Is sunrise current model of prioritizing resource assignment

Assignment Help Basic Computer Science
Reference no: EM132977923

"First Come, First Served": Resource Challenges for Sunrise Restoration

This case is intended to highlight the challenges in resource assignment, particularly in the common cases where project managers within the same firm are competing with each other for the use of scarce and valuable human resources to accomplish their tasks. Without clear guidance from top management and a valid priority system, the ability to acquire resources is often the result of chaotic bargaining and negotiation among equals. This case is based on a real situation and the outcomes were very much in line with the way they are described in the case. The business owner did not want to simply invest in more resources for fear that they would be underutilized. He much preferred the system of negotiating among his project managers, even if that led to inefficient utilization of the resources that were available. Students can be asked to take the side of the owner or Tyler to debate the options that Sunrise can use to manage its resources.Questions

Question 1: Describe some of the resource constraints that Sunrise and its project managers are facing.

Question 2: Is Sunrise's current model of prioritizing resource assignments viable? Why or why not?

Question 3: How could technology alleviate some of Sunrise's resource management issues?

Question 4: Would Tyler's suggestion to hire additional technicians and purchase more equipment solve the resource problems at Sunrise? Why or why not?

Reference no: EM132977923

Questions Cloud

Discussion of the role of extensible markup language : Discussion of the role of Extensible Markup Language (XML) in the design process and how XML is used in the Android application files.
Develop an in-depth understanding of the theories : Develop an in-depth understanding of the theories of leading change and the ingredients of effective leadership - effective decision-making and communication
Contrast design and layout of an android phone application : Contrast the design and layout of an Android phone application with that of a traditional desktop application. What special design considerations must be made
What obstacles have encountered : In this discussion, give a description of your progress, what obstacles have you encountered, and what ways have you overcome these obstacles.
Is sunrise current model of prioritizing resource assignment : Is Sunrise's current model of prioritizing resource assignments viable? Why or why not? How could technology alleviate some of Sunrise's resource
Describes some state laws protecting data : Describes some your state laws protecting data or security of personal information (the state you live in ,have lived in, or want to live in).
How much of usco gross profit to the canadian subsidiary : How much of USco's gross profit of $2 million on sales to the Canadian subsidiary is classified as foreign source for U.S. tax purposes
Describe the risk assessment process : Describe the risk assessment process? What are the steps to handling risks? Feel free to provide your own example of how you have handled risk situation
What are browsewrap agreements : Why would you include an information security provision in a contract? What are shrinkwrap, clickwrap, and browsewrap agreements?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Skills that public personnel managers

Predict two (2) trends that are likely to impact public service in the future. Next, choose two (2) skills that public personnel managers may seek in response to these trends. Provide a rationale and support your position with appropriate academic..

  What kind of design did the researchers use

Among the 41 students who initially said their parents were lenient about smoking, 11 became smokers. Do these data provide strong evidence that parental.

  Policy evaluation and production identification

There is a relationship between policy evaluation and production identification, policy evaluation and policy implement,

  How should employees report phishing attacks

How should employees report phishing attacks? Why is immediate reporting critical to stopping the attackers?

  Cyber security policy

What three to five actions are needed within an organization to ensure successful cyber security policy?

  Number at the command prompt

Write program in java that adds up a series of numbers entered by the user. The user should enter each number at the command prompt.

  How each building block is essential to the business

Provide an analysis of how the major building blocks are being used. Explain how each building block is essential to the business.

  Summary of how the values are stored

Explain how to declare and assign values to a two-dimensional array and provide a C++ program segment that illustrates your answer. Provide a summary of how the values are stored.

  Write a program to perform grocery check-out procedure

Write a program to perform grocery check-out procedure for a simple store. Use a dynamic array of structures (Up to 100) to store this information. For each product we store the following information.

  Program that checks if a certain number is divisible

Write a c++ program that checks if a certain number is divisible

  Greatly in application and complexity

Decision support systems vary greatly in application and complexity, but they all share specific features

  Discuss recent legislation related to ethical computing.

Discuss recent legislation related to ethical computing.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd