We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

See Pricing

What's Your Topic?

Hire a Professional Writer Now

The input space is limited by 250 symbols

What's Your Deadline?

Choose 3 Hours or More.
Back
2/4 steps

How Many Pages?

Back
3/4 steps

Sign Up and See Pricing

"You must agree to out terms of services and privacy policy"
Back
Get Offer

Project Deliverable 1: Project Plan Inception

Hire a Professional Writer Now

The input space is limited by 250 symbols

Deadline:2 days left
"You must agree to out terms of services and privacy policy"
Write my paper

Our Internet based company with the gross revenues of more than $35 million dollars per year. We are planning to merge with multinational company of equal size. Our company currently uses operational systems and relational databases but desire to expand into data warehousing. We will be integrating different technologies from different solution providers and incorporate industry best practices in connection with the development of technological system. Internet-based industry is a growing industry with most companies having an annual growth between 6.5% and 8%. This is due to businesses that are becoming increasingly aware of the need for market information and the desire to reduce customer turnover rates in a hard hit economy.

A significant trend in this industry is the growing number of clients who wish to outsource telemarketing functions to client companies instead of developing such infrastructure in-house. Role and responsibilities:

Don't use plagiarized sources. Get Your Custom Essay on
Project Deliverable 1: Project Plan Inception
Just from $13,9/Page
Get custom paper

a.Chief Information Officer – It provides assistance to senior management on IT related tasks. b.Develop and maintain IT infrastructure.
c.Develop efficient design to implement operations of the company.

d.Information System specialist – It designs and administers infrastructure development and support. e.Database administration – Storing data and mining it for future goals of the company. f.Project Manager – Will be responsible for managing the project issues. g.System Analyst – He/She analyzes the whole system and conduct technical research. Also prepares documentation for future goals. h.System Administrator – He or she will be responsible for resolving internal network issues of the company. Data collection

a)SP-based data – It is the data collected over network traffic. It provides data to tool vendor. It does not collect secure data. b)Panel based data – It collects internet user data.
c)Tool-monitoring data – It is installed at user end. Alexa is one of the examples in this category. d)Online monitoring data – Here user takes survey and provides data to company. Description of Information System

Databases include the open SQL database where process values, batch data and messages are stored. It provides client-server architecture for displaying data. Along with displaying of data, user can also evaluate data, analysis data and generate reports.

Positioning – The Company has online database for processing data, messages, batch and manual data input processing. It has two integrations: Vertical integration where processing of data is done for office area (ERP) and Horizontal integration where archival of data of various archival system takes place. Hardware & Software

a)Hardware Server – P IV (minimum), 1 GB main memory, 100 GB hard drive b)Hardware Client – PII (minimum) 500 MHz
c)Operating System Server – Windows 2000 Server or Windows 2003 Server d)Operating System Client – Windows 2000 or Windows XP
e)Database Server – Sybase or Microsoft SQL Server 2000
f)Database : Sybase/Microsoft SQL Server

Additional Modules
a)Process Values (500 – 15.000 Values/min)
b)Messages
c)Redundant Coupling
d)Data Backup
e)Backup Server
f)Batch Archiving, Batch Reports (incl. electronic signature) g)Manual Data/Value Correction
h)Excel Addin
i)Standard Reports
j)Document Archive
k)Electronic Signature
l)Interface “Web Server”
m)Parameter Control
n)Maintenance
o)Interface “Other Systems”
p)Development Toolkit
Type of Business

Web Analytics
The company’s expertise in Web Analytics includes the following functions :

Online traffic analysis
Content research and analysis
Conversion rate analysis
Data Mining and Social Media Analytics
CRM Analytics
Management of the Campaign from its Execution to completion along with ROI Analysis Acquisition and Cross-sell/Up-sell Analytics
Customer Retention

Finance and Business research
The company’s expertise in Finance and Business research supports its client’s strategic decision making and day to day operations by assisting with intelligence, research and reports. A detailed company and Industry based research

Tear Sheets and Company profiles.
Analysis of value chain, Stocks, Shareholdings and SWOT
Benchmarking of Industries and detailed sector reports
Business Intelligence
Market entry and positioning strategy
Trend Analysis and future predictions
Economic and Demographic studies
Corporate Finance and M&A Support

Support for preparing of Pitch Book
Benchmarks and Comparisons, LBO Models
Valuations and Financial Analysis
Equity Research
Financial Models and Predictions
Research Reports
Online Panel Management (“Financial data solutions,” )

Data Management and Processing
Data Processing
Scripting and Coding
Data Transcription
Validating Data
Content Analysis (for Qualitative DIs and GDs)
Presentation/Report Writing
Validation of Report
Charting the Tabulated data
Presentation reports on major presentation software
Market Research Analytics
Brand Modeling
Consumer Modeling
Market Segmentation
Targeting
Marketing Mix
Outsourcing Activities
Offshore and outsourcing activities includes the following
Data Processing and Data Conversion -Data Collection and processing in MS Excel, CSV and Other databases format to SPSS, Quantum, SASetc for further processing. Data Processing: Banner Tables
Data processing and converting in tabulated form
Data Processing: Data Analysis Services
Advanced statistical services to promote fact based decision making for companies. Interfaces
The company’s IS has interfaces for evaluating data i.e. reports defined by users with MS Office (Excel and Microsoft word), standard components of software like Crystal reports and Business Objects. Since the company is less two years old, it is using Google Analytics as its web analytics tool.

Cloud Technology and Virtualization:
Businesses today depend upon IT to drive and accelerate past competitors. Increasingly cloud computing enables business to deliver new services, enter into new market, get closer to customers, and make increasingly mobile and demanding employees more productive. The most successful organizations use cloud technologies as a catalyst to put in place new systems and process that free IT organizations to maximize not just operational metrics, but business results. Cloud computing empowers IT through flexible, automated infrastructures, new on-demand service models and new levels on IT efficiency. All this allow IT to shift resources from maintaining existing systems to invest in building innovative services that drive new revenue, improve operations and advance business goals. Infrastructure and Security

The company has implemented security policies Enterprise Security Policy, Issue-Specific Security Policy and Systems- Specific Security policy. It follows NIST security model and follows IETF security architecture. It has chosen firewalls based on generation and structure. Along with this, it implements a type of Intrusion Detection and Prevention System. Privileges are defined for accessing Virtual Private Network (Kent, 2006). Security cannot be achieved by merely implementing various security systems, tools or products. However security failures are less likely through the implementation of security policy, process, procedure and product(s). Multiple layers of defense need to be applied to design a fail-safe security system. The idea behind multi-layered defense security is to manage the security risk with multiple defensive strategies, so that if one layer of defense turns out to be inadequate, another layer of defense will, ideally, prevent a full breach. The author believes that, at a minimum, managers must apply a range of security perimeter defenses so that their resources are not exposed to external attacks and ensure that the security system is not limited by the weakest link of the security layer.

Cite this Project Deliverable 1: Project Plan Inception

Project Deliverable 1: Project Plan Inception. (2016, Jul 22). Retrieved from https://graduateway.com/project-deliverable-1-project-plan-inception/

Show less
  • Use multiple resourses when assembling your essay
  • Get help form professional writers when not sure you can do it yourself
  • Use Plagiarism Checker to double check your essay
  • Do not copy and paste free to download essays
Get plagiarism free essay

Search for essay samples now

Haven't found the Essay You Want?

Get my paper now

For Only $13.90/page