Customizing off-the-shelf software

Assignment Help Basic Computer Science
Reference no: EM132541290

IT projects can be based on existing, off-the-shelf software that is customized to meet the needs of the project deliverables. Or, IT projects can be built from the ground up, in-house. Imagine you and your colleagues are consultants who have been asked to weigh in on the custom vs. off-the-shelf question at the beginning of an IT project at a Fortune 500 company.

- What are the benefits of choosing and customizing off-the-shelf software to meet your project's needs vs. building the entire project in-house.

- What are the drawbacks?

Consider cost, the impact on the in-house team's development staff, the software's ability to grow with future project requirements, and how the choice will affect project support and maintenance.

Reference no: EM132541290

Questions Cloud

Characterizing data types according to task taxonomy : Justify characterizing data types according to task taxonomy. create an argument for which three of the seven basic tasks are the most important to incorporate
Despite increases in computing power and network bandwidth : Despite increases in computing power and network bandwidth, many user interfaces are still largely text oriented, with a few icons and illustrations.
Rising importance of big-data computing stems : The rising importance of big-data computing stems from advances in many different technologies.
Social networking and data protection and security : Determine whether the positive impacts outweigh the negative impacts for a company determined to increase company awareness.
Customizing off-the-shelf software : What are the benefits of choosing and customizing off-the-shelf software to meet your project's needs vs. building the entire project in-house.
Collaboration information systems : You will create a presentation for your organization to explain how successful collaboration can improve success and provide competitive advantages.
Erin Andrews invasion of privacy case : Please do an internet search and find out the results of the Erin Andrews invasion of privacy case that the Craig discusses in the assigned text.
Internship position is long-term place of employment : Imagine that this internship position is your long-term place of employment. What computer or technology equipment would you change and why?
SaskPower U.S. Debt-Hedging Currency Exposure : Why do firms borrow in foreign currencies? Was Sask Power justified in borrowing in US dollars? What is a foreign currency swap?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Requirements for a system to support the club

Can you make a list of requirements for a system to support the club's business processes shown in the scenario below?

  Recognizes exactly the language described

For each of the following, draw a NFA that recognizes exactly the language described.

  The capabilities of digital asset management software

Do research online to identify the capabilities of digital asset management software. What are the top rated digital asset management software products?

  Unit outsource a function or activity

In one page write a discussion on. When should a corporation or business unit outsource a function or activity?

  Design an algorithm that compares a random and sorted array

Design an algorithm that compares a random and sorted array and establishes the average distance that elements must travel in moving from random to sorted order.

  Explain with example the advanced encryption standard

Explain with example the Advanced Encryption Standard. Explain with examples, the Data Encryption Standard.

  What does the presence of rx in message 2 assure

What problem will be created if an attacker were to break an old K (and the attacker has also copied messages for that session)? Explain your answer.

  What communication is appropriate for each party

After reading the following scenario, determine how to communicate its negative information appropriately to your supervisor or manager, to the members of your project team, and to your travel agent in the scenario.

  Impact on business and society

Emerging Technologies and their impact on business and society

  Application-information security laws

You probably obey most laws; however, you may not view some seriously enough to obey them. For example, you might be someone who is comfortable going faster than the posted speed limit.

  Structured cabling standards are voluntary

Where the structured cabling standards are voluntary, local codes have the force of law. If you were to prepare a guide for your employees concerning these codes, what would be in it?

  Explain the conceptual model employed in the design

Explain the conceptual model employed in the design of these types. Describe the analogies and concepts these monitors expose to users, including the task-domain objects users manipulate on the screen.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd