Describe system development life cycle

Assignment Help Management Information Sys
Reference no: EM13753834

Assignment: Outline of IT Solution and Next Steps

Your annotated outline will define and explain the IT solution you are proposing and address each of the next steps shown below that UMUC Haircuts will take to implement your technology solution.

I. Project Description:

A. Introduction

1. Strategy for competitive advantage: (just name the strategy)
2. Business process to be improved: (just name the process)

B. Proposed solution and IT components needed to implement the project

1. Left Arrow: Write complete sentences in your annotated outlineSelected system

a) Identify the vendor and the system you selected to improve the process at UMUC Haircuts.

b) Explain why you selected that system over others, including how it best meets the business requirements (see Stage 2) and IT requirements (see Stage 3) of UMUC Haircuts. Explain if/how cost was a factor in your selection.

2. Major hardware needed - list the hardware components that Myra will need to install at UMUC Haircuts in order to implement your proposed solution.

3. Facility requirements - identify where Myra should place the hardware.

4. Telecommunication needs - identify what kind of telecommunications will be needed for the solution, including local connectivity inside UMUC Haircuts and internet access, if appropriate, and whether it will be used for data, voice and/or video.

C. Business resources needed to complete the project.

1. It Skills & Services - identify the technical skills needed to implement the solution including application knowledge, social media skills, and technology installation, and who should perform the tasks.

2. Cost of proposed solution - you do NOTneed to show the costs for the system. Instead, you should state what aspects of your proposed solution make it cost-effective for Myra's small business. Be sure to consider the Total Cost of Ownership, which includes the ongoing maintenance, update and replacement costs of any hardware, software, telecommunications, etc., in your explanation of cost-effectiveness.

II. Project Management - the system implementation is a small scale project, but it still requires project management, especially in the areas listed below.

A. LEAD Technologies Inc. V1.01Triple constraints - explain how Myra can control the scope, schedule and cost of implementing the system.

B. Human resource management - identify who Myra should involve in implementing the system and what function each would perform.

C. Risk management - Identify the major risks associated with your proposed solution and what should be done to mitigate those risks (prevent them from occurring). You should include at least 3 risks (business risks, technical risks, project risks, security risks or implementation risks, etc.) and corresponding mitigation strategies.

III. System Development Life Cycle (SDLC) - even though Myra is implementing a system that has already been developed and is in use by other small businesses, the phases of the SDLC still apply, as there are things Myra should consider or do in each phase. For each phase, explain what Myra needs to do to implement your proposed solution.
LEAD Technologies Inc. V1.01A.

A. System Investigation
B. System Analysis
C. System Design
D. Programming or System Configuration
E. Testing
F. Implementation
G. Operations and Maintenance

IV. Business Process Changes - explain how the business process(es) will need to change once your technology solution is implemented (what will be done differently).

V. Employee Training - explain the training that employees will need to use the new system effectively, and how and when it will be conducted.

VI. Defining Success - identify at least 3 things that can be "measured" to determine if the process has been improved and other ways that Myra will know if the IT solution has helped her business.

Reference no: EM13753834

Questions Cloud

Different groups that use financial ratio analysis : There are several different groups that use financial ratio analysis. Who are these groups and what are the primary concerns of each?
Explain cloud computing and web 2.0 : Write a paper explaining the business uses of cloud computing and Web 2.0. Your paper should be 3-5 pages in length and explain the business uses of each. Explain cloud computing and Web 2.0
Different from the cash flows to be realized in the future : Financial mangers make decisions today that will affect the firm in the future. The dollars used for investment expenditures made today are different from the cash flows to be realized in the future. What are these differences? What are some of..
Identify the company and its industry : Select an Initial Public Offering (or a Secondary Offering) completed in the last 10 years in the U.S. capital markets, and discuss and analyze this IPO in seven to eight pages, double-spaced. Each student should select a separate company as the s..
Describe system development life cycle : System Development Life Cycle (SDLC) - even though Myra is implementing a system that has already been developed and is in use by other small businesses, the phases of the SDLC still apply, as there are things Myra should consider or do in each ph..
To invest or not to invest : After analyzing the financial statements and thoroughly researching a company, you have realized that the firm has had zero interest-bearing debt (no notes, bonds, or loans) over the past eight years.
Accounting standards codification : Search the Codification and cite the paragraph in the Accounting Standards Codification that explains how gains and losses from extinguishment should be recognized. need the number as well
Uses the high-low method to analyze costs : Swanson and Associates presently leases a copy machine under an agreement that calls for a fixed fee each month and a charge for each copy made. Swanson made 7,000 copies and paid a total of $360 in March; in May, the firm paid $280 for 5,000 copies...
What amount did stephanie have to pay : Stephanie was involved in a car accident and rushed to the emergency room. She received stitches for a facial wound and treatment for a broken finger. Under Stephanie’s PPO plan, emergency room care at a network hospital is 80 percent covered after t..

Reviews

Write a Review

Management Information Sys Questions & Answers

  This post discusses it protocols and server

this post discusses it protocols and server environments.question 1as a network systems administrator you are

  John owns a shave ice standjohn owns a shave ice stand he

john owns a shave ice standjohn owns a shave ice stand. he sells 700 shave ice cups per month at 1.50 each making the

  Conduct a work process improvement analysis

Conduct a work process improvement analysis and make recommendations for improvement in various areas of the supply chain. Use effective communication techniques.

  Describe how the article relates to the course concepts

You will find a current article related to Project Communications, summarize the article in your own words, and then describe how the article relates to the course concepts

  Money market environment1 why is information important to

money market environment1. why is information important to lenders? to borrowers? what type of information do parties

  Role of a chief security officer

Role of a Chief Security Officer - What is the role of a chief security officer, and why is this organizational role a relatively new one?

  Saphow can implementing sapan erp system create a

saphow can implementing sapan erp system create a competitive advantage for your manufacturing company. we have sap in

  What role can company executives play in an implementation

What are the skills, knowledge, and abilities required to be a project manager? Name five critical success factors and why they are important to the success of a project.

  Business presentation examples with excessive technology

business presentation examples with excessive technology and distracting visual aids sometimes technology and visual

  Explain three different types of normalization 1nf 2nf and

explain three different types of normalization 1nf 2nf and 3nf based on their assumptions and requirements within one

  Improve and maintain effective security management

The best tools to improve and maintain effective security management operations do not necessarily involve the latest, most expensive commercial products or overly-complex systems

  Explain how this market would have been different

Briefly explain how this market would have been different for the opposite scenario. How is business risk strategy different for a tiny startup and an established company?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd