SlideShare a Scribd company logo
TECHNOLOGY DESCRIPTION OF PROPOSED SOLUTION
Table of Content
Technical Description of Proposed
Solution
Architectural Diagram
Context Diagram
CostsV. TECHNICAL DESCRIPTION OF PROPOSED
SOLUTION
Trusty Carpets’ ERP/CRM SaaS technology solution will be
implemented by Sererra, a vendor that specialize in cloud
computing technology. The vendor will install, configure and
manage Trusty Carpets’ database virtually. Once the company’s
customer data is transferred, it is then stored in cloud-based
servers. The implementation of routers will give Trusty Carpets’
computers more versatility in gaining access to the internet and
servicing customers. The company’s employers and third-party
partners can retrieve and upload customer information, such as
general billing information, customer transactions, and inquires,
via the Internet by providing a user name and password. This
will enable all business entities remote access to the business
data with the use of any device with online capabilities. This
cloud-based technology will allow access to Trusty Carpets’
ERP/CRM application at anytime and anywhere.
Although the Sererra will provide the hardware infrastructure,
Trusty Carpets is responsible for acquiring the following
equipment: 24- Port switch, printer/scanner/fax/copier, All-in-
One desktop, 2 laptops and tablets that will be used by the
company’s employees. Verizon, the Internet Service Provider
(ISP) chosen by Trusty Carpets, will provide the wireless router
as well as a high-speed DSL business bundle package that
includes phone service. This wireless router offers firewall
protection. Verizon phone service offers call holding, call
forwarding, call waiting, 3-way calling, automatic callback,
voice mail, multiple phone lines, etc. which will allow Trusty
Carpets to provide excellent customer service to anyone calling
the business. The ISP will also provide 9 IP addresses and
webhosting services for Trusty Carpets’ staff. The wireless
router will allow the company’s sales staff wireless access
while on the premises. The ISP will provide anti-viral software
with the business package that Trusty Carpets’ will acquire.
Verizon Internet Service will provide Trusty Carpets internet
access to connect with Sererra cloud technology through a
front-end portal.
Trusty Carpets’ SaaS vendor will provide NetSuite ERP and
Microsoft Dynamics CRM software products that will provide
front and back office integration with the use of only one single
database system. The ERP software offers real-time view
needed for faster and better decisions; improve workforce
productivity with anytime and anywhere access. NetSuite ERP
also offers BPO Partnership program that will allow Trusty
Carpets’ and its partners a unified cloud-based ERP solution
which will permit shared client information. NetSuite ERP will
be used to help Trusty Carpets manage it business and
relationships while providing important benefits that will
increase revenue and decrease costs.
The chosen CRM software, Microsoft Dynamics, offers the
following: improves sales performance through forecasting and
commission management; elevates productivity across the
organization with an extended view of customers; offers
marketing automation; integrated ecommerce capabilities; and
the software is user-friendly. Micro Dynamics offers campaign
management that will enable design and supervision of tailored
campaigns across social media, email, and direct mail.
Microsoft Dynamics CRM with MailChimp integration will
allow Trusty Carpets to bulk emails, including newsletters and
store offers, to be sent out to customers from within the CRM.
This technology will also help Trusty Carpets build an email list
from social media sites and customers visiting Trusty Carpets’
website. Sererra will be responsible for building and managing
Trusty Carpets’ website and marketing campaign using the
latest search engine strategies. Information obtained from
customers on the website will automatically upload to the
company’s virtual database.
Serrera will integrate ERP/CRM software packages with the use
of NetSuite Open Air Connect. The NetSuite Open Air Connect
will also integrate Microsoft Office Business software, which
will be used for Trusty Carpets’ desktop application. Microsoft
Office Business application will enable Trusty Carpets’
employees to communicate with the one another as well as
customers and business partners via Outlook email accounts and
instant messaging. This software is a full office package that
also includes Word, Excel Spreadsheet, PowerPoint, Publisher,
OneNote and Lync. This software could be used to create
marketing materials, business reports and other business
documents. All current customer data and data required to
manage Trusty Carpets’ virtual system will be entered by
Sererra and will be maintained throughout the life of the
contract. Trusty Carpets’ staff will be responsible for inputting
new customers and potential customers’ information of
individuals that physically visit the store, after receiving proper
training on how to use the new technology. The vendor selected
will provide physical or virtual employee training at no
additional costs.
Verizon iPad Air 2 Tablets with CWR Mobile CRM mobile app
will be used by Trusty Carpets’ sales force while out in the
field. This app is available to individuals using Microsoft
Dynamics CRM. The CWR CRM application will give the sales
staff real-time access to customer accounts from the tablets. The
sales staff will also have the option of placing customer orders,
send and receive information within minutes. CWR Mobile
platform offers secure authenticated transmission and provide
the highest encryption levels available. If a device is lost or
stolen, Trusty Carpets can remotely delete all data from the
device. This tablet offers Touch ID fingerprint sensor for
additional data security.
The Verizon Jetpack offers Internet access outside of the office
and will be used by the sales staff in the field. The jetpack
offers connection up to 20 hours and doubles as a universal
charger for external devices. This hardware offers additional
security by enabling only selected devices to connect to it. The
Apple iPad Air2 also provides McAfee anti-viral and Asurion
Mobile protection. This protection enables Trusty Carpets’
sales staff to surf the web, check email and video chat without
compromising data security. Sererra offer IDSs, Intrusion
Detection Systems, which are implemented and used to observe
and document activities to identify impending invasions,
malicious actions and strategy violations.
For Trusty Carpets’ physical security, FrontPoint Security was
chosen. The security monitoring system will provide the
company with 24 hour monitoring; entry sensors and motion
sensors to protect the business from break-ins; smoke and heat
detectors that will alert the proper authorities if a fire occurs on
the premises; and flood, temperature and carbon monoxide
detectors. The plan offers cellular and internet monitoring as
well as follow-up notifications. The application of the proposed
technology solutions mentioned will enable centralized
management of all resources among the business and entities
involved. Incorporating this technical solutions will also offer
scalability which will support any future expansion goals.
Architectural Diagram:
Context Diagram:
Costs:
Assignment 4: Data Mining
Due Week 9 and worth 75 points
The development of complex algorithms that can mine mounds
of data that have been collected from people and digital devices
have led to the adoption of data mining by most businesses as a
means of understanding their customers better than before. Data
mining takes place in retailing and sales, banking, education,
manufacturing and production, health care, insurance,
broadcasting, marketing, customer services, and a number of
other areas. The analytical information gathered by data-mining
applications has given some businesses a competitive
advantage, an ability to make informed decisions, and better
ways to predict the behavior of customers. Write a four to five
(4-5) page paper in which you:
1.Determine the benefits of data mining to the businesses when
employing:
1.Predictive analytics to understand the behavior of customers
2.Associations discovery in products sold to customers
3.Web mining to discover business intelligence from Web
customers
4.Clustering to find related customer information
2.Assess the reliability of the data mining algorithms. Decide if
they can be trusted and predict the errors they are likely to
produce.
3.Analyze privacy concerns raised by the collection of personal
data for mining purposes.
1.Choose and describe three (3) concerns raised by consumers.
2.Decide if each of these concerns is valid and explain your
decision for each.
3.Describe how each concern is being allayed.
4.Provide at least three (3) examples where businesses have
used predictive analysis to gain a competitive advantage and
evaluate the effectiveness of each business’s strategy.
5.Use at least three (3) quality resources in this assignment.
Note: Wikipedia and similar Websites do not qualify as quality
resources.
Your assignment must follow these formatting requirements:
•Be typed, double spaced, using Times New Roman font (size
12), with one-inch margins on all sides; citations and references
must follow APA or school-specific format. Check with your
professor for any additional instructions.
•Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the
date. The cover page and the reference page are not included in
the required assignment page length.
The specific course learning outcomes associated with this
assignment are:
•Explain how information technology systems influence
organizational strategies.
•Evaluate the ethical concerns that information technologies
raise in a global context.
•Outline the challenges and strategies of e-Business and e-
Commerce technology.
•Use technology and information resources to research issues in
information systems and technology.
•Write clearly and concisely about topics related to information
systems for decision making using proper writing mechanics
and technical style conventions
rubric for this assignment
Points: 75
Assignment 4: Data Mining
Criteria
Unacceptable
Below 70% F
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1a. Determine the benefits of data mining to the businesses
when employing predictive analytics to understand the behavior
of customers.
Weight: 5%
Did not submit or incompletely determined the benefits of data
mining to the businesses when employing predictive analytics to
understand the behavior of customers.
Partially determined the benefits of data mining to the
businesses when employing predictive analytics to understand
the behavior of customers.
Satisfactorily determined the benefits of data mining to the
businesses when employing predictive analytics to understand
the behavior of customers.
Thoroughly determined the benefits of data mining to the
businesses when employing predictive analytics to understand
the behavior of customers.
1b. Determine the benefits of data mining to the businesses
when employing associations discovery in products sold to
customers.
Weight: 5%
Did not submit or incompletely determined the benefits of data
mining to the businesses when employing associations
discovery in products sold to customers.
Partially determined the benefits of data mining to the
businesses when employing associations discovery in products
sold to customers.
Satisfactorily determined the benefits of data mining to the
businesses when employing associations discovery in products
sold to customers.
Thoroughly determined the benefits of data mining to the
businesses when employing associations discovery in products
sold to customers.
1c. Determine the benefits of data mining to the businesses
when employing Web mining to discover business intelligence
from Web customers.
Weight: 5%
Did not submit or incompletely determined the benefits of data
mining to the businesses when employing Web mining to
discover business intelligence from Web customers.
Partially determined the benefits of data mining to the
businesses when employing Web mining to discover business
intelligence from Web customers.
Satisfactorily determined the benefits of data mining to the
businesses when employing Web mining to discover business
intelligence from Web customers.
Thoroughly determined the benefits of data mining to the
businesses when employing Web mining to discover business
intelligence from Web customers.
1d. Determine the benefits of data mining to the businesses
when employing clustering to find related customer information.
Weight: 5%
Did not submit or incompletely determined the benefits of data
mining to the businesses when employing clustering to find
related customer information.
Partially determined the benefits of data mining to the
businesses when employing clustering to find related customer
information.
Satisfactorily determined the benefits of data mining to the
businesses when employing clustering to find related customer
information.
Thoroughly determined the benefits of data mining to the
businesses when employing clustering to find related customer
information.
2. Assess the reliability of the data-mining algorithms. Decide
if they can be trusted and predict the errors they are likely to
produce.
Weight: 20%
Did not submit or incompletely assessed the reliability of the
data-mining algorithms. Did not submit or incompletely
decided if they can be trusted and did not submit or
incompletely predicted the errors they are likely to produce.
Partially assessed the reliability of the data-mining algorithms.
Partially decided if they can be trusted and partially predicted
the errors they are likely to produce.
Satisfactorily assessed the reliability of the data-mining
algorithms. Satisfactorily decided if they can be trusted and
satisfactorily predicted the errors they are likely to produce.
Thoroughly assessed the reliability of the data-mining
algorithms. Thoroughly decided if they can be trusted and
thoroughly predicted the errors they are likely to produce.
3a. Choose and describe three (3) concerns raised by the
collection of personal data for mining purposes.
Weight: 5%
Did not submit or incompletely chose and described three (3)
concerns raised by the collection of personal data for mining
purposes.
Partially chose and described three (3) concerns raised by the
collection of personal data for mining purposes.
Satisfactorily chose and described three (3) concerns raised by
the collection of personal data for mining purposes.
Thoroughly chose and described three (3) concerns raised by the
collection of personal data for mining purposes.
3b. Decide if each of these concerns is valid and explain your
decision for each.
Weight: 5%
Did not submit or incompletely decided if each of the concerns
is valid and did not submit or incompletely explained your
decision for each.
Partially decided if each of the concerns is valid and partially
explained your decision for each.
Satisfactorily decided if each of the concerns is valid and
satisfactorily explained your decision for each.
Thoroughly decided if each of the concerns is valid and
thoroughly explained your decision for each.
3c. Describe how each concern is being allayed.
Weight: 5%
Did not submit or incompletely described how each concern is
being allayed.
Partially described how each concern is being allayed.
Satisfactorily described how each concern is being allayed.
Thoroughly described how each concern is being allayed.
4. Provide at least three (3) examples where businesses have
used predictive analysis to gain a competitive advantage and
evaluate the effectiveness of each business’s strategy.
Weight: 30%
Did not submit or incompletely provided at least three (3)
examples where businesses have used predictive analysis to gain
a competitive advantage and did not submit or incompletely
evaluated the effectiveness of each business’s strategy.
Partially provided at least three (3) examples where businesses
have used predictive analysis to gain a competitive advantage
and partially evaluated the effectiveness of each business’s
strategy.
Satisfactorily provided at least three (3) examples where
businesses have used predictive analysis to gain a competitive
advantage and satisfactorily evaluated the effectiveness of each
business’s strategy.
Thoroughly provided at least three (3) examples where
businesses have used predictive analysis to gain a competitive
advantage and thoroughly evaluated the effectiveness of each
business’s strategy.
5. 3 references
Weight: 5%
No references provided
Does not meet the required number of references; some or all
references poor quality choices.
Meets number of required references; all references high quality
choices.
Exceeds number of required references; all references high
quality choices.
6. Clarity, writing mechanics, and formatting requirements
Project Management and Risk Management
Purpose of this Assignment
This assignment gives you the opportunity to apply the concepts
of the IFSM curriculum to develop a strategy for Project
Management and Risk Management for your proposed
technology solution. This assignment specifically addresses the
following course outcomes to enable you to:
· Evaluate, select, and apply appropriate analytical and
measurement methods/tools and system development life cycle
(SDLC) – methodologies to meet organizational needs.
· Research, assess, recommend/select, and implement
information technology that aligns with business needs and
meets business objectives.
· Effectively communicate with stakeholders orally, visually,
and in writing to determine stakeholders' business requirements,
explain how their requirements will be met, and provide
ongoing audience-appropriate information.
· Responsibly protect organizations' critical information and
assets by integrating cybersecurity best practices and risk
management throughout global enterprises.
· Plan, execute, and evaluate technology solutions to achieve
strategic goals by managing high-performing teams and
projects.
It also addresses the business strategy, project management, risk
management, SDLC and teamwork themes.
Assignment
The assignment is to develop Sections VI and VII of the
Business Case, which provide the Project Management Section
and Risk Management Section for the specific technical solution
being proposed.
1. Project Management. This section of the business case
provides a summary of the plan for managing and implementing
the proposed project. It should identify the members of the
Project Team, not by name, but by job function or skill set
required. It should identify the major phases of the System
Development Life Cycle (SDLC) with timelines for each phase
and include other related activities, as appropriate to the
proposed solution. A complete “Project Management Plan”
would be separately developed and contain much more detail
than is required here. This section should be completed in a
few short paragraphs, using tables or lists as appropriate.
2. Risk Management. For this section of the business case, the
Risk Matrix below will be completed. In addition to the matrix,
the most significant risks should be highlighted and pointed out
to the decision makers who will be using the Business Case.
The document “How To Guide to Risk Management” should be
used as a resource. For major projects, a separate “Risk
Management Plan” would be developed and contain much more
detail than is required here. This section should be completed
in a few short paragraphs in addition to the matrix.
3. Risk Matrix. Using the Case Study, the “How To Guide,”
and the IT solution you proposed, complete the risk analysis
matrix provided below, describing for each Area of Risk:
a. how that area applies to your proposed IT solution for the
Case Study,
b. the probability (High/Medium/Low) of its occurrence,
c. impact (High/Medium/Low) on the organization if it does
occur,
d. a strategy to mitigate the risk, and
e. a contingency plan in the event that it occurs.
Explanations of each of the Areas of Risk are available in the
document “How to Guide to Risk Management,” pages B3-B7.
Definitions for probability of occurrence and impact may be
found on page 7, an example of a mitigation strategy is given on
page 9, and an explanation of a contingency plan is on page 8 of
the same document. The table below may be copied, pasted and
completed. Do not limit your responses to the space shown in
table, but provide complete answers for “Description,”
“Strategy for Mitigation,” and “Contingency Plan.”
Area of Risk
Description
Probability of Occurrence
Impact
of Occurrence
Strategy for Mitigation
Contingency Plan
Strategic
Business
Feasibility
Risk of Creating a Monopoly
Capability to Manage Investment
Organization and Change Management
Dependencies and Interoperability
Security
Surety (Asset Protection)
Privacy
Project Resources
Schedule
Initial Cost
Life Cycle Cost
Technical Obsolescence
Technology Environment
Reliability of Systems
Data and Information
Overall Risk of Investment Failure
Assignment Submission
The group member responsible for submitting this assignment
will post it in the Assignment Folder and the appropriate Week
6 discussion area by the due date. The cover sheet for the Word
document should include the names of all team members who
contributed to the assignment. (Refer to the Group Project
Instructions for explanation of contributors.)
GRADING RUBRIC:
Criteria
90-100%
Far Above Standards
80-89%
Above Standards
70-79%
Meets Standards
60-69%
Below Standards
< 60%
Well Below Standards
Possible Points
Project Management
33-37 Points
The project management section is thorough, clearly described,
logical and appropriate to the Case Study and to the previously
submitted sections of the Business Case. All phases of the
SDLC, timelines and other related activities are included.
Demonstrates sophisticated analysis and critical thinking and
sophisticated writing.
30-32 Points
The project management section is complete, clearly described,
logical and appropriate to the Case Study and to the previously
submitted sections of the Business Case. All phases of the
SDLC, timelines and other related activities are included.
Demonstrates analysis and critical thinking and effective
writing.
26-29 Points
The project management section is logical and appropriate to
the Case Study and to the previously submitted sections of the
Business Case. All phases of the SDLC, timelines and other
related activities are included.
22-25 Points
The project management section may not be complete, may not
be clearly described, may not be logical and/or may not be
appropriate to the Case Study and/or the previously submitted
sections of the Business Case. All phases of the SDLC,
timelines and other related activities may not be included.
0-21 Points
No project manage-ment section is included, or minimal effort
is demon-strated.
37
Risk Management
13-15 Points
The Risk Management Section is thorough, clear, logical and
appropriate to the Case Study and to the previously submitted
sections of the Business Case. The most significant risks are
appropriately highlighted. Demonstrates sophisticated analysis
and critical thinking and sophisticated writing.
12 Points
The Risk Management Section is clear, logical and appropriate
to the Case Study and to the previously submitted sections of
the Business Case. The most significant risks are appropriately
highlighted. Demonstrates analysis and critical thinking and
effective writing.
10-11 Points
The Risk Management Section is appropriate to the Case Study
and to the previously submitted sections of the Business Case.
The most significant risks are appropriately highlighted.
9 Points
The Risk Management Section may be lacking in completeness
and/or clarity and/or logic; it may not be appropriate to the Case
Study and to the previously submitted sections of the Business
Case. The most significant risks may not be appropriately
highlighted.
0-8 Points
No risk manage-ment section is included, or minimal effort is
demon-strated.
15
Risk Matrix
34-38 Points
The Description, Probability, Impact, Mitigation Strategy and
Contingency Plan for each area of risk is appropriate, logical
and applies to the Case Study and the proposed solution.
Demonstrates sophisticated analysis and critical thinking and
sophisticated writing.
30-33 Points
The Description, Probability, Impact, Mitigation Strategy and
Contingency Plan for each area of risk is logical and applies to
the Case Study and the proposed solution. Demonstrates
analysis and critical thinking and effective writing.
27-29 Points
The Description, Probability, Impact, Mitigation Strategy and
Contingency Plan for each area of risk is logical and applies to
the Case Study and the proposed solution.
23-26 Points
The Description, Probability, Impact, Mitigation Strategy and
Contingency Plan for each area of risk may not be logical
and/or apply to the Case Study and/or the proposed solution.
Some areas may not be addressed.
0-22 Points
Risk matrix is not included, or minimal effort is demon-strated.
38
Format
9-10 Points
Submission reflects effective organization and sophisticated
writing; follows instructions provided; uses correct structure,
grammar, and spelling; presented in a professional format using
Word; any references used are appropriately incorporated and
cited using APA style.
8 Points
Submission is well organized; follows instructions provided;
uses correct structure, grammar, and spelling; presented in a
professional format using Word; any references used are
appropriately incorporated and cited using APA style.
7 Points
Submission is organized; follows instructions provided;
contains few errors in structure, grammar, and/or spelling;
presented in Word format; any references used are appropriately
incorporated and cited using APA style.
6 Points
Submission may not be well organized; and/or does not follow
instructions provided; and/or contains grammar and/or spelling
errors; and/or is not in Word format; and/or does not follow
APA style for any references and citations.
0-5 Points
Document is extremely poorly written and does not convey the
informa-tion.
10
TOTAL Points Possilbe
100

More Related Content

DOCX
TEAM CAPSTONESECTIONS VI & VIIPROJECT MANAGE.docx
DOCX
Katherine VieiraBusiness Systems Analysis and Design Milestone .docx
PPTX
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
PPTX
Tech 101
PDF
DecisionPoint Investor Presentation-January 2011
DOCX
1 it 210 final project guidelines and rubric over
PPTX
Tb mobile office presentation
PDF
COMPANY PROFILE
TEAM CAPSTONESECTIONS VI & VIIPROJECT MANAGE.docx
Katherine VieiraBusiness Systems Analysis and Design Milestone .docx
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
Tech 101
DecisionPoint Investor Presentation-January 2011
1 it 210 final project guidelines and rubric over
Tb mobile office presentation
COMPANY PROFILE

Similar to TECHNOLOGY DESCRIPTION OF PROPOSED SOLUTION.docx (20)

PDF
Caveo Corporation 10
PPTX
Technology 101 for small businesses
PDF
IBM mobile strategy at Innovate 2012
PDF
Strategic Architecture Presentation Pdf
PDF
Enterprise Mobility Apps for SBM
PPT
AIIM conference 2012
PPT
AIIM conference 2012 Presentation
PPT
I Cube Systems Private Limited
PDF
"Enterprise Mobile", Marco Nielsen
PPTX
Design Considerations When Building Cross Platform Mobile Applications
PDF
Buyers Lab Auto Store Review
PPSX
Appstory Company Presentation
PDF
ITIL ServiceNow offerings
PDF
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
PPTX
Server vs Client in real life and in programming world
PDF
Insurance Technology Trends
PPTX
Emedia technologie presentation
PPTX
Pc technologies product
PDF
Document Composition Case Study
PPTX
APPNATION IV - IBM - Phil Buckellew Keynote
Caveo Corporation 10
Technology 101 for small businesses
IBM mobile strategy at Innovate 2012
Strategic Architecture Presentation Pdf
Enterprise Mobility Apps for SBM
AIIM conference 2012
AIIM conference 2012 Presentation
I Cube Systems Private Limited
"Enterprise Mobile", Marco Nielsen
Design Considerations When Building Cross Platform Mobile Applications
Buyers Lab Auto Store Review
Appstory Company Presentation
ITIL ServiceNow offerings
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
Server vs Client in real life and in programming world
Insurance Technology Trends
Emedia technologie presentation
Pc technologies product
Document Composition Case Study
APPNATION IV - IBM - Phil Buckellew Keynote

More from mattinsonjanel (20)

DOCX
The changes required in the IT project plan for Telecomm Ltd would.docx
DOCX
The Catholic University of America Metropolitan School of .docx
DOCX
The Case of Frank and Judy. During the past few years Frank an.docx
DOCX
The Case of MikeChapter 5 • Common Theoretical Counseling Perspe.docx
DOCX
THE CHRONICLE OF HIGHER EDUCATIONNovember 8, 2002 -- vol. 49, .docx
DOCX
The chart is a guide rather than an absolute – feel free to modify.docx
DOCX
The Challenge of Choosing FoodFor this forum, please read http.docx
DOCX
The Civil Rights Movem.docx
DOCX
The Churchill CentreReturn to Full GraphicsThe Churchi.docx
DOCX
The Categorical Imperative (selections taken from The Foundati.docx
DOCX
The cave represents how we are trained to think, fell or act accor.docx
DOCX
The Case Superior Foods Corporation Faces a ChallengeOn his way.docx
DOCX
The Case You can choose to discuss relativism in view of one .docx
DOCX
The Case Study of Jim, Week Six The body or text (i.e., not rest.docx
DOCX
The Case of Missing Boots Made in ItalyYou can lead a shipper to.docx
DOCX
The Cardiovascular SystemNSCI281 Version 51University of .docx
DOCX
The Cardiovascular SystemNSCI281 Version 55University of .docx
DOCX
The Case of Jeff Pedophile in InstitutionJeff is a 35-year-old .docx
DOCX
The British Airways Swipe Card Debacle case study;On Friday, Jul.docx
DOCX
The Case Abstract Accuracy International (AI) is a s.docx
The changes required in the IT project plan for Telecomm Ltd would.docx
The Catholic University of America Metropolitan School of .docx
The Case of Frank and Judy. During the past few years Frank an.docx
The Case of MikeChapter 5 • Common Theoretical Counseling Perspe.docx
THE CHRONICLE OF HIGHER EDUCATIONNovember 8, 2002 -- vol. 49, .docx
The chart is a guide rather than an absolute – feel free to modify.docx
The Challenge of Choosing FoodFor this forum, please read http.docx
The Civil Rights Movem.docx
The Churchill CentreReturn to Full GraphicsThe Churchi.docx
The Categorical Imperative (selections taken from The Foundati.docx
The cave represents how we are trained to think, fell or act accor.docx
The Case Superior Foods Corporation Faces a ChallengeOn his way.docx
The Case You can choose to discuss relativism in view of one .docx
The Case Study of Jim, Week Six The body or text (i.e., not rest.docx
The Case of Missing Boots Made in ItalyYou can lead a shipper to.docx
The Cardiovascular SystemNSCI281 Version 51University of .docx
The Cardiovascular SystemNSCI281 Version 55University of .docx
The Case of Jeff Pedophile in InstitutionJeff is a 35-year-old .docx
The British Airways Swipe Card Debacle case study;On Friday, Jul.docx
The Case Abstract Accuracy International (AI) is a s.docx

Recently uploaded (20)

PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
master seminar digital applications in india
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
Presentation on HIE in infants and its manifestations
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
GDM (1) (1).pptx small presentation for students
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
Cell Types and Its function , kingdom of life
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Complications of Minimal Access Surgery at WLH
PDF
RMMM.pdf make it easy to upload and study
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
Lesson notes of climatology university.
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
master seminar digital applications in india
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
STATICS OF THE RIGID BODIES Hibbelers.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
Presentation on HIE in infants and its manifestations
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
GDM (1) (1).pptx small presentation for students
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Cell Types and Its function , kingdom of life
Microbial disease of the cardiovascular and lymphatic systems
Complications of Minimal Access Surgery at WLH
RMMM.pdf make it easy to upload and study
Anesthesia in Laparoscopic Surgery in India
Microbial diseases, their pathogenesis and prophylaxis
O5-L3 Freight Transport Ops (International) V1.pdf
Lesson notes of climatology university.
Chinmaya Tiranga quiz Grand Finale.pdf

TECHNOLOGY DESCRIPTION OF PROPOSED SOLUTION.docx

  • 1. TECHNOLOGY DESCRIPTION OF PROPOSED SOLUTION Table of Content Technical Description of Proposed Solution Architectural Diagram Context Diagram
  • 2. CostsV. TECHNICAL DESCRIPTION OF PROPOSED SOLUTION Trusty Carpets’ ERP/CRM SaaS technology solution will be implemented by Sererra, a vendor that specialize in cloud computing technology. The vendor will install, configure and manage Trusty Carpets’ database virtually. Once the company’s customer data is transferred, it is then stored in cloud-based servers. The implementation of routers will give Trusty Carpets’ computers more versatility in gaining access to the internet and servicing customers. The company’s employers and third-party partners can retrieve and upload customer information, such as general billing information, customer transactions, and inquires, via the Internet by providing a user name and password. This will enable all business entities remote access to the business data with the use of any device with online capabilities. This cloud-based technology will allow access to Trusty Carpets’ ERP/CRM application at anytime and anywhere. Although the Sererra will provide the hardware infrastructure, Trusty Carpets is responsible for acquiring the following equipment: 24- Port switch, printer/scanner/fax/copier, All-in- One desktop, 2 laptops and tablets that will be used by the company’s employees. Verizon, the Internet Service Provider (ISP) chosen by Trusty Carpets, will provide the wireless router
  • 3. as well as a high-speed DSL business bundle package that includes phone service. This wireless router offers firewall protection. Verizon phone service offers call holding, call forwarding, call waiting, 3-way calling, automatic callback, voice mail, multiple phone lines, etc. which will allow Trusty Carpets to provide excellent customer service to anyone calling the business. The ISP will also provide 9 IP addresses and webhosting services for Trusty Carpets’ staff. The wireless router will allow the company’s sales staff wireless access while on the premises. The ISP will provide anti-viral software with the business package that Trusty Carpets’ will acquire. Verizon Internet Service will provide Trusty Carpets internet access to connect with Sererra cloud technology through a front-end portal. Trusty Carpets’ SaaS vendor will provide NetSuite ERP and Microsoft Dynamics CRM software products that will provide front and back office integration with the use of only one single database system. The ERP software offers real-time view needed for faster and better decisions; improve workforce productivity with anytime and anywhere access. NetSuite ERP also offers BPO Partnership program that will allow Trusty Carpets’ and its partners a unified cloud-based ERP solution which will permit shared client information. NetSuite ERP will be used to help Trusty Carpets manage it business and
  • 4. relationships while providing important benefits that will increase revenue and decrease costs. The chosen CRM software, Microsoft Dynamics, offers the following: improves sales performance through forecasting and commission management; elevates productivity across the organization with an extended view of customers; offers marketing automation; integrated ecommerce capabilities; and the software is user-friendly. Micro Dynamics offers campaign management that will enable design and supervision of tailored campaigns across social media, email, and direct mail. Microsoft Dynamics CRM with MailChimp integration will allow Trusty Carpets to bulk emails, including newsletters and store offers, to be sent out to customers from within the CRM. This technology will also help Trusty Carpets build an email list from social media sites and customers visiting Trusty Carpets’ website. Sererra will be responsible for building and managing Trusty Carpets’ website and marketing campaign using the latest search engine strategies. Information obtained from customers on the website will automatically upload to the company’s virtual database. Serrera will integrate ERP/CRM software packages with the use of NetSuite Open Air Connect. The NetSuite Open Air Connect will also integrate Microsoft Office Business software, which
  • 5. will be used for Trusty Carpets’ desktop application. Microsoft Office Business application will enable Trusty Carpets’ employees to communicate with the one another as well as customers and business partners via Outlook email accounts and instant messaging. This software is a full office package that also includes Word, Excel Spreadsheet, PowerPoint, Publisher, OneNote and Lync. This software could be used to create marketing materials, business reports and other business documents. All current customer data and data required to manage Trusty Carpets’ virtual system will be entered by Sererra and will be maintained throughout the life of the contract. Trusty Carpets’ staff will be responsible for inputting new customers and potential customers’ information of individuals that physically visit the store, after receiving proper training on how to use the new technology. The vendor selected will provide physical or virtual employee training at no additional costs. Verizon iPad Air 2 Tablets with CWR Mobile CRM mobile app will be used by Trusty Carpets’ sales force while out in the field. This app is available to individuals using Microsoft Dynamics CRM. The CWR CRM application will give the sales staff real-time access to customer accounts from the tablets. The sales staff will also have the option of placing customer orders, send and receive information within minutes. CWR Mobile
  • 6. platform offers secure authenticated transmission and provide the highest encryption levels available. If a device is lost or stolen, Trusty Carpets can remotely delete all data from the device. This tablet offers Touch ID fingerprint sensor for additional data security. The Verizon Jetpack offers Internet access outside of the office and will be used by the sales staff in the field. The jetpack offers connection up to 20 hours and doubles as a universal charger for external devices. This hardware offers additional security by enabling only selected devices to connect to it. The Apple iPad Air2 also provides McAfee anti-viral and Asurion Mobile protection. This protection enables Trusty Carpets’ sales staff to surf the web, check email and video chat without compromising data security. Sererra offer IDSs, Intrusion Detection Systems, which are implemented and used to observe and document activities to identify impending invasions, malicious actions and strategy violations. For Trusty Carpets’ physical security, FrontPoint Security was chosen. The security monitoring system will provide the company with 24 hour monitoring; entry sensors and motion sensors to protect the business from break-ins; smoke and heat detectors that will alert the proper authorities if a fire occurs on the premises; and flood, temperature and carbon monoxide
  • 7. detectors. The plan offers cellular and internet monitoring as well as follow-up notifications. The application of the proposed technology solutions mentioned will enable centralized management of all resources among the business and entities involved. Incorporating this technical solutions will also offer scalability which will support any future expansion goals. Architectural Diagram: Context Diagram:
  • 8. Costs: Assignment 4: Data Mining Due Week 9 and worth 75 points The development of complex algorithms that can mine mounds of data that have been collected from people and digital devices have led to the adoption of data mining by most businesses as a means of understanding their customers better than before. Data mining takes place in retailing and sales, banking, education, manufacturing and production, health care, insurance, broadcasting, marketing, customer services, and a number of other areas. The analytical information gathered by data-mining applications has given some businesses a competitive advantage, an ability to make informed decisions, and better
  • 9. ways to predict the behavior of customers. Write a four to five (4-5) page paper in which you: 1.Determine the benefits of data mining to the businesses when employing: 1.Predictive analytics to understand the behavior of customers 2.Associations discovery in products sold to customers 3.Web mining to discover business intelligence from Web customers 4.Clustering to find related customer information 2.Assess the reliability of the data mining algorithms. Decide if they can be trusted and predict the errors they are likely to produce. 3.Analyze privacy concerns raised by the collection of personal data for mining purposes. 1.Choose and describe three (3) concerns raised by consumers. 2.Decide if each of these concerns is valid and explain your decision for each. 3.Describe how each concern is being allayed. 4.Provide at least three (3) examples where businesses have used predictive analysis to gain a competitive advantage and evaluate the effectiveness of each business’s strategy. 5.Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements:
  • 10. •Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. •Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: •Explain how information technology systems influence organizational strategies. •Evaluate the ethical concerns that information technologies raise in a global context. •Outline the challenges and strategies of e-Business and e- Commerce technology. •Use technology and information resources to research issues in information systems and technology. •Write clearly and concisely about topics related to information systems for decision making using proper writing mechanics and technical style conventions rubric for this assignment Points: 75 Assignment 4: Data Mining
  • 11. Criteria Unacceptable Below 70% F Fair 70-79% C Proficient 80-89% B Exemplary 90-100% A 1a. Determine the benefits of data mining to the businesses when employing predictive analytics to understand the behavior of customers. Weight: 5% Did not submit or incompletely determined the benefits of data mining to the businesses when employing predictive analytics to understand the behavior of customers. Partially determined the benefits of data mining to the businesses when employing predictive analytics to understand the behavior of customers. Satisfactorily determined the benefits of data mining to the businesses when employing predictive analytics to understand the behavior of customers. Thoroughly determined the benefits of data mining to the businesses when employing predictive analytics to understand the behavior of customers.
  • 12. 1b. Determine the benefits of data mining to the businesses when employing associations discovery in products sold to customers. Weight: 5% Did not submit or incompletely determined the benefits of data mining to the businesses when employing associations discovery in products sold to customers. Partially determined the benefits of data mining to the businesses when employing associations discovery in products sold to customers. Satisfactorily determined the benefits of data mining to the businesses when employing associations discovery in products sold to customers. Thoroughly determined the benefits of data mining to the businesses when employing associations discovery in products sold to customers. 1c. Determine the benefits of data mining to the businesses when employing Web mining to discover business intelligence from Web customers. Weight: 5% Did not submit or incompletely determined the benefits of data mining to the businesses when employing Web mining to
  • 13. discover business intelligence from Web customers. Partially determined the benefits of data mining to the businesses when employing Web mining to discover business intelligence from Web customers. Satisfactorily determined the benefits of data mining to the businesses when employing Web mining to discover business intelligence from Web customers. Thoroughly determined the benefits of data mining to the businesses when employing Web mining to discover business intelligence from Web customers. 1d. Determine the benefits of data mining to the businesses when employing clustering to find related customer information. Weight: 5% Did not submit or incompletely determined the benefits of data mining to the businesses when employing clustering to find related customer information. Partially determined the benefits of data mining to the businesses when employing clustering to find related customer information. Satisfactorily determined the benefits of data mining to the businesses when employing clustering to find related customer information. Thoroughly determined the benefits of data mining to the businesses when employing clustering to find related customer information.
  • 14. 2. Assess the reliability of the data-mining algorithms. Decide if they can be trusted and predict the errors they are likely to produce. Weight: 20% Did not submit or incompletely assessed the reliability of the data-mining algorithms. Did not submit or incompletely decided if they can be trusted and did not submit or incompletely predicted the errors they are likely to produce. Partially assessed the reliability of the data-mining algorithms. Partially decided if they can be trusted and partially predicted the errors they are likely to produce. Satisfactorily assessed the reliability of the data-mining algorithms. Satisfactorily decided if they can be trusted and satisfactorily predicted the errors they are likely to produce. Thoroughly assessed the reliability of the data-mining algorithms. Thoroughly decided if they can be trusted and thoroughly predicted the errors they are likely to produce. 3a. Choose and describe three (3) concerns raised by the collection of personal data for mining purposes. Weight: 5% Did not submit or incompletely chose and described three (3) concerns raised by the collection of personal data for mining purposes. Partially chose and described three (3) concerns raised by the
  • 15. collection of personal data for mining purposes. Satisfactorily chose and described three (3) concerns raised by the collection of personal data for mining purposes. Thoroughly chose and described three (3) concerns raised by the collection of personal data for mining purposes. 3b. Decide if each of these concerns is valid and explain your decision for each. Weight: 5% Did not submit or incompletely decided if each of the concerns is valid and did not submit or incompletely explained your decision for each. Partially decided if each of the concerns is valid and partially explained your decision for each. Satisfactorily decided if each of the concerns is valid and satisfactorily explained your decision for each. Thoroughly decided if each of the concerns is valid and thoroughly explained your decision for each. 3c. Describe how each concern is being allayed. Weight: 5% Did not submit or incompletely described how each concern is being allayed. Partially described how each concern is being allayed. Satisfactorily described how each concern is being allayed. Thoroughly described how each concern is being allayed. 4. Provide at least three (3) examples where businesses have
  • 16. used predictive analysis to gain a competitive advantage and evaluate the effectiveness of each business’s strategy. Weight: 30% Did not submit or incompletely provided at least three (3) examples where businesses have used predictive analysis to gain a competitive advantage and did not submit or incompletely evaluated the effectiveness of each business’s strategy. Partially provided at least three (3) examples where businesses have used predictive analysis to gain a competitive advantage and partially evaluated the effectiveness of each business’s strategy. Satisfactorily provided at least three (3) examples where businesses have used predictive analysis to gain a competitive advantage and satisfactorily evaluated the effectiveness of each business’s strategy. Thoroughly provided at least three (3) examples where businesses have used predictive analysis to gain a competitive advantage and thoroughly evaluated the effectiveness of each business’s strategy. 5. 3 references Weight: 5% No references provided Does not meet the required number of references; some or all references poor quality choices. Meets number of required references; all references high quality
  • 17. choices. Exceeds number of required references; all references high quality choices. 6. Clarity, writing mechanics, and formatting requirements Project Management and Risk Management Purpose of this Assignment This assignment gives you the opportunity to apply the concepts of the IFSM curriculum to develop a strategy for Project Management and Risk Management for your proposed technology solution. This assignment specifically addresses the following course outcomes to enable you to: · Evaluate, select, and apply appropriate analytical and measurement methods/tools and system development life cycle (SDLC) – methodologies to meet organizational needs. · Research, assess, recommend/select, and implement information technology that aligns with business needs and meets business objectives. · Effectively communicate with stakeholders orally, visually,
  • 18. and in writing to determine stakeholders' business requirements, explain how their requirements will be met, and provide ongoing audience-appropriate information. · Responsibly protect organizations' critical information and assets by integrating cybersecurity best practices and risk management throughout global enterprises. · Plan, execute, and evaluate technology solutions to achieve strategic goals by managing high-performing teams and projects. It also addresses the business strategy, project management, risk management, SDLC and teamwork themes. Assignment The assignment is to develop Sections VI and VII of the Business Case, which provide the Project Management Section and Risk Management Section for the specific technical solution being proposed. 1. Project Management. This section of the business case provides a summary of the plan for managing and implementing the proposed project. It should identify the members of the Project Team, not by name, but by job function or skill set required. It should identify the major phases of the System Development Life Cycle (SDLC) with timelines for each phase and include other related activities, as appropriate to the
  • 19. proposed solution. A complete “Project Management Plan” would be separately developed and contain much more detail than is required here. This section should be completed in a few short paragraphs, using tables or lists as appropriate. 2. Risk Management. For this section of the business case, the Risk Matrix below will be completed. In addition to the matrix, the most significant risks should be highlighted and pointed out to the decision makers who will be using the Business Case. The document “How To Guide to Risk Management” should be used as a resource. For major projects, a separate “Risk Management Plan” would be developed and contain much more detail than is required here. This section should be completed in a few short paragraphs in addition to the matrix. 3. Risk Matrix. Using the Case Study, the “How To Guide,” and the IT solution you proposed, complete the risk analysis matrix provided below, describing for each Area of Risk: a. how that area applies to your proposed IT solution for the Case Study, b. the probability (High/Medium/Low) of its occurrence, c. impact (High/Medium/Low) on the organization if it does occur, d. a strategy to mitigate the risk, and e. a contingency plan in the event that it occurs. Explanations of each of the Areas of Risk are available in the document “How to Guide to Risk Management,” pages B3-B7.
  • 20. Definitions for probability of occurrence and impact may be found on page 7, an example of a mitigation strategy is given on page 9, and an explanation of a contingency plan is on page 8 of the same document. The table below may be copied, pasted and completed. Do not limit your responses to the space shown in table, but provide complete answers for “Description,” “Strategy for Mitigation,” and “Contingency Plan.” Area of Risk Description Probability of Occurrence Impact of Occurrence Strategy for Mitigation Contingency Plan Strategic Business
  • 21. Feasibility Risk of Creating a Monopoly Capability to Manage Investment Organization and Change Management
  • 25. Overall Risk of Investment Failure Assignment Submission The group member responsible for submitting this assignment will post it in the Assignment Folder and the appropriate Week 6 discussion area by the due date. The cover sheet for the Word document should include the names of all team members who contributed to the assignment. (Refer to the Group Project Instructions for explanation of contributors.) GRADING RUBRIC: Criteria 90-100% Far Above Standards 80-89%
  • 26. Above Standards 70-79% Meets Standards 60-69% Below Standards < 60% Well Below Standards Possible Points Project Management 33-37 Points The project management section is thorough, clearly described, logical and appropriate to the Case Study and to the previously submitted sections of the Business Case. All phases of the SDLC, timelines and other related activities are included. Demonstrates sophisticated analysis and critical thinking and sophisticated writing. 30-32 Points The project management section is complete, clearly described, logical and appropriate to the Case Study and to the previously submitted sections of the Business Case. All phases of the
  • 27. SDLC, timelines and other related activities are included. Demonstrates analysis and critical thinking and effective writing. 26-29 Points The project management section is logical and appropriate to the Case Study and to the previously submitted sections of the Business Case. All phases of the SDLC, timelines and other related activities are included. 22-25 Points The project management section may not be complete, may not be clearly described, may not be logical and/or may not be appropriate to the Case Study and/or the previously submitted sections of the Business Case. All phases of the SDLC, timelines and other related activities may not be included. 0-21 Points No project manage-ment section is included, or minimal effort is demon-strated. 37 Risk Management 13-15 Points The Risk Management Section is thorough, clear, logical and appropriate to the Case Study and to the previously submitted sections of the Business Case. The most significant risks are
  • 28. appropriately highlighted. Demonstrates sophisticated analysis and critical thinking and sophisticated writing. 12 Points The Risk Management Section is clear, logical and appropriate to the Case Study and to the previously submitted sections of the Business Case. The most significant risks are appropriately highlighted. Demonstrates analysis and critical thinking and effective writing. 10-11 Points The Risk Management Section is appropriate to the Case Study and to the previously submitted sections of the Business Case. The most significant risks are appropriately highlighted. 9 Points The Risk Management Section may be lacking in completeness and/or clarity and/or logic; it may not be appropriate to the Case Study and to the previously submitted sections of the Business Case. The most significant risks may not be appropriately highlighted. 0-8 Points No risk manage-ment section is included, or minimal effort is demon-strated. 15 Risk Matrix
  • 29. 34-38 Points The Description, Probability, Impact, Mitigation Strategy and Contingency Plan for each area of risk is appropriate, logical and applies to the Case Study and the proposed solution. Demonstrates sophisticated analysis and critical thinking and sophisticated writing. 30-33 Points The Description, Probability, Impact, Mitigation Strategy and Contingency Plan for each area of risk is logical and applies to the Case Study and the proposed solution. Demonstrates analysis and critical thinking and effective writing. 27-29 Points The Description, Probability, Impact, Mitigation Strategy and Contingency Plan for each area of risk is logical and applies to the Case Study and the proposed solution. 23-26 Points The Description, Probability, Impact, Mitigation Strategy and Contingency Plan for each area of risk may not be logical and/or apply to the Case Study and/or the proposed solution. Some areas may not be addressed. 0-22 Points Risk matrix is not included, or minimal effort is demon-strated.
  • 30. 38 Format 9-10 Points Submission reflects effective organization and sophisticated writing; follows instructions provided; uses correct structure, grammar, and spelling; presented in a professional format using Word; any references used are appropriately incorporated and cited using APA style. 8 Points Submission is well organized; follows instructions provided; uses correct structure, grammar, and spelling; presented in a professional format using Word; any references used are appropriately incorporated and cited using APA style. 7 Points Submission is organized; follows instructions provided; contains few errors in structure, grammar, and/or spelling; presented in Word format; any references used are appropriately incorporated and cited using APA style. 6 Points Submission may not be well organized; and/or does not follow instructions provided; and/or contains grammar and/or spelling errors; and/or is not in Word format; and/or does not follow APA style for any references and citations.
  • 31. 0-5 Points Document is extremely poorly written and does not convey the informa-tion. 10 TOTAL Points Possilbe 100