...Analyze the techniques discussed in the Guldemond et al. article (2008) and propose how you would apply them to your own skill set as a Project Manager. The article discusses a new methodology for scheduling problems with strict deadlines. Time Constrained Project Scheduling Problem (TCPSP) is typically dealt in different ways. The article discussed different methods and techniques. One of the techniques is to schedule the different tasks for the fraction of the time needed to complete them, then later to add as needed. This method helps in getting the different tasks down and later dealing with time constraints instead of first dealing with the time constraint then try to schedule them. This is also called partial schedule based on the article. Another method is to try to keep the work in normal working hours instead of scheduling in overtime at first. Based on that and the calculations within the article, it appears that project timing would eventually be condensed down by at least 10%. The article discusses some formulas on calculating and getting the best out of a project with constrained time. I was able to understand some of the calculations, but because I was never good with Math, most of them I could not understand. Being a project manager, these skills can be applied differently. I would first schedule everything as normal and within regular business hours of operation. In doing this step, it helps in breaking down the project into all the different tasks...
Words: 259 - Pages: 2
...document of CMGT 445 Week 2 Discussion Questions shows the solutions to the following problems: DQ 1: Haddad and Ribi?re (2007) explore and expand upon the more formal use of Knowledge Management in the process of software acquisition. Analyze and discuss the use of the Software Acquisition Capability Maturity Model (SACMM) if you were the project manager responsible for a large software acquisition at your company. DQ 2: In what ways can changes in a business affect an application software development project? What are some of the tools a project manager can use to respond to changes that occur? DQ 3: Boehm and Bhuta, (2009) explore the risks associated with integrating an existing software component into a new application implementation project. Regarding the principles put forth on p. 60 of this article, go back and review a software development project you were a part of and discuss whether the application of the principles of these authors could have reduced the risk of that project. DQ 4: From a project management perspective, at what point in an application implementation project timeline should the mainframe computer or server hardware be specified and/or acquired? Identify two or three considerations for making sure that the right hardware is available at the right time. General Questions - General Academic Questions CMGT 445 WEEK 1 SUPPORTING ACTIVITY 1 CMGT 445 WEEK 1 SUPPORTING ACTIVITY 2 EVOLUTION OF TECHOLOGY CMGT445 Week 1 DQs CMGT...
Words: 359 - Pages: 2
...Information Security and Phone Users CMGT/441 Information Security and Phone Users Infosecurity magazine released an article today December 3, 2012 titled “Phone Users Worry About Security, but Won’t Pay for It. Information security is heavy on most people’s minds these days. The running risk of identity theft, hacking, and viruses leaves people feeling uneasy at times, but often they are also considering the risk to the information stored on or used with their cell phones. The people who are considering the information security with their cell phones are more often than not, unwilling to pay for it, and that is what that article addressed. The Statistics The article discusses a survey done of 1026 cell phone users in the UK (United Kingdom), most of them did express a concern about information security within their mobile device . Of those 1026 users, 38% (389.88 users) felt it would be the service providers fault if there was an information security breech. 32% (328.33 users) felt they would most likely blame themselves if their information was stolen, while 18% (184.68 users) would blame the cell phone manufacturer. When questioned further, a startling 68% of users were unwilling to pay for information security, and 24% were unwilling to pay more than £1 (about $1.30) per month to pay for added security, that is a total of 943.92 people. The Attitude This is interesting information, it is curious why people who are clearly concerned about the possibility of...
Words: 475 - Pages: 2
...Memorandum One Size Fits All Clothing 123 Nowhere St. Warner Robins, GA 8/31/14 To: Employees of One Size Fits All Clothing From: Richard Patterson Subject: Project New Era The one size fits all will be having an offsite training session on September 29-30, 2014. The training is going to involve members from all the branches of the store from across the country. So the preparation is going to be very important to having a successful training session. All members that are attending are asked to arrive by 6p.m. on September 28th. This will allow time for enrolment and a final head count before the training begins on the following day. Rooms will be provided at no cost to the members and so will the food. The hotel has a hot bar for breakfast that is provided at no extra cost, lunch will be catered by a local sandwich shop and dinners will be announced during the meetings. If the members elect to eat with the group for diner the cost of the meals will also be covered. Members electing to use other accommodation will be responsible for any expenses that are accrued. The activities of the meeting for O.S.F.A are to discuss the requirements in training for the new platform as well as a host of new compliance policies that are going to be introduced per request of the CEO. The two days of training are provided at no cost due to the attendees. All accommodations are going to be covered including transportation to the training facility. ...
Words: 334 - Pages: 2
...Huffman Trucking Service Request Huffman Trucking is in need of addressing possible security requirements as well as security risks within their Benefit Elections System. Throughout the report the security requirements and security risks for the Benefits Electronic System will be documented and addressed. A few of the risks that are involved with the Benefits Electronic System are errors that cannot be controlled, taking too much time to complete, not having a correct plan and most importantly support from the stakeholders. It is important that the Huffman Trucking current system is reviewed and documented so that risks can be documented as well as requirements. It is important that the stakeholders are updated throughout the entire project. Any of the systems that Huffman Trucking is unclear about needs to be documented and any security requirements need to documented and corrected before the analysis phase can be started. A few of the security requirements that might need to be documented are what resources will be used; any risk boundaries that are with the system and what data diagrams are being used. There also needs to be a backup plan in case the system is hacked into during the project process. Without some type of a backup plan there can be a lot of information stolen from within the system. When the Benefits Elections System starts the upgrade process it is important that a project manager is assigned to the project. The purpose of the project manager is to help...
Words: 830 - Pages: 4
...Risk Analysis Considerations for Huffman Trucking University of Phoenix CMGT442 1-8-2012 The purpose of a risk assessment is to help decision makers to become aware of threats that can negatively impact the business and to help them to make sound and informed decisions to limit the amount of risk the business is exposed to. Huffman trucking is embarking on the creation of a benefits election system for the tracking and reporting of employee benefits. Because of the sensitive nature of the information being dealt with, Huffman must take measures to limit the amount of exposure to risk the system will have. Often times companies overlook some factors of risk because they have limited vision with regards to potential liabilities or faults in their systems. A good and thorough risk assessment can identify previously unseen weaknesses as well as develop a better understanding of all the threats. There are some components that when in place can have a huge effect on the validity of a risk assessment. Hiring an outside firm with expertise in identifying threats and developing action plans can be costly but can also help to ensure any risk analysis is thorough. Also, companies with good data sources are in a better position to evaluate existing operations and assets. When putting together a risk assessment there are certain components that are crucial to getting the process completed thoroughly and appropriately. These steps include: Identifying Threats. Cataloging both internal...
Words: 751 - Pages: 4
...Media communication is the process in which data is transferred from one computer to another. This involves transmission of digital of information to different devices through wireless or cabled connections. The data transmitted over networks could be either digital or analog. * Analog signals are continuous signals that vary in strength. Sound is an example of an analog signal. Telephones have transmitters that encode sound waves into electromagnetic waves, which then travel over wires toward their destination. The receiving telephone decodes the electromagnetic waves back into sound waves. Our brains then decode the sound waves into the words we hear. Computer modems use the same principle. Analog signals can be represented digitally. For instance, a high electromagnetic voltage could be interpreted as 1 and low voltage as 0. * Digital signals are discrete rather than continuous. Either there is a signal or there isn't a signal. Telegraphs transmit data with discrete signals. You either hear a tap or you do not hear a tap. Discrete signals can be represented by on and off pulses. The duration of a discrete signal can be varied, as with dots and dashes in Morse Code. To explain how this data is transmitted over the network, first I had to explain the mediums. Mediums are ways, which the data use to travel from one place to another. These mediums may vary depending the environment or type of network. The most commonly used data communication media include: *...
Words: 850 - Pages: 4
...Week 2 Individual Assignment Huffman Trucking started in 1936 in Cleveland, Ohio with just one tractor-trailer doing contract hauling in the same area. During World War II when the demand for moving of goods grew the company from 16 to 36 trailers by the end of the war. When the Motor Carrier Act of 1980 was passed, which deregulating the trucking industry, Huffman became a national carrier. The company does work for the Government, Auto manufacturing, consumer electronics, as well as raw materials. The company has union and non-union workers employed at its locations. This new benefits system is for both employee types to track their benefit information. The risks are many for this type of system as the type of data is the employee’s personal information. The information that needs protecting include Social security numbers, bank accounts numbers, their salaries and all the information that an identity thief would need to steal someone’s identity or use for other nefarious purposes. What risks are there in this new benefits election system? The benefits election system is the system that tracks all the benefits that the employees get from Huffman trucking as part of the compensation for working there. This includes heath care coverage, dental, vision, 401k, and anything else that needs tracking in the employees benefit packages. The data that is needed for this system are all the things that define a person in the United States. The risks that need addressing with this type...
Words: 1192 - Pages: 5
...Personality Assessment University of Phoenix CMGT/530 Personality Assessment Personality is defined as the visible aspect of one’s characters based on a combination of their physical, mental, emotional, social, and other behavioral patterns. Over the last few decades there have been numerous methods and tests that have been developed to assess ones personality. The more commonly known tests include the Meyer-Briggs Type Indicator (MBIT), the Sixteen Personality Factor Questionnaire, the Jung Theory of Psychological Types and The Keirsey Temperament Sorter II. The listed methods are all developed by different individuals; with their very own views and opinions; however; each method is based on the basic theory that a person’s behavior are the results of specific traits that can be measured and it is these measureable traits are what make up a person’s inner habits and tendencies. There are several kinds of assessment methods that have been created to help define and measure ones individual personality and traits. For this assignment; the one used to assess my personality was the Keirsey Temperament Sorter II. The Keirsey Temperament Sorter II personality assessment tool; developed by David Kiersey was first introduced in his book Please Understand Me, which was published in 1978. It is an objective test composed of 70 questions that helps to measure and indicate the personality types...
Words: 928 - Pages: 4
...Protecting information and all assets is critical in today’s time. The military faces three major types of threats: Employees, Zero-Day Exploits, and Cyber Espionage. It is imperative, due to the information and assets on-hand, that the military mitigates these risks. The first major threat, employees, is a very common threat to all organizations. Employees can be broken down into three types of threats which include, employees that are careless and untrained, employees that are tricked or fall prey to social engineering, and employees with malicious intentions. This will always be a potential threat because every organization requires employees to run and function. Protecting a network and data should be top priority for every organization. With policies, procedures, and training implemented, employees will have a better understanding of what is allowed on their organization’s network, how to properly navigate the system, and how to safeguard all information contained within the network. Policies and procedures also inform employees of what practices are in the event information is disclosed without authorization and any and all penalties that may go along with them. Having this information readily available to employees ensures they are aware the organization is serious about protecting all assets and information and will enforce legal action if needed. Since employees are the individuals that have access to all information, some of which is sensitive, they need to understand...
Words: 1178 - Pages: 5
...MEMO Date: June 7, 2015 Subject: Upcoming Two-Day Training Session To: Zillamatic Staff From: Management Introduction Zillamatic is extremely excited to provide training for our new, soon to be released, compliance system. This new system use state of the art hardware and software, and because of this, to ease the transition pains, a two day training session will be provided. Please see the attached Microsoft P Preparation Planning this particular training session will take additional time since there will be multiple attendant coming from various parts of the country. The first priority will be to obtain all of the training staffs information. The human resource department will be responsible for providing the project team with this information. Due to the fact that Zillamatic does not have a room big enough to house the amount of attendees that are anticipated, an off site venue will need to be secured for the duration of the training. Finding the ideal spot location that can provide accommodations as well as a room large enough to conduct the training needs to be done as soon as possible so that the information can be included in the training invites. Since a power point presentations and live demos will be conducted, it is crucial that the training location have at a projectors, screens, and a reliable internet connection. Staff After the trainers and trainees have been identified, they will be group according to skill level and potential use of the...
Words: 536 - Pages: 3
...Over the past 17 years, Smith Systems Consulting has been providing organizations, such as Boardman Management Group, with top notch Information Technology and software development solutions. Since Information Technology and software development projects are all that Smith Systems Consulting does, they have the experience to know how to design, implement, and maintain a new system with the most minimal impact to your business. Smith Systems Consulting’s experience also allows them to understand the potential needs outside of the original scope, such as necessary hardware upgrades needed to support a software upgrade. According to the information sent to Smith Systems Consulting by Boardman Management Group, the Baderman Island Resort currently has 26 Windows XP computers with Word XP installed, 38 Windows 2000 computers with Word 2000 installed, and six Windows 98 computers with Word 97 installed. No matter whether Boardman Management Group decides to upgrade to the new version of Microsoft Word or switch to a different word processor all together, other hardware and operating system upgrades will likely be necessary. Smith Systems Consulting will be able to help Boardman Management Group make that decision by weighing the costs of the different solutions. Costs that Smith Systems Consulting would typically consider in a similar scenario would be the price of the software upgrade, the price of potential hardware upgrades, the price any necessary operating system upgrades, the...
Words: 587 - Pages: 3
...Kudler Fine Foods IT Security Report Kudler Fine Foods is an upscale specialty food store with the very best domestic and imported fare at every location. In keeping with their motto, “Shopping the World for The Finest Food”, Kudler Fine Foods shops the world in order to provides the very best Baked and pastry products, fresh meat and seafood, fresh produce, cheese and specialty dairy products, wines, and condiments and packaged foods. Kudler Fine Foods brings those food items back to their loyal customers in the San Diego metropolitan are. Kudler Fine Foods has stores in Del Mar, La Jolla, and Encinitas. Their mission is to offer their customers a delightful and pleasing shopping experience by employing experienced, helpful, and knowledgably staff, coupled with their selection of fine foods. Background Customer rewards programs and the like have become commonplace in many small and large retail market places. Kudler Fine Foods understands the benefits these programs offer. Customer rewards programs are electronic records management (ERM) systems that collect and store customer sales transaction information in databases from which reports can be queried. Kudler Fine Foods plans to develop the RMS, but needs help from Learning Team “A” to manage security concerns during the system development life cycle (SDLC) in order to safeguard data stored as customer information within the newly implemented system as prescribed by the Federal Trade Commission (FTC). The FTC is charged...
Words: 1352 - Pages: 6
...Week 2 Individual Assignment University of Phoenix – CMGT 430 In order to better serve Riordan Manufacturing’s information security infrastructure, a solid plan must be put in place to ensure that the approach to its implementation is logical, easy to follow, and effective. Many aspects must be considered when formulating an information security policy, including the needs of the company vs. best practice, thus striking a delicate balance between both variables. Therefore Smith Systems Consulting is dedicated to ensuring that a quality service is delivered that will meet these objectives. However, before a more comprehensive plan can be put into place, it is important that Smith Systems Consulting understands exactly how the security plan will be managed, and how to enforce it on the most basic level. It is therefore the opinion of our company to begin by defining a simple, yet utterly crucial part of Riordan’s base information security policy: separation of duties via the practice and implementation of role assignments. Separation of duties, in information technology, is the practice of dividing both IT staff and end users into managed groups, or roles. While users and IT staff, from an administrative level, may fall into several groups (ex., Accounting Department, Maintenance, Security, etc), these groups are not enough to enforce proper security policy. A more comprehensive approach is to define what the base access is for all of these groups, thus the use of roles....
Words: 1690 - Pages: 7
...CISSP Guide to Security Essentials Chapter 1 (pgs. 31-33) 1. An organization that needs to understand vulnerabilities and threats needs to perform a: Answer: c. Qualitative risk assessment (pg. 5) 2. A risk manager has performed a risk analysis on a server that is worth $120,000. The risk manager has determined that the single loss expectancy is $100,000. The exposure factor is: Answer: a. 83% (pg. 6) 3. A risk manager has performed a risk analysis on a server that is worth $120,000. The single loss expectancy (SLE) is $100,000, and the annual loss expectancy (ALE) is $8,000. The annual rate of occurrence (ARO) is: Answer d. 8% (pg. 6) 4. A risk manager needs to implement countermeasures on a critical server. What factors Answer b. Annualized loss expectancy (ALE) that results from the implementation of the countermeasure (pg. 7-8) 5. The general approaches to risk treatment are: Answer: c. Risk acceptance, risk avoidance, risk reduction, and risk transfer (pg. 8) 6. CIA refers to: Answer c. Confidentiality, integrity, and availability of information and systems (pg. 9-10) 7. A recent failure in a firewall resulted in all incoming packets being blocked. This type of failure is known as: d. Fail closed (pg. 12) 8. The definition of PII: b. Is name, date of birth, home address, and home telephone number (pg. 12) 9. The statement, “All financial transactions are to be encrypted using 3DES” is an example of a: c. Standard (pg. 181) 10...
Words: 377 - Pages: 2