operated in three locations. As more locations were added, standard telecommunications solutions were implemented, with little thought devoted to compatibility. Over the years, phone services were added as new buildings and facilities arose. Valley CEO Doug Wilson heard of VoIP at a trade show and contacted TMR Telecommunications Consultants, requesting a bid. TMR spent a week with the CIO of Valley Enterprises, gathering data, and submitted a bid for $50,000 in late 2007. The project was to be started by March 2008 and completed by January 2009. The bid was accepted. TMR started the project in March 2008. In late July 2008, TMR was bought out by Advanced Communications of Scottsdale, Arizona. The merger delayed the project by over a month initially. In early September 2008, some of the same personnel from TMR, as well as a new project manager from Advanced Communications, went back to the project. By March 2009, the project had already cost $150,000 and only 8 of the locations had implemented VoIP. Advanced Communications insisted that the local area networks were obsolete and were unable to carry the expanded load without major upgrades to the bandwidth, the routers, and other telecommunications equipment.

QUESTIONS:

1. Is it time to end this project? Why or why not?

2. What negotiations should have occured between TMR and Valley Enterprises prior to December 2008?

3. What should a project manager/project coordinator from Valley Enterprises have done when the project first started to slip?

Reference no: EM131166103

Questions Cloud

What are the risks in stressing only one corner of triangle : What are the risks in stressing only one corner of the triangle? How would you have managed this project? Can you think of another approach that might have been more effective?
Complete the given table : Also, suppose the consumer has $180 to spend (M = $180), PY = 1, and that they spend all of their money on goods X and Y. Also, assume the consumer maximizes their utility subject to their budget constraint. Complete the following table
Every positive integer is a power of a prime number : For this purpose, it is helpful to know that if a prime divides a product of integers, then it divides one of the integers in the product. (Another way to say this is that if a prime is a factor of a product of integers, then it is a factor of one..
What is the economic order quantity : A Medical Center dispenses 250,000 bottles of brand name pharmaceutical annually. The optimal safety stock (which is on hand initially) is 1,000 bottles. Each bottle costs the center $10, inventory carrying costs are 30 percent, and the cost of ..
What should a project coordinator from valley enterprises : What negotiations should have occured between TMR and Valley Enterprises prior to December 2008? What should a project manager/project coordinator from Valley Enterprises have done when the project first started to slip?
Difference between catabolism and anabolism : What is metabolism - What is the difference between catabolism and anabolism?
Prove the sum principle for a union of n sets : Our arguments in favor of the sum principle were quite intuitive. In fact the sum principle for n sets follows from the sum principle for two sets. Use induction to prove the sum principle for a union of n sets from the sum principle for a union o..
Address the assumptions implicit in the models : Address the assumptions implicit in the models themselves as well as those you made during the valuation process.
What are the major functions of the blood : What are the major functions of the blood - What are the constituent elements of the blood?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Question1 what is dissimilarity between resident set

question1. what is dissimilarity between resident set management and page replacement policy?2. what is relationship

  Implement a superclass called appointment and subclasses

Improve your Appointment program by giving the user the option to add new Appointments. The user must specify the type of the appointment, the description, and the date and time.

  Sources must be cited in apa formatnbsp your response

sources must be cited in apa format.nbsp your response should be a minimum of one single-spaced pagenbspto anbspmaximum

  Program would update the account to reflect payment

After discussing this with your uncle, you agree to set up a computer and make a program that would keep track of his clients. It would calculate the bills and print invoices that would be mailed to the clients. It will also keep track of the clie..

  Find out local area network protocol over a nondeterministic

give the primary advantage of a deterministic local area network protocol over a nondeterministic local area network protocol. Give a real life example of this advantage.

  What are some of the more popular exception handling uses

Exception Handling in Java is a very powerful capability. Exception Handling allows us to check input, verify if files exist, precent division by zero, prevent array out of bounds, and a whole host of other things.

  Bit binary counter utilizing ltl.

State the three bit counter utilizing the LTL. The following are the properties we may wish to try and prove are valid given the specification of the three bit counter. Eventually the counter reaches 111.

  What is the memory operations dominate execution time

What is  the memory operations dominate execution time

  Questionconsider a very simple symmetric block encryption

questionconsider a very simple symmetric block encryption algorithm in which 32-bits blocks of plaintext are encrypted

  Create constructor for the class named car

Write down the statements to create an overloaded constructor for the class named Car. The constructors should support 0, 1, or 2 arguments. The first argument will denote the engine size and contain an Integer.

  Vulnerabilities of routers and web servers

Explain the vulnerabilities of routers and the Web servers and remediation strategies which will make them more secure.

  What suggestions do you have that could have improved

At this point, Anne has just a 14% response rate, which she is sure will not please her team leader. What suggestions do you have that could have improved Anne's response rate to the questionnaire?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd