Describe budget concerns for this it system

Assignment Help Computer Engineering
Reference no: EM133561485

Case Study: You are an IT systems manager at Alpha Omega Solutions (AOS). AOS is a small-szed cloud software company that provides customized AI & machine learning solutions for customers.

The business has requested a new, internal work collaboration solution - "Yapper" - for internal instant messaging across AOS's hybrid workplace. Yapper as a cloud-based, enterprise version of communication/instant-messaging software like Slack or Discord.

The tool will be rolled out across 100 employees who are globally distributed (both on-site and remote). AOS is capable of affording a small team of analysts, developers and a project manager sitting in a small space. The budget for this rollout is estimated at $500,000 by the project manager.

Questions:

  1. Make a business case for Yapper at AOS. How will it enhance the business for managers and employees?
  2. Describe budget concerns for this IT system, including short-term and long-term cost analysis.
  3. Explain technical & infrastructure concerns for this IT system and how you will address them.
  4. What are the main security concerns for this IT system?
  5. How will you manage the project rollout. Explain each phase involved for successful implementation of Yapper.

 

Reference no: EM133561485

Questions Cloud

Discuss what tasks might be undertaken for this purpose : How big can integers be in R? Experiment with some large numbers to the power of some large exponents and see if the result can be assigned to a variable.
Standardized policies and procedures : Diagnostic criteria and management, including clinical preventive services and a treatment plan. An example of standardized policies and procedures,
Write a python program to generate a pair of rsa keys : Write a Python program to generate a pair of RSA keys (public and private) and demonstrate their usage for encryption and decryption.
Explain how the characteristics of each of the five approach : Explain how the characteristics of each of the five methodological approaches align with its associated research question.
Describe budget concerns for this it system : You are an IT systems manager at Alpha Omega Solutions (AOS). AOS is a small-szed cloud software company that provides customized AI & machine learning
Provide overview of epidemiological data : Identify the chosen disease. Provide an overview of epidemiological data for the chosen disease within the Australian context.
What type of attack is this : A cyber attacker has managed to manipulate DNS entries, leading victims to a malicious website that looks like a legitimate one, even when they type
List the different types of body habitus : List the different types of body habitus. Explain how the patient appears. State the population percentage.
How the theia and vicon systems obtain their kinematics data : What are the fundamental differences in how the Theia and Vicon systems obtain their kinematics data? Identify 3 different situations where it would be most

Reviews

Write a Review

Computer Engineering Questions & Answers

  What features are included in simulations and games have

What features are included in simulations and games have to help students improve their performance?

  Calculate the total sale for the week and display the result

Write a python program that asks the user to enter a store's sales for each day of the week.

  Discuss the art and method of influence and manipulation

Discuss the art and method of Influence and Manipulation. How are each applied to a social engineering plan? What is the difference between the two?

  Explore the different methods of calculating subnets

Research some of the options these various methods provide, and create your own "cheat sheet" to help pre-pare you for subnetting on the CompTIA Networkþ exam.

  Write a second nested loop to display pattern b

Write a single program that uses two nested loops to display Patterns A and B.

  Write a foreach loop to display the contents of carray

Write a foreach loop to display the contents of cArray. Write a for loop to increment each element in cArray by 5.

  Regulating the content of internet

Specify to what extent there should be regulation of the content on the Internet, if at all? State the factors and principles the federal government must take into account when considering the indecency regulation issues.

  How can a company set-up an extranet

How can a company set-up an extranet? List, describe, and provide an example of the three major types of extranets

  What are the core competencies of two competing companies

What are the core competencies of two competing companies and how are they similar / different? What steps could each company take to improve and strengthen.

  Write paper on algorithms and application uses of hashing

Write 2 page paper APA formatted double spaced with references on purpose, algorithms and application uses of hashing.

  What is the value of the minimal average latency

List all greedy cycles from the state diagram. What is the value of the minimal average latency? What is the maximal throughput of this pipeline?

  Transmition of the packet

An Ethernet MAC sub layer receives the 1510 bytes of the data from LLC layer. Explain whether the data encapsulation can be within one frame?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd