Our Internet based company with the gross revenues of more than $35 million dollars per year. We are planning to merge with multinational company of equal size. Our company currently uses operational systems and relational databases but desire to expand into data warehousing. We will be integrating different technologies from different solution providers and incorporate industry best practices in connection with the development of technological system. Internet-based industry is a growing industry with most companies having an annual growth between 6.5% and 8%. This is due to businesses that are becoming increasingly aware of the need for market information and the desire to reduce customer turnover rates in a hard hit economy.
A significant trend in this industry is the growing number of clients who wish to outsource telemarketing functions to client companies instead of developing such infrastructure in-house. Role and responsibilities:
a.Chief Information Officer – It provides assistance to senior management on IT related tasks. b.Develop and maintain IT infrastructure.
c.Develop efficient design to implement operations of the company.
d.Information System specialist – It designs and administers infrastructure development and support. e.Database administration – Storing data and mining it for future goals of the company. f.Project Manager – Will be responsible for managing the project issues. g.System Analyst – He/She analyzes the whole system and conduct technical research. Also prepares documentation for future goals. h.System Administrator – He or she will be responsible for resolving internal network issues of the company. Data collection
a)SP-based data – It is the data collected over network traffic. It provides data to tool vendor. It does not collect secure data. b)Panel based data – It collects internet user data.
c)Tool-monitoring data – It is installed at user end. Alexa is one of the examples in this category. d)Online monitoring data – Here user takes survey and provides data to company. Description of Information System
Databases include the open SQL database where process values, batch data and messages are stored. It provides client-server architecture for displaying data. Along with displaying of data, user can also evaluate data, analysis data and generate reports.
Positioning – The Company has online database for processing data, messages, batch and manual data input processing. It has two integrations: Vertical integration where processing of data is done for office area (ERP) and Horizontal integration where archival of data of various archival system takes place. Hardware & Software
a)Hardware Server – P IV (minimum), 1 GB main memory, 100 GB hard drive b)Hardware Client – PII (minimum) 500 MHz
c)Operating System Server – Windows 2000 Server or Windows 2003 Server d)Operating System Client – Windows 2000 or Windows XP
e)Database Server – Sybase or Microsoft SQL Server 2000
f)Database : Sybase/Microsoft SQL Server
a)Process Values (500 – 15.000 Values/min)
f)Batch Archiving, Batch Reports (incl. electronic signature) g)Manual Data/Value Correction
l)Interface “Web Server”
o)Interface “Other Systems”
Type of Business
The company’s expertise in Web Analytics includes the following functions :
Online traffic analysis
Content research and analysis
Conversion rate analysis
Data Mining and Social Media Analytics
Management of the Campaign from its Execution to completion along with ROI Analysis Acquisition and Cross-sell/Up-sell Analytics
Finance and Business research
The company’s expertise in Finance and Business research supports its client’s strategic decision making and day to day operations by assisting with intelligence, research and reports. A detailed company and Industry based research
Tear Sheets and Company profiles.
Analysis of value chain, Stocks, Shareholdings and SWOT
Benchmarking of Industries and detailed sector reports
Market entry and positioning strategy
Trend Analysis and future predictions
Economic and Demographic studies
Corporate Finance and M&A Support
Support for preparing of Pitch Book
Benchmarks and Comparisons, LBO Models
Valuations and Financial Analysis
Financial Models and Predictions
Online Panel Management (“Financial data solutions,” )
Data Management and Processing
Scripting and Coding
Content Analysis (for Qualitative DIs and GDs)
Validation of Report
Charting the Tabulated data
Presentation reports on major presentation software
Market Research Analytics
Offshore and outsourcing activities includes the following
Data Processing and Data Conversion -Data Collection and processing in MS Excel, CSV and Other databases format to SPSS, Quantum, SASetc for further processing. Data Processing: Banner Tables
Data processing and converting in tabulated form
Data Processing: Data Analysis Services
Advanced statistical services to promote fact based decision making for companies. Interfaces
The company’s IS has interfaces for evaluating data i.e. reports defined by users with MS Office (Excel and Microsoft word), standard components of software like Crystal reports and Business Objects. Since the company is less two years old, it is using Google Analytics as its web analytics tool.
Cloud Technology and Virtualization:
Businesses today depend upon IT to drive and accelerate past competitors. Increasingly cloud computing enables business to deliver new services, enter into new market, get closer to customers, and make increasingly mobile and demanding employees more productive. The most successful organizations use cloud technologies as a catalyst to put in place new systems and process that free IT organizations to maximize not just operational metrics, but business results. Cloud computing empowers IT through flexible, automated infrastructures, new on-demand service models and new levels on IT efficiency. All this allow IT to shift resources from maintaining existing systems to invest in building innovative services that drive new revenue, improve operations and advance business goals. Infrastructure and Security
The company has implemented security policies Enterprise Security Policy, Issue-Specific Security Policy and Systems- Specific Security policy. It follows NIST security model and follows IETF security architecture. It has chosen firewalls based on generation and structure. Along with this, it implements a type of Intrusion Detection and Prevention System. Privileges are defined for accessing Virtual Private Network (Kent, 2006). Security cannot be achieved by merely implementing various security systems, tools or products. However security failures are less likely through the implementation of security policy, process, procedure and product(s). Multiple layers of defense need to be applied to design a fail-safe security system. The idea behind multi-layered defense security is to manage the security risk with multiple defensive strategies, so that if one layer of defense turns out to be inadequate, another layer of defense will, ideally, prevent a full breach. The author believes that, at a minimum, managers must apply a range of security perimeter defenses so that their resources are not exposed to external attacks and ensure that the security system is not limited by the weakest link of the security layer.
Cite this Project Deliverable 1: Project Plan Inception
Project Deliverable 1: Project Plan Inception. (2016, Jul 22). Retrieved from https://graduateway.com/project-deliverable-1-project-plan-inception/