What should a project coordinator from valley enterprises

Assignment Help Computer Engineering
Reference no: EM131166103

MANAGING A LATE PROJECT: WHEN TO SAY "WHEN"?

System projects are notorious for being late and over budget. When should management stop a project that is late or costing more than the intended budget? Consider this case: Valley Enterprises opted to implement Voice over Internet Protocol (VoIP) service in its Phoenix, Arizona, service area. The company has 15 locations in the Phoenix area, all with local area networks and all with secure Wi-Fi connections. The company's current phone system was designed and implemented in the 1950s, when Valley operated in three locations. As more locations were added, standard telecommunications solutions were implemented, with little thought devoted to compatibility. Over the years, phone services were added as new buildings and facilities arose. Valley CEO Doug Wilson heard of VoIP at a trade show and contacted TMR Telecommunications Consultants, requesting a bid. TMR spent a week with the CIO of Valley Enterprises, gathering data, and submitted a bid for $50,000 in late 2007. The project was to be started by March 2008 and completed by January 2009. The bid was accepted. TMR started the project in March 2008. In late July 2008, TMR was bought out by Advanced Communications of Scottsdale, Arizona. The merger delayed the project by over a month initially. In early September 2008, some of the same personnel from TMR, as well as a new project manager from Advanced Communications, went back to the project. By March 2009, the project had already cost $150,000 and only 8 of the locations had implemented VoIP. Advanced Communications insisted that the local area networks were obsolete and were unable to carry the expanded load without major upgrades to the bandwidth, the routers, and other telecommunications equipment.

QUESTIONS:

1. Is it time to end this project? Why or why not?

2. What negotiations should have occured between TMR and Valley Enterprises prior to December 2008?

3. What should a project manager/project coordinator from Valley Enterprises have done when the project first started to slip?

Reference no: EM131166103

Questions Cloud

What are the risks in stressing only one corner of triangle : What are the risks in stressing only one corner of the triangle? How would you have managed this project? Can you think of another approach that might have been more effective?
Complete the given table : Also, suppose the consumer has $180 to spend (M = $180), PY = 1, and that they spend all of their money on goods X and Y. Also, assume the consumer maximizes their utility subject to their budget constraint. Complete the following table
Every positive integer is a power of a prime number : For this purpose, it is helpful to know that if a prime divides a product of integers, then it divides one of the integers in the product. (Another way to say this is that if a prime is a factor of a product of integers, then it is a factor of one..
What is the economic order quantity : A Medical Center dispenses 250,000 bottles of brand name pharmaceutical annually. The optimal safety stock (which is on hand initially) is 1,000 bottles. Each bottle costs the center $10, inventory carrying costs are 30 percent, and the cost of ..
What should a project coordinator from valley enterprises : What negotiations should have occured between TMR and Valley Enterprises prior to December 2008? What should a project manager/project coordinator from Valley Enterprises have done when the project first started to slip?
Difference between catabolism and anabolism : What is metabolism - What is the difference between catabolism and anabolism?
Prove the sum principle for a union of n sets : Our arguments in favor of the sum principle were quite intuitive. In fact the sum principle for n sets follows from the sum principle for two sets. Use induction to prove the sum principle for a union of n sets from the sum principle for a union o..
Address the assumptions implicit in the models : Address the assumptions implicit in the models themselves as well as those you made during the valuation process.
What are the major functions of the blood : What are the major functions of the blood - What are the constituent elements of the blood?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Assess the product by using the five-step plan that is

imagining yourself to be the customer construct a house of quality to provide the organization with your perspectives

  Short notes on reusability

In the real world, an entire program is rarely written from scratch. It is very likely that there are classes or functions that already exist. The key to using these existing modules successfully depends on how modular the classes or functions are..

  Find an optimal parenthesization of a matrix-chain product

Find an optimal parenthesization of a matrix-chain product whose sequence of dimensions - show the dynamic programming tables at the end of the computation.

  Write the relational schema draw its dependency diagram and

a. write the relational schema draw its dependency diagram and identify all dependencies including all partial and

  In this project you will prepare a program by using an

in this project you will create a program using an array which keeps a list of the rent rates for an apartment

  Show how and function can be constructed from two nand gates

There exist four Boolean functions of a single variable and 16 functions of two vari- ables. How many functions of four variables are there? Show how the AND function can be constructed from two NAND gates.

  Data and record structures

Explain the data and record structures for the vertex ordering and vertex or edge colouring (or labelling) and a suitably the greedy graph search algorithm in order to solve each of the following problems in time bound indicated.

  Which products must be restocked

The database includes fields for record number, store identification number, sales region, item number, item description, unit price, units sold, and weekly sales period when the sales were made.

  Give difference between perception and reputation

give difference between perception and reputation

  Regarding the national defence authorization act

Cyber security Act of 2012, National Defence Authorization Act (NDAA), and Library Services and Technology Act are the three recent laws dealing with computer crimes.

  Convert the hexadecimal numbers to binary

Convert the following hexadecimal numbers to binary, then add them togather (assume you have an 8 bit processor that uses 2' compliment representation). : -

  How quick kruskal''s algorithm run

imagine that all edge weights in a graph are integers in the range from 1 to |V|.how quick Kruskal's algorithm run.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd