Discuss the specific recommendations that you would make

Assignment Help Computer Engineering
Reference no: EM133520484

Case Study: The story that you are about to read is from actual events that occur in the field. Its purpose is to provide you with a real-world example from a seasoned professional in the business world. My organization is a small hardware store that has served the local community for over 20 years. As the manager, I have taken pride over the years in being able to meet the needs of all of the customers. Harold, the owner, does not embrace technology because it is too advanced for him, and he relies on others to fix the computers when there are issues. The organization uses a local area network (LAN) to connect all of the computers to the main database server, but lately, the network has been running slower than usual. One of the main problems is that the company needs to be able to start processing purchase orders electronically, as per the suppliers' requests. The suppliers have decided to cut costs by streamlining the purchase requisition process, and they now expect their customers to submit all purchase orders using an electronic data interchange (EDI). To accomplish this, an assessment of the current network must be made to determine the feasibility of meeting the suppliers' requirements. The original network designers who planned the system did not effectively diagram and document the system. Therefore, when another information technology (IT) company was called in to discuss the issues that the company was having, there was no network reference model documentation available to provide to the company for review. The lack of documentation cost the hardware company money because the network designers had to spend a considerable amount of additional time researching the current network and documenting the network using the open systems interconnection (OSI) reference model and the transmission control protocol/Internet protocol (TCP/IP) model. Moral of the Story The documentation of technology is an essential footprint left by IT personnel. This information is an essential component to facilitating the growth of the organization and to support business goals and objectives. Without the architectural map in place, the possibility of easily adding on new capabilities to existing technology is there, but additional time and resources must be allocated to the new IT projects. Without documentation, many organizations have to start from the beginning to get those individuals who are familiar with the site during the assessment stage. This can only cost the company more money and can cause delays in project startups.

Questions: After reviewing the story, conduct research online into the various possibilities for analyzing and approaching the system documentation problems that are presented, and propose possible solutions. Then, complete the following:

  • Discuss the specific recommendations that you would make based on your personal experience and research.
  • Provide specific examples of how you would address the communication problems that are mentioned in the story and how your problem-solving technique could be implemented for the company that was mentioned in the story.
  • How can you apply the lessons that you learned from the story to your own retail store problem?
  • Provide feedback on the recommendations that your classmates made.

Reference no: EM133520484

Questions Cloud

Assimilation from a non-immigrants perspective : Explain one advantage and one disadvantage of assimilation from a non-immigrant's perspective - Provide an example for each. This question is asking
Explain regurgitation-valve prolapse : Explain how regurgitation, valve prolapse, and stenosis each adversely affects blood flow and the oxygenation of body tissues.
What conditions such practices are most relevant : select three defensive coding practices out of the above list, describe each defensive practice you selected, and discuss under what conditions such practices
Explaining why and what security controls should be : explaining why and what security controls should be implemented in software development. Your proposal should include recommendations for tools that can be used
Discuss the specific recommendations that you would make : Discuss the specific recommendations that you would make based on your personal experience and research. Provide specific examples of how you would address
What do you understand by fluid mosaic model : What do you understand by fluid mosaic model? Explain the composition of cell/plasma membrane.
Describe professional ethics and the purpose of nasw code : Describe professional ethics and the purpose of the NASW code of ethics in your own words. Explain the section of the code that you were assigned.
How do teachers employ evidenced-based practices : How do teachers employ evidenced-based practices in school that require teaching specific learning standards?
How can financial organizations effectively manage the risks : How can financial organizations effectively manage the risks associated with Al technology while maximizing its benefits in fraud detection, customer service

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd