Reference no: EM131742711
To identify areas of risk related to technology and technology use, including business, financial, technical, reputation and other risks. Once the areas of risk have been identified, the students will rank the risks and propose how each of the risks should be mitigated.
Back Story
Five people - Susie, Guillermo, Kyoko, Willy and you have decided to esta startup that will design-build-operate a new cloud-based service to help senior citizens to find appropriate living arrangements with the necessary amenities to enjoy life and health services to meet their changing requirements as they continue to age over time. This silver care startup is planning to launch using the individual team members' personal laptops and mobile phones. They are going to save their work in a shared workspace online - using GoogleDrive / GoogleDocs for the various documents that are being jointly drafted and edited - and then moving finalized materials to DropBox for password-protected folders that can be shared with 3rd parties outside their company. Of course, as they launch and scale-up, they must consider how to set-up and operate the right hardware, software, security and so on. You're the one they're going to rely on to figure it out.
International Opportunities Pop-up
One of the founders' friends is from Russia. It turns out that there are a lot of elderly people there, too, who would like to have a service to help them arrange suitable accommodations for quality of life and healthcare combined. Another of the founders' friends is from Mainland China - and they also are interested in this kind of solution for their rapidly aging society. Russia and China are certainly promising markets for the type of solutions your group is developing. But they are also places known for professional grade hackers - people who are hired to hack systems around the world, not just pranksters working from home to cause trouble.
Technology Management Problems
You're one of the startup's five founders. Your partners have asked you to create a bullet proof technology management plan that will allow the fledgling company to (a) launch & scale-up in the USA; (b) diversify the base product and localize it for both Russia and China; while (c) assuring that the data assets, technology development process, and intellectual property that is created can be protected against potential and actual harm - - - including potential diversion from insiders to the Russians and Chinese; or external hackers fighting their way into your company's network and database to scoop up as much as they can without being caught.
Determine the best locations to expand trade operations
: Evaluate the different tools that can be utilized to determine the best locations to expand trade operations.
|
Most senior accounting clerk in department
: At 41, Taylor is the most senior accounting clerk in his department, making roughly $40,000 per year in a firm of about 200 employees.
|
Calculate the actual probability model
: Seatbelts. Suppose 75% of all drivers always wear their seatbelts. Let s investigate how many of the drivers might be belted among five cars waiting.
|
Discuss general prologue in middle english
: What words, sentences, sections of the reading are the most difficult for you to understand. What is it about the language in these places that makes
|
Identify areas of risk related to technology
: To identify areas of risk related to technology and technology use, including business, financial, technical, reputation and other risks.
|
Describe the fate of the given bags to be bernoulli trials
: Lost luggage. A Department of Transportation report about air travel found that airlines misplace about 5 bags per 1000 passengers.
|
Review problem related to the hoops
: Hoops. A basketball player has made 80% of his foul shots during the season. Assuming the shots are independent, find the probability that in tonight's game.
|
Discuss does the narrator of the yellow wallpaper
: Does the character Huck Finn exhibit this sense of double-consciousness, Does the narrator of The Yellow Wallpaper
|
Probability of finding bad chips
: Chips. Suppose a computer chip manufacturer rejects 2% of the chips produced because they fail presale testing.
|