...Service Request SR-rm-022 - Part 1 Antonio Walden BSA/375 December 8, 2014 Bill Schuyler Service Request SR-rm-022 - Part 1 This paper will identify key stakeholders in Riordan Manufacturing who can provide requirements for the service request, and describe information gathering techniques and system analysis tools that can be used for the project. It will also identify key factors that assist in tracking necessary information for the project, the scope of the project, and the areas of project feasibility that will be focused on. Key Stakeholders There are many stakeholders of this project at Riordan Manufacturing. These stakeholders include the requester of service and COO Hugh McCauley, CEO Michael Riordan, Executive Assistant Jan McCall, HR department employees, and IT service managers. Stakeholders would also include any end users of the HR tools and applications involved in this project. Any supporters and opponents of the project should also be identified. Information Gathering The identification of the system requirements involves eliciting information from stakeholders (Mochal, 2008). There are multiple information gathering techniques to use to gain a complete view of the requirements from different perspectives. These are not procedural, can occur in any order and revisited multiple times to obtain a clear picture of system requirements. 1. One-on-One interviews: This is a method where the analyst will sit down with stakeholders on a one-on-one basis...
Words: 979 - Pages: 4
...Service Request SR-rm-022 - Part 1 Joshua Proctor BSA/375 November 4, 2013 Laura Smith Service Request SR-rm-022 - Part 1 This paper will describe each of the key stakeholders or stakeholder groups in Riordan Manufacturing who provide requirements for the service request, explain two separate information gathering techniques used during proposed projects, identify two factors that are necessary to ensure that the information required for the project is gathered successfully, define the scope of the project by specifying business functions that will be included in the project, describe the project’s operational, technical, and economic feasibility areas that are examined in the SDLC analysis phase summary. Key Stakeholders Riordan Manufacturing has many stakeholders and most of its stakeholders that would remain influential to the change process would gain the focus and those who can directly use the new system are also given importance. The stakeholders of the firm include CEO Michael Riordan, Executive Assistant Jan McCall, SVP-RD Kenneth Collins, COO Hugh McCauley, VP international operations Charles Williamson and the IT service managers. Further, before the input and revisions as per the information gathering steps are finalized, the individual users of the final app will be consulted for advice. Information-Gathering The completion of the system requires collection of information and it is categorized into ten parts that makes sure that system and processes...
Words: 1232 - Pages: 5
...t Service Request SR-rm-022 - Part 1 Joshua Proctor BSA/375 November 4, 2013 Laura Smith Service Request SR-rm-022 - Part 1 This paper will describe each of the key stakeholders or stakeholder groups in Riordan Manufacturing who provide requirements for the service request, explain two separate information gathering techniques used during proposed projects, identify two factors that are necessary to ensure that the information required for the project is gathered successfully, define the scope of the project by specifying business functions that will be included in the project, describe the project’s operational, technical, and economic feasibility areas that are examined in the SDLC analysis phase summary. Key Stakeholders Riordan Manufacturing has many stakeholders and most of its stakeholders that would remain influential to the change process would gain the focus and those who can directly use the new system are also given importance. The stakeholders of the firm include CEO Michael Riordan, Executive Assistant Jan McCall, SVP-RD Kenneth Collins, COO Hugh McCauley, VP international operations Charles Williamson and the IT service managers. Further, before the input and revisions as per the information gathering steps are finalized, the individual users of the final app will be consulted for advice. Information-Gathering The completion of the system requires collection of information and it is categorized into ten parts that makes sure that system and processes...
Words: 1233 - Pages: 5
...Having a secure WLAN is very important, I would even go to say more important than a normal LAN. One way to secure a WLAN is to use encryption. This uses a key that will encrypt and decrypt data on the WLAN so only people what the key would be able to connect to the network. The encryption needs to be strong or a sniffer will crack the key so using a WPA2 would be best. Another way would be to simple change the SSID or ESSID. The reason this is a good way to secure a WLAN is because in most cases if you didn’t change the SSID a hack would think that you didn’t do anything to your network, making it easier to hack. “Though knowing the SSID does not allow anyone to break into your network, it usually indicates that the person hasn't taken any steps to protect their network, thus these networks are the most common targets” ("How to secure," 2007). The ramification of your WLAN being breached could be many things. The first thing I can think of is data theft and by that personal or secret information if someone can get on your WLAN. Also they could be trying to disrupt your network to cause damage or just want to ride on your wireless to gain access to the Internet. I think that stolen information would be the biggest threat. Reference: How to secure a wlan. (2007, February 15). Retrieved from...
Words: 254 - Pages: 2
...Ducati feedback Q1. I wanted you to begin by recognising that this was a turnaround situation, with Ducati in 1996 close to bankruptcy. A new management team led by Minoli changed strategy with clear objectives of aggressive growth within a niche of the sports segment and competing as a focussed differentiator. The logic of the turnaround can be conceptualised as follows (a) Ducati reduced costs without affecting the WTP for the physical product (i.e. the quality and reliability of the product has increased despite reduced costs). Major reductions were in motorcycle material costs (from 68.2% to 59% of unit costs, exhibit 12) and can be attributed to the following factors: (1) rationalised suppliers from 200 to 130 with the effect of increasing the quality of suppliers and Ducati’s bargaining power (2)Ducati increased its outsourcing from 80% to 90% and thus tapped more the potential of the Emilian mechanical district (3) Ducati further increased its bargaining leverage by instituting dual sourcing for the major components of the motorcycle and adopted short-term contracts (4) Ducati enjoyed economies of scale by increasing output from 12000 bikes in 1996 to 39000 in 2000 (5) Ducati increased the standardisation of its products (parts) and thus increased the bikes produced per worker from 76 to 87 in 200 (14% increase) (exhibit 13). (b) Ducati increased costs to boost WTP for the product’s intangible aspects (i.e. sport character, community, design, exclusivity, Italianess...
Words: 1328 - Pages: 6
...potential and increase the effectiveness of the department and the organisation’s work. To do this it has the following elements: • An assessment of performance. This reviews past performance by looking at: o Outputs – the achievements against standards, targets and objectives. • Planning for the future. This looks at: o Agreeing personal targets and objectives with the employee. o Creating personal development plan for the employee. The assessment of performance should help us identify and repeat success, build personal strengths and minimise weaknesses. The appraisal review will only work if the manager and the jobholder are fully committed to its achievement. The main emphasis of the appraisal should be planning for the future. KEY COMPONENTS OF APPRAISALS Key Responsibilities These are central to the appraisal process as they define the whole purpose of a job and are identical for the same job irrespective of which company it is in. Key Responsibilities only change if the job fundamentally changes. They define the areas where results need to be achieved and they are not activities. There are typically 5 – 8 per job. They are easily derived form job descriptions and focus group discussions on the key elements of a job. Examples: Recruit, lead and...
Words: 1082 - Pages: 5
...estimate the level of applicability of each TQM characteristic to the organization. 5. Discuss your finding and provide conclusion on the state of TQM in the organization. Q2. Exercise No. 4 on pg. 151 Give an example of the use of the PDSA cycle in your personal life and in your work experiences. Personal Life Experience A personal life experience of the Plan, Do, Study and Act cycle is my decision to go back to school to get my Masters degree in Engineering. The planning required me to define the length of time it would take for me to finish my degree. The key sequence of events were for me to let my manager know of my intention to get my degree and that it would not affect my job performance. Then I had to lay our my educational plan and my overall purpose of getting my degree. The Do cycle required me register for a class and ensure that it didn’t interfere with my job performance. Another key part of the do process was for me to study and get a passing grade. The Study cycle required me to study for my exams and assignments on my own time and not on company time. The Act cycle requires me to continue to push myself to finish my degree in a recent amount of time. Work Experience A work experience of the Plan, Do, Study and Act cycle is my involvement on our latest diesel engine in our Superduty truck line where I was the lead for powerplant NVH. The planning required...
Words: 875 - Pages: 4
...Buildings Correct B.Logical systems C.Computer Rooms D.Computer devices Answer Key: B Feedback: Answer: B Reference: Introduction Question 2 of 20 5.0/ 5.0 Points Tracing the history of a transaction through an institution is called: Correct A.Audit trail B.Intrusion control C.Biometrics D.Authentication control Answer Key: A Feedback: Answer: A Reference: Audit Trails/Access Logs Question 3 of 20 5.0/ 5.0 Points Which of the following are categories of intrusion detection devices? A.Perimeter intrusion detectors B.Motion detectors Correct C.Both of the above D.Neither of the above Answer Key: C Feedback: Answer: C Reference: Intrusion Detection Question 4 of 20 5.0/ 5.0 Points Which of the following is NOT a resource that operations security identifies the controls for? A.Software B.Hardware C.Media Correct D.All of the above are resources Answer Key: D Feedback: Answer: D Reference: Introduction Question 5 of 20 5.0/ 5.0 Points Which of the following is NOT a key element of a system of internal and security controls? A.Employ competent people B.Have adequate separation of job duties Correct C.Execute internal and external transactions D.Maintain adequate documents and records Answer Key: C Feedback: Answer: C Reference: Operations Security Principles Question 6 of 20 5.0/...
Words: 929 - Pages: 4
...have extensively researched this project and are able to confidently demonstrate our knowledge. We offer a complex | | |analysis of the key features of our chosen topic and are able to compare the story with other events in history and reach | | |substantiated conclusions. It is evident that we have used a variety of sources in researching our story. | | |Organisation & Communication: | | |Our presentation is innovative and of high quality. It uses language and historical terms precisely in a way which clearly | | |communicates complex ideas. It is a team effort. | |Level 6 | Enquiry using sources / Knowledge: | | |We have researched the project in some depth and are able to demonstrate that knowledge. We offer a detailed analysis of | | |the key features of our story and have used a number of sources in our enquiry. We are able to compare the story with other| | |events in history. ...
Words: 453 - Pages: 2
...REPORT STRUCTURE AND ORGANIZATION Project findings are organized into an executive summary, topical chapters and an appendix. 1) Executive Summary – The executive summary contains a discussion of the background factors that led to the study, a description of the Best Practices, LLC research methodology, a summary of the key project findings and recommendations for identifying and closing performance gaps. 2) Topical Chapters – These chapters provide, by subject, a graphical depiction of survey responses, discussion of key trends identified from an analysis of the data and write-ups of best practices harvested from in-depth interviews: Program Management & Organization –Includes sections on Budget, Staffing, Structure, Activities & Events, Hiring Top Talent (including interns and co-ops) and Program Effectiveness. Hiring Top Talent – Discusses best practices for building the talent pool, screening and selecting candidates and managing intern and co-op programs Building Strong Stakeholder Relationships – Covers effective partnership with line staff, practices for sharing candidates across lines of business, developing alumni as recruiting talent, training line recruiters and maintaining long-term relationships with university hires. School Selection & Ranking - Illustrates best practices for choosing core recruiting schools. Technology: Impact & Innovation - Highlights innovative uses of technology in the recruiting process. 3) Appendix...
Words: 503 - Pages: 3
...around. Burton was expected to develop a sustainable business platform that would be capable of doubling the company’s size and generating an attractive return on investment. Jim Burton did everything in his power to help turn around Norton Lilly International. Due to the fact that he was new to this industry and dealing with veterans that had 30 years of experience he had to use an incremental approach by introducing ideas and building on them once accepted. He formed an executive committee in order to begin decentralizing the decision-making processes away from the owners. Burton also established process mapping, which focused on the key processes involved in delivering each type of service. This process helped management understand the underlying causes of service failures and began to close performance gaps. Burton then established key performance indicators that identified operating level...
Words: 996 - Pages: 4
...am writing to express my interest in your advertisement/ current opening for a [……],and submit my résumé for your review. Having served in sales and operational leadership roles for the past 8 years with continued success in meeting business/operational goals, I can make a valuable contribution to your organisation’s future projects and initiatives. I am aware of your products and familiar with your new line of [show you know something about what the organisation does] and believe that I can assist with increasing sales in the area of [again, show you know what they do]. [Sell yourself. Point out why you would be best for the role. Use examples/or use as a guide your current or most recent position. Provide detailed summary of the role’s key responsibilities and accountabilities]. [Example only]What I bring to this position is a combination of team leadership, strategic planning, and business development skills that I have leveraged to meet and exceed expectations. I have analysed core operational/business functions and implemented the most appropriate solutions to drive continual business growth. I have demonstrated proficiency in all core office administration functions, including document preparation, internal/external communications. I can manage the office environment without supervision, juggle...
Words: 525 - Pages: 3
...the planning or organization that go in to creating such a complex environment. Clearly, safety issues concerning air travel have been heightened during the past decade. While it is clear that major precautions are taken to secure the actual aircraft, prior to takeoff, during flight, and once the landing process has commenced, one often forgets about the safety implications involved in the actual airport. This paper evaluates AC No: 150/5070-7, titled “The Airport System Planning Process.” The aim is to give an overview of the process, including background regarding the purpose of the complex strategy, Within an integrated airport planning system, which is expected to provide guidance for future establishments in the field, there are four key aspects that must be exhibited. First, the system needs identification, where there is a specific reason that the airport was designed using the planning process selected. Second, there must be a system-wide development cost estimate. Such an expensive project, one might assume, does not require an accurate budget. However, it is crucial that one remain within the realm of the budget by meeting the estimated cost. Third, proper planning and organizing must be implemented through studies, surveys, and other collective actions to gain information and decide which aeronautical needs are to be met by the system of airports in question. This process is complex as there are a variety of requirements necessary to plan and implement the proper airport...
Words: 1639 - Pages: 7
...|Project |IEEE 802.16 Broadband Wireless Access Working Group | |Title |Nonce based TEK Update for Handover | |Date Submitted |2008-01-21 | |Source(s) |Stavros Tzavidas |Voice: +1-847-632-4313 | | | |E-mail: stavros.tzavidas@motorola.com | | |Motorola Inc. | | | | | | | |1501 W. Shure Dr. | | | |Arlington Heights IL 60004 | | | | ...
Words: 4252 - Pages: 18
...technologies evolve, an irresponsible person may try to find a way to excavate any loopholes within the system in order to penetrate into the heart of its weaknesses. This is due to the fact that human-made designs can also be broken by another human. Thus, over time security measures must constantly be reviewed and strengthened in order to combat hackers or culprits hot on the heels of system developers who are also using high technologies. One of the means to secure the data is to apply a secret code of encryption. By having it encrypted, the sender can pass the data to the receiver and only the receiver or authorized personnel can have access to the data provided they have been given a key by the sender to decrypt it in order for them to view the information. Thus, without having the right key, nobody is able to read the encrypted data received or stored. Even if hackers or unauthorized person managed to intercept or steal the data, it would be futile because the text looks ridiculous to them. It is widely recognized that data security will play a central role in the design of future IT systems. Many of those IT applications will be realized as embedded systems which rely heavily on security mechanisms. Examples include security for wireless phones, wireless computing, pay-TV, and copy protection schemes for audio/video consumer...
Words: 7475 - Pages: 30