How might you mitigate the risk

Assignment Help Computer Engineering
Reference no: EM132149883

Question: 1) Assume that you are the project manager for an upcoming new information systems project designed to replace your organization's old inventory management system. The server and database will also be upgraded. Name one risk of project derailment or failure that you might anticipate? How might you mitigate this risk? Answer should be at least 100 words

2) Respond in 50 or more words to this post:

As the book states when it comes to the responsibilities of the project manager, they are responsible for "planning the work, assessing the risk, estimating resources required to accomplish the work, organizing the work, acquiring human and material resources, assigning task, directing activities, controlling project execution, reporting progress, and analyzing the results."(Laudon & Laudon, 2012/2014/2016, p.546) Assigning the risk of implementing a new information system is something that would take time and most likely would find many risks involved in the process before and after. One risk that stands out from personal experience is that of loss of information during the transfer. I worked for a company that switched systems but was not able to access all of their necessary information needed to conduct business afterwards. In this case the information was not compatible with the new system. To prevent this from happening or from losing important information, I would start by backing up the current system so the information would not be lost. Secondly I would either personally or assign someone the task of making sure all of the information was compatible and if not would convert it into a compatible form to make the transfer.

Reference no: EM132149883

Questions Cloud

What about competing against redbox : In this ever-changing market of new business models such as Netflix, What about competing against Redbox?
How could the shortcoming have been prevented : Using a web browserand a search engine the terms "citibank backup tapes lost." You will find many results. Select one article and identify what that article.
Does your company have a current disaster recovery plan : Does your company (or school) have a current disaster recovery plan? What are some of the activities involved in it? Do you feel confident that your company.
Prove the other condition that will make this a legitimate : Prove the other condition that will make this a legitimate pdf. Basically I have to prove that that equals 1 but im confused on how.
How might you mitigate the risk : Assume that you are the project manager for an upcoming new information systems project designed to replace your organization's old inventory management system.
Justification from organization priorities perspective : Business case justification from organization priorities perspective. how to be in the right time with the right client.
What were the main sources of the conflict : Think of a conflict that occurred in a team you were a part of and analyze it. What were the main sources of the conflict? What interventions can be used.
Except for the patient protection and affordable care act : Except for the Patient Protection and Affordable Care Act, the remaining legally required benefits were conceived more than a decade ago.
Distinguish between strategic items and core standard items : Using suitable examples, distinguish between “Strategic Items” and “Core Standard Items”.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd