Free Essay

I.T Report on Information Technology

In:

Submitted By iambakari89
Words 4329
Pages 18
Information Technology Department
Shared Services Report Presented by: Peter Cooper, CTO Date: November 9, 2011

Table of Contents Executive Summary ....................................................................................................................................... 1 Introduction and Background ......................................................................................................................... 2 Current Inter-local Agreement ................................................................................................................... 2 Scope of Management Services ........................................................................................................... 2 Achievements ....................................................................................................................................... 3 Consolidation (IT Shared Initiative) ........................................................................................................... 3 Joint Project Analysis..................................................................................................................................... 4 Automated Finger Print Information System (AFIS) .................................................................................. 4 Microwave and Fiber Communications Project ......................................................................................... 5 Joint Datacenter Project ............................................................................................................................ 7 Fusion Center ............................................................................................................................................ 9 NeoGov ................................................................................................................................................... 11 In Motion ................................................................................................................................................. 12 Next Steps and Recommendations ............................................................................................................. 14

Information Technology Shared Services Report Executive Summary During Fiscal Year 2010, Information Technology Department (ITD) evaluated the possibility of aligning the City and County IT departments. This Fiscal Year 2011, ITD has completed the development of a Cost Analysis on the financial impacts of both a consolidation; as well as, the cost of recreating the services if no sharing existed. The following analysis is a result of ITD’s review of the existing budget data, discussions with City and County Human Resources, and discussions with the County Auditors. Based upon the data collected, the County contributed $5,067,013 to joint projects; and received benefits of $9,754,982. To duplicate the County’s information and technology resources (if it were alone without the City) resulting from these joint projects, the County would need to invest an additional $5,401,437 over what it actually invested. The capital contributions from both entities have mostly come from bond proceeds that were issue for these purposes. The cost of this debt will be paid out over the useful life of the assets acquired. In addition several grants were applied for and received that further aided in the financing of these projects. The County’s benefits were calculated based on the resources made available to the County resulting from the joint projects. This analysis is based upon economies of scale. The common sources of economies of scale are purchasing (buying bulk of materials through long-term contracts), managerial (increasing the specialization of managers in both organizations), financial (providing cost savings to the taxpayers by sharing the costs of expensive projects, thereby reducing duplication of effort), and technological (taking advantage of returns to scale in technology projects). Other benefits related to the initiative are improved management, operational efficiencies, improved access to information, and improved customer service to both organizations. Joint projects undertaken by the two government entities are summarized in the table below.
City S ystem Dollars Contributed $ 3,488,000 $ 7,365,000 $ 10,816,352 $ 3,389,000 $ 56,500 $ 1,062,800 $ 26,177,652 Dollars Necessary to Duplicate $ $ $ $ $ $ $ 187,075 187,075 $ $ $ $ $ $ $ Benefits Based on S hared S ervices 2,285,984 6,243,236 8,973,546 2,867,615 37,382 1,022,830 21,430,594 Dollars Contributed $ $ $ $ $ $ $ 67,975 629,388 4,369,649 342,000 5,409,013 County Dollars Necessary to Duplicate $ $ $ $ $ $ $ 1,202,016 1,121,764 3,077,657 28,000 147,000 5,576,437 $ $ $ $ $ $ $ Benefits Based on S hared S ervices 1,269,991 1,751,152 6,212,455 521,385 19,118 381,970 10,156,070

AFIS - (1) Microwave - (2) Data Center - (3) Fusion Center - (4) NeoGov - (5) In Motion - (6) Total

(1) AFIS – Automated Finger Print Information System, stores all fingerprint identification information for anyone arrested/detained in the El Paso area. (2) Microwave – Allows the County of El Paso to extend its network outreach through high speed links. (3) Data Center – Implementation of a Performance Optimized Datacenter (POD) with backup/redundancy at the MDR building. (4) Fusion Center – Combines incident reporting from regional law enforcement agencies, the 911 District, and fire. All of the El Paso regional law enforcement agencies can reference the data. (5) NeoGov – Automates the hiring and performance evaluation process. Page 1

Information Technology Shared Services Report (6) In Motion – Provides the ability for vehicles to operate on their own wireless network to support use of multiple wireless devices by officers in the field. The summary results of these projects can also be seen graphically below.
$5,409,013

$ Contributed
$26,177,652 $187,075

$ to Duplicate

$5,576,437

$10,156,070

Benefit
$21,430,594 City County

Introduction and Background The Information Technology Department for the County of El Paso (COITD) entered into a shared services inter-local agreement with the City of El Paso on December 22, 2009. In this agreement (current inter-local agreement), the Mayor and County Judge authorized COITD to manage and organize the IT functions for the City, including re-organization functions, employing, and managing budgets and finances for the department. Under chapter 791 of the Texas Government Code, local governments may enter into contracts of this nature in order to increase the efficiency and effectiveness of governmental functions. Current Inter-local Agreement Scope of Management Services Under the terms of the inter-local agreement, COITD has provided professional IT management for the City. During this time, COITD assisted the City in hiring the City’s IT Director and several necessary key City IT personnel. Additionally, COITD assisted in the creation and management of the City’s 2009 FY budget, 2010 FY budget and the 2011 FY budget and bond outlay. Additionally, the agreement provides for the opportunity to explore consolidation of the City and County IT departments to better serve the El Paso community (along with both entities). The agreement suggests that if operations could be enhanced or streamlined by a consolidation, then, agreement would be the basis for the consolidation. The county currently receives $164,000 for providing managerial services to the City. If the City were to employee the necessary staff to fulfill these duties it would cost them approximately $546,000 more than the current interlocal and they would ideally have excess capacity above current needs. If the City hired their own staff it would cost them a total of $710,000. The County also desires to utilize the cities expertise if we were to hire the FTE equivalents it would cost the county $562,000 but if we were to pay for the amount of time that our projects require it would only cost the county $174,000, a savings of $388,000. In aggregate to cost avoidance to the entities exceeds $934,000, a true savings to the taxpayer as a shared service.

Page 2

Information Technology Shared Services Report Achievements Major achievements resulting from the County and City IT partnership include but are not limited to: • The HP POD datacenter located at the Municipal Service Center at 7968 San Paulo Rd. in El Paso. The HP POD datacenter is a state of the art datacenter alleviating the space and electrical issues faced by the City. The advantage the HP POD datacenter provides the County is geographic redundancy and failover for the County’s critical IT assets. • Sharing of fingerprint identification information for anyone arrested/detained in the El Paso area. This is a result of the regional AFIS system where equipment is deployed in both City and County facilities with a shared searchable backend database. • The expansion of the County’s data network to over 95% of the County via high speed communication links (microwave and fiber) while eliminating much of the older T-1 communication technology in use by the County. All these initiatives are at the core of this inter-local agreement in order to move the County and the City to the highest level of technology efficiency and operation. As a result of the inter-local agreement, both the County and the City have been encouraged to use economies of scale by jointly developing, operating, maintaining, and enhancing information technology projects and resources. Consolidation (IT Shared Initiative) The overall vision of an IT shared initiative would be to provide the citizens of the El Paso community with a cost effective and efficient set of IT organizations that make the best use of non-duplicative resources. This would include but not be limited to a set of government wide, modern, cost-effective, standardized, and interoperable IT solutions providing common, core functionality to support the County and City strategic management, and the safety and security of the El Paso community. The table below provides further detail on the objectives and goals of the IT shared initiative. Objective Goals Improved Management • Faster decision making Improve the government-wide strategic • More informed policy making management of human capital • More effective workforce management • Improved resource Operational Efficiencies • Improved servicing ratio/response times Achieve or increase operational efficiencies in the acquisition, development, implementation and • Reduced lifecycle refresh times operation of IT management & support • Improve system stability and information delivery Cost Savings and Cost Avoidance • Reduced duplicative software/ hardware/operations Achieve or increase cost savings and cost avoidance from IT solution activities • Streamline IT delivery Improved Customer Service • Increased accessibility to end users • Improved communication and responsiveness • Enhanced quality • Enhanced timeliness • Enhanced accuracy • Enhanced consistency Page 3

Information Technology Shared Services Report

Joint Project Analysis
Automated Finger Print Information System (AFIS) The Regional AFIS System stores all fingerprint identification information for anyone arrested/detained in the El Paso area. Historically, the El Paso Police Department (EPPD) stored all fingerprints resulting from EPPD arrests, including Class C arrests that were not reportable to DPS, while the County only stored electronic fingerprints for reportable offenses. As of 2009, the El Paso County Detention Bureau began processing fingerprints for all persons detained at the Downtown Jail and Jail Annex as well. This includes Class C Arrests, Federal Inmates, and Transfers. Fingerprinting of all inmates allows for a much larger fingerprint database, which can be used for investigation purposes and identification of repeat offenders at the Detention Facility. It also allows officers in the field to transmit Fast ID fingerprint information for immediate identification of suspects that have previously been through the system, dramatically reducing the potential for misidentification of arrestees. In addition, the capability also extends to the Court and the Adult Probation Department for verification of the identity of Defendants and Probationers. The benefits of a regional AFIS go hand in hand with the benefits of regional records management, regional crime reporting, and regional crime analysis. To the extent that this technology can effectively erase the geographical and jurisdictional boundaries that sometimes exist between neighboring law enforcement agencies, officer safety and the public safety as a whole can be dramatically enhanced. Fingerprints collected at crime scenes can be compared to a much larger database, which results in more crimes being solved. A centralized fingerprint database as well as centralized crime records allows the law enforcement community to operate more efficiently with a full regional crime records picture at their fingertips. Automated Finger Print Information System Contribution City County Total AFIS System Core $ 1,200,000.00 $ $ 1,200,000.00 AFIS Palms $ 915,000.00 $ $ 915,000.00 AFIS Storage $ 81,000.00 $ $ 81,000.00 AFIS Workstations $ 220,000.00 $ 55,000.00 $ 275,000.00 Live Scan Systems $ 206,000.00 $ 3,600.00 $ 209,600.00 2 Finger Fast ID $ 400,000.00 $ $ 400,000.00 AFIS/MARS/Storage $ 236,000.00 $ $ 236,000.00 Live-SCANS - Juvenile $ 80,000.00 $ $ 80,000.00 1. Maintenance on 5/11 AFIS/LIVEScan $ 150,000.00 $ 9,375.00 $ 159,375.00 City County Total Contribution By Gov't Entity $ 3,488,000.00 $ 67,975.00 $ 3,555,975.00 Amt. to Duplicate $ $ 1,202,016.07 Based on Equipment Used $ 2,285,983.93 $ 1,269,991.07 $ 3,555,975.00 Equipment deployed (Number of Units) 9 5 14
1. - County Use Only.

Page 4

Information Technology Shared Services Report The AFIS results are presented graphically below.
Automatic Finger Print Identification System $4,000,000.00 $3,000,000.00 $2,000,000.00 $1,000,000.00 $Contribution By Gov't Entity $City Amt. to Duplicate Based on Equipment Used County
$1,202,016.07 $2,285,983.93 $67,975.00 $1,269,991.07

$3,488,000.00

Microwave and Fiber Communications Project The Microwave Network initiative is intended to allow the County of El Paso to extend its network outreach to over 95% of the County through high speed links that are easily deployed in phases, and more flexible in nature than that of physical networks. The Technology will provide high speed bandwidth to sites that have traditionally used T1 connections through AT&T. By privatizing this network and removing AT&T T1 links, the County can expect to save thousands of dollars annually. This technology will allow a less complex model for the County’s external network in regards to build out, expansion and relocation, as and when the need arises. Some of the immediate benefits arising from the microwave and fiber communication project include: • Core network connection redundancy providing high availability to remote sites. • Cost effective network solutions reducing operating costs in the sum of $150k to $200k per year. • Ring based Metro Ethernet providing high speed data links to remote sites; supporting current applications, and future applications. • Network independence in regards to not relying on a single vendor/provider for the majority of the County’s connectivity as well as the ability to re-design/architect the future of the network at the County’s own pace and needs. • Quick Return on Investment resulting from the nature of the technology used and the location of the core network nodes (estimated 2-4 years). • Privately owned secure data-links in comparison to publically owned unsecured data-links which prepares the County’s infrastructure for current and future networking security guidelines. • Ability to share networking; thereby, connecting and resources with other County entities in a shared services platform.

Page 5

Information Technology Shared Services Report
Microwave and Fiber Communications Project Contribution City County Microwave Hardware City Fiber Project Fiber - City JPD Link Sheriff HQ Link $ $ 629,388.04 $

Total 629,388.04 1.

Contribution By Gov't Entity Amt. to Duplicate Based on Equipment Used Equipment deployed (based on sites)

$ 7,000,000.00 $ 300,000.00 $ 65,000.00 $ City County Total $ 7,365,000.00 $ 629,388.04 $ 7,994,388.04 $ 1,121,763.63 $ $ 6,243,236.37 $ 1,751,151.67 $ 7,994,388.04 46 210 164

$ 7,000,000.00 $ $ 300,000.00 $ $ 65,000.00 $

-

1. County owes City $629,388 for the hardware. This analysis considers it paid.

The Microwave and Fiber Communications Project results are presented graphically below.
Microwave and Fiber Connectivity Project
$6,243,236.37 $629,388.04

$8,000,000.00 $6,000,000.00 $4,000,000.00 $2,000,000.00 $-

$7,365,000.00

$1,121,763.63

$1,751,151.67

$‐

County City

Contribution By Gov't Entity

Amt. to Duplicate

Based on Equipment Used

Page 6

Information Technology Shared Services Report

Joint Datacenter Project One of the first joint projects under the inter-local agreement was the Disaster Recovery Datacenter for County and City. This project began in early 2010, and through the research and development process, it was decided that the most practical and economical direction was to invest bond monies into a prefabricated datacenter. This decision was made after exploring the possibilities of sharing space at El Paso Community College or leasing space at a Datacenter Co-location in El Paso. After much consideration, Hewlett Packard (HP) demonstrated a superior product and the decisions were made to move forward with a Performance Optimized Datacenter (POD) from HP. In addition to the POD, the County offered to renovate their datacenter space, and create a redundant component for maximum fault tolerance and data availability. Phase One began at the datacenter located at the MDR building. In an effort to upgrade connectivity, the County, with the Commissioner’s Court and City Council approval placed orders for Cisco network infrastructure hardware, software and performed an implementation of these services at the MDR datacenter. HP, also with the Commission’s and Council approval, outfitted this MDR datacenter with servers, storage and performed implementation services. The end result was the MDR datacenter being outfitted to serve as the disaster recovery datacenter for both the County and City after the completion of Phase Two described below. Phase Two consisted of the acquisition of an HP POD datacenter outfitted with HP servers and storage. The Cisco network infrastructure within the POD consisting of hardware, software and implementation services was to be deployed and connected back to MDR via City fiber. Once the services on the network were in place, the systems would be able to have automated failover in the event the POD datacenter suffers a failure and including a complete disaster where the POD datacenter is lost. At the end of Phase Two, the POD datacenter will serve as the primary production datacenter for both the County and City.

Page 7

Information Technology Shared Services Report
Joint Datacenter Project City Phase I HP Servers MDR Data Center Cisco Network Equipment Phase II Datacenter Active Power (Electrical Backup) POD (Datacenter Component) SOW for services POD Misc Earthwork/MEP Fiber Connections Fencing POD Servers and Storage Storage MDR Blades MDR EVA8400/SVSP Cisco POD Network Upgrades Cisco MDR to County Phase II Hardware POD Servers and Storage Storage MSC Storage MDR Blades MDR BTO SW Cisco Network $ 1,900,000.00 $ $ $ $ 976,574.00 $ Contribution County Total

898,000.00 $ 2,798,000.00 187,075.63 $ 187,075.63 224,398.00 $ 1,200,972.00

$ 1,100,000.00 $ 1,200,000.00 $ 418,035.00 $ 7,550.00 $ 304,043.84 $ 23,030.00 $ 24,999.00 $ 1,225,941.03 $ 553,073.00 $ 144,867.04 $ 136,606.00 $ 527,402.01 $ 472,286.76

$ 1,100,000.00 $ 1,200,000.00 $ 418,035.00 $ 7,550.00 $ 304,043.84 $ 23,030.00 $ 24,999.00 $ 1,225,941.03 $ 553,073.00 $ 144,867.04 $ 136,606.00 $ 527,402.01 $ 472,286.76

$ 2,299,999.99 $ 2,299,999.99 $ 111,668.74 $ 111,668.74 $ 478,712.99 $ 478,712.99 $ 645,602.30 $ 645,602.30 $ 349,562.01 $ 349,562.01 $ 976,573.87 $ 976,573.87 City County Total Contribution By Gov't Entity $ 10,816,351.74 $ 4,369,649.47 $ 15,186,001.21 Amt. to Duplicate $ 187,075.00 $ 3,077,657.00 Based on Equipment Used $ 8,973,546.17 $ 6,212,455.04 $ 15,186,001.21 Equipment deployed (based on racks) 13 9 22

Page 8

Information Technology Shared Services Report The Joint Datacenter Project results are presented graphically below.

Joint Datacenter Project $12,000,000.00 $10,000,000.00 $8,000,000.00 $6,000,000.00 $4,000,000.00 $2,000,000.00 $Contribution By Gov't Entity
City

$10,816,351.74
$4,369,649.47 $3,077,657.00

$8,973,546.17
$6,212,455.04

$187,075.00

County

Amt. to Duplicate

Based on Equipment Used

Fusion Center A Regional Fusion Center provides benefits that incident reporting and crime analytics in individual law enforcement agencies cannot provide. The establishment of a Fusion Center combines incident reporting from regional law enforcement agencies, the 911 District, and even fire and GIS information into one central information database which can greatly benefit the entire region. The success of a Regional Fusion Center depends primarily on participation by regional agencies dedicated to public safety. One important example of this is predictive analysis of crime. Predictive analysis and modeling essentially depend on "connecting the dots" within a region in order to identify and address "hot spots" and patterns. Without full participation by all agencies in a region, the missing "dots" can lead to less accurate results and diminish the usefulness of the information. However, full participation, provides the largest amount of information, thereby enhancing the ability of the participating entities to provide increased public safety. Cooperation between agencies in contributing information to a Regional Fusion Center is also of paramount importance.

Page 9

Information Technology Shared Services Report
Fusion Center City Fusion Ctr. Software Costs - (Est.) Software General ESRI I2 - Coplink Subscriptions Fusion Ctr. Hardware Costs City (EST.) Contribution By Gov't Entity Amt. to Duplicate Based on Law Enforcement Officers Number of Law Enforcement Officers $ $ $ $ $ $ $ $ 974,000.00 15,000.00 380,000.00 20,000.00 2,000,000.00 City 3,389,000.00 2,867,615.38 1,100 $ $ $ $ $ County $ $ $ $ 521,384.62 $ 200 Contribution County $ $ $ $ $ Total 974,000.00 15,000.00 380,000.00 20,000.00 2,000,000.00 Total 3,389,000.00 1. 2. 3,389,000.00 1,300 3.

1. The project was entirely grant funded. The City worked to obtain the grant on behalf of the community. 2. Due to the need for muli-agency participation, the center would never be duplicated if the parties would separate. 3. Law enforcement groups benefit prorata.

The Fusion Center Project results are presented graphically below.

$3,389,000.00 $3,500,000.00 $3,000,000.00 $2,500,000.00 $2,000,000.00 $1,500,000.00 $1,000,000.00 $500,000.00 $Contribution By Gov't Entity

Fusion Center $2,867,615.38 $$-

$-

$521,384.62 County City

Amt. to Duplicate

Based on Law Enforcement Officers

Page 10

Information Technology Shared Services Report NeoGov NEOGOV automates the County’s and City’s hiring and performance evaluation process, including position requisition approval, automatic minimum qualification screening, test statistics and analysis, and EEO reporting. The County purchased NeoGov and leveraged the scale of the City investment in this product to secure a better price based on volume. In addition to the savings, the City NeoGov experts shared their knowledge of the product and the various installation issues, thereby reducing the amount of time to have a working product. NeoGov Contribution City County Total $ 36,000.00 1. Insight Enterprise user License (Annual) $ 36,000.00 $ NeoGov (TMS) License $ 15,000.00 $ $ 15,000.00 Setup / Implementation $ 3,000.00 $ $ 3,000.00 Online Training $ 2,500.00 $ $ 2,500.00
City County 56,500.00 $ $ $ 28,000.00 37,381.85 $ 19,118.15 $ 5,600 2,864 Total 56,500.00 56,500.00 8,464

Contribution By Gov't Entity Amt. to Duplicate Based on Number of Employees Number of Employees

$ $ $

1. This is an annual license fee for software use. The fee is for the period 9/15/10 to 9/14/11 and the same amount is due annually.

Page 11

Information Technology Shared Services Report NeoGov results are presented graphically below.
NeoGov $56,500.00 $60,000.00 $50,000.00 $40,000.00 $30,000.00 $20,000.00 $10,000.00 $Contribution By Gov't Entity City Amt. to Duplicate Based on Number of Employees $County $$28,000.00 $37,381.85 $19,118.15

In Motion In Motion Technology allows a vehicle to operate as its own wireless network by establishing a mobile gateway that can support multiple wireless devices for use by officers in the field. In essence, the vehicle becomes the officer's own personal "hot spot". Historically, devices that were installed in public safety units were outfitted with wireless cards that allowed them to connect to a network in order to transmit data and operate on-board software. A major disadvantage of this methodology was that each device required a separate wireless cellular card which, in turn, carried separate monthly access charges. As more devices were developed, it became apparent that it would be more cost-effective to allow them to share a single gateway. A reliable on-board system coupled with reliable wireless infrastructure decreases network dis-connectivity and increases uptime, thereby allowing the officer to take full advantage of all the tools at his or her disposal. As new technologies are introduced that enhance public safety, reliable connectivity is of paramount importance. As with other regional initiatives, when multiple agencies in a single region can share the networking technology as well as the infrastructure that supports it, a significant cost savings can be realized. That, however, is secondary to the fact that increased reliability of the onboard devices leads to increased public safety.

Page 12

Information Technology Shared Services Report
In Motion Contribution City County 60,000.00 $ 87,000.00 $ 915,800.00 $ $ 342,000.00 City 1,062,800.00 $ $ 1,022,830.21 $ 482 2. $ $ $ $ Total 60,000.00 87,000.00 915,800.00 342,000.00 1. Total 1,404,800.00 1,404,800.00 662

Software General Servers / Systems In Motion Unit Costs (Fire and PD) In Motion Unit Costs (Sheriff)

$ $ $ $

Contribution By Gov't Entity Amt. to Duplicate Based on Law Enforcement Officers Number of Units Installed

$ $ $

County 342,000.00 $ 147,000.00 381,969.79 $ 180

1. The funding was provided by the 911 district. 2. All project funding was provided by a UASI grant; therefore, the City and County expended no funds of their own. Dollars shown represent benefits only.

The In Motion Project results are presented graphically below.
In Motion $1,022,830.21 $342,000.00 $147,000.00 $Contribution By Gov't Entity $381,969.79

$1,200,000.00 $1,000,000.00 $800,000.00 $600,000.00 $400,000.00 $200,000.00 $-

$1,062,800.00

County City

Amt. to Duplicate

Based on Law Enforcement Officers

Page 13

Information Technology Shared Services Report Next Steps and Recommendations The first step in an ongoing effort by ITD is to continue to track cost savings and cost avoidance. Going forward, this document will be used as a baseline against which cost savings and cost avoidance will be tracked. ITD recommends that steps be taken to move forward towards a consolidated IT department, with the guidance from both the Commissioners and Councilors from both entities, including the financial and legal teams, to smoothly move forward with this transition. Additionally, both the City and County should continue to work together to better seek cost savings in IT projects of similar nature.

Page 14

Similar Documents

Premium Essay

Applied Research

...Information Technology and the Intranet Sherri Wheeler Keller Graduate School of Management IS535ON JUL10 SECJ Abstract Information Technology has become essential in every organization; it has provided firm and specific value which results in competitive advantage over other firms. Investigations are conducted to deal with specific business issue of technology. A report is prepared on procuring I.T. services from IBM. Companies have the intention of connecting with IBM for I.T services news and information through the Internet. Business services offered by IBM are being studied, and a particular focus is on consulting and information services. Website services and other Application services are also investigated to report on I.T. issues. The strategic results of information technology solution will provide expertise, consultancy which will assist in building competitive advantage. Purpose of the Report: The report aims at obtaining information about I.T. services from the IBM, an information technology and consulting firm. Also, this report will show the benefits of incorporate the intranet for internal and external purposes. A study is conducted on how to access integrated data, acquire knowledge and guidance. Intranet: An intranet is an internal, secured business environment, which uses HTML and TCIP protocols like the Internet, but operates on a LAN (local area network). If the LAN provides access to the Internet, the intranet resides behind a firewall...

Words: 1844 - Pages: 8

Premium Essay

Lodging

...summary The purpose of this report is to designing a new boutique hotel’s club floor. The structures of this report are as follows. First, we will discuss the background information and state the objective of the report. Second, we will focus on South Korea IT Professionals and analysis their demographic and socioeconomic profile by relevant articles and literatures. Also, the purchasing power and arrival number of South Korean business traveler will be forecasted. Third, we will conduct a service analysis of South Korea IT professionals by Hofstede’s Cultural Dimension. Fourth, Hotel ICON and Butterfly on Prat are selected as our major competitor; therefore we will conduct a competitor analysis to find out their strengths and weaknesses by various kinds of methods. Based on these findings, we will then design the features and services of a new hotel’s club floor in order to compete with our competitors, also we will clarify how these features and service can satisfy our target market, South Korea. Lastly, End with making a short conclusion to see if our works can meet this report’s objectives. Introduction Retain competitiveness is one of the biggest challenge for the hotel. We, consultants of lodging and accommodation management, is always helping hotel to retain its competiveness. Recently, I-Hotel hire us to design the feature and service for their club floor in order to compete with their competitors. The objective of this report is to make a deep analysis for the...

Words: 4387 - Pages: 18

Premium Essay

Management Information Systems

...INF 464: Management Information Systems Lecture Notes Dominic K. Louis (Lecturer, Faculty of Informatics) 2 Course Introduction Management Information Systems BIT L400 - 2014 Delivery Overview 3  Course Aim / Objectives  Learning Outcomes  Course Content / Schedule  Assessment  Recommended Textbooks Management Information Systems BIT L400 - 2014 Delivery Course Aim / Objectives 4  This course aims to:  provide students with knowledge about the technological foundation of business information systems.  familiarize students with business information systems relevant to their professional career.  equip students with the essential skills to work with common computer applications in today’s business world. Management Information Systems BIT L400 - 2014 Delivery Learning Outcomes 5  On completing this course, students should be able to:  discuss the organizational, technological, strategic and ethical dimensions in the development, implementation, and use of information systems in a business setting.  apply the general knowledge and methodologies of information systems to devise and evaluate effective solutions to business problems within a given context. Management Information Systems BIT L400 - 2014 Delivery Course Content / Schedule 6 Management Information Systems BIT L400 - 2014 Delivery Assessment 7  The course has the following assessment components: ...

Words: 1222 - Pages: 5

Premium Essay

Sales and Inventory

...Overview of the Report The main objective of the study is to create an sales and inventory systemfor WMV Enterprises. With the use of the system, the retrieval process willspeed-up.   To be able to generate immediate sales report. With the use of thesystem, the incomes are classified as product sales. The total sales areautomatically computed and sales report is generated. In addition, the user canalso view the total sales daily, weekly,monthly and yearly. In this way, it canproduce an immediate sales report. To provide an efficient monitoring of stocksand re-ordering. By checking in the system, it will be easy to identify the numberof available and lessening product and which is need to re-order. In addition, theexpiration of the product is also monitored in the system. Brief Description of the System Information Technology or I.T is endless important to a business due toits plethora of function. Firstly I.T can be used to enhance your customersexperience with your company, through use of a well-designed website. Thisallows you to connect with people that you may not have previously been able toreach, due to them living away from cities or even branching out overseas. Thisis profitable for a business as quite simply, it brings in more customers andtherefore more money.The used of automated system nowadays has a great impact in manydifferent fields, especially in businesses. In this dynamic environment, theinformation processing of the business operations relies on the informationsystems...

Words: 265 - Pages: 2

Premium Essay

Security Policy

...shall be the responsibility of the I.T. Department to provide adequate protection and confidentiality of all corporate data and software systems, whether held centrally, on local storage media, or remotely, to ensure the continued availability of data and programs to all authorized members of staff, and to ensure the integrity of all data and configuration controls. Summary of Main Security Policies 1.1. Confidentiality of all data is to be maintained through discretionary and mandatory access controls, and wherever possible these access controls should meet with C2 class security functionality. 1.2. Access to data on all laptop computers is to be secured through encryption or other means, to provide confidentiality of data in the event of loss or theft of equipment. 1.3. The use of unauthorized software is prohibited. In the event of unauthorized software being discovered it will be removed from the workstation immediately. 1.4. Data may only be transferred for the purposes determined in the corporate data- protection policy. 1.5. All disk drives and removable media from external sources must be virus checked before they are used within the corporation. 1.6. Passwords must consist of a mixture of at least 8 alphanumeric characters, and must be changed every 60 days and must be unique. 1.7. The physical security of computer equipment will conform to recognized loss prevention guidelines. 1.8. To prevent loss of availability of I.T. resources measures must be taken...

Words: 1364 - Pages: 6

Free Essay

Cict Lan Based Examination and Monitoring System

...CICT LAN-BASED EXAMINATION AND MONITORING SYSTEM ____________________ A Capstone Project Presented to the Faculty of College of Information and Communications Technology Bulacan State University City of Malolos ____________________ In Partial Fulfillment of the Requirements for the Degree of Bachelor of Science in Information Technology By: Dimaapi, Dunhill S. Jingco, Desserie Rose F. Joson, Ester Grace G. Narciso, Claudine R. Palad, Kenneth B. (BSIT 3B-G2) March 2015 i TABLE OF CONTENTS TITLE PAGE …………………………………………………………………………………. i TABLE OF CONTENTS …………………………………………………………………….. ii 1.0 PROJECT DESCRIPTION Overview of the Current State of Technology ……………………………………………. 1 Project Objectives ………………………………………………………………………… 2 Scope and Limitations of the Project ……………………………………………………... 4 Significance of the Project ……………………………………………………………….. 5 2.0 REVIEW OF RELATED LITERATURE AND STUDIES Related Literature ………………………………………………………………………… 6 Related Studies …………………………………………………………………………… 7 3.0 PROJECT METHODOLOGY Theoretical Framework …………………………………………………………………… 9 4.0 THE CICT LAN-BASED EXAMINATION AND MONITORING SYSTEM System Overview ……………………………………………………………………...… 10 System Objectives ……………………………………………………………………..... 11 System Functions ………………………………………………………………………... 12 System Scope and Limitation …………………………………………………………… 16 Physical Environment and Resources ………………………………………………….... 17 Architectural Design ERD …………………………………………………………...

Words: 6720 - Pages: 27

Premium Essay

Financing New Ventures

...Nicholas Johnson ETR 315 Financing New Ventures Professor Gilles Business Valuation Report The Business Valuation report will discuss how these companies compare and which companies are performing. The report will give and in depth analysis for the financial forecasting and the business valuation models. The four companies Alex and Ani, I.T. source, Mastero technologies, and Veteran Corps of America. The first company Alex an Ani cost of capital and the weighted average for the cost of equity and the cost of debt for each corporation. The cost of capital rate should be used as the discount rate for present value (PV) of the free cash flow (FCF) and terminal value (TV) of the business.The business valuation calculation for Alex an Ani show that the company is profitable and estimates for the company include the present value of the free cash flow (FCF) from the 5-year revenue and earnings forecast and the present value of the terminal value (TV) based on the free cash flow (FCF) in the fifth year using the cost of capital. The combination of present values from discounted cash flows and discounted terminal values would represent the total business values for each of the four privately-held corporation.While this valuation was generated considering as many company, industry and location specific details as available, the value presented in this report is an automated estimation of the assets and liabilities. Some events and circumstances that might impact the overall...

Words: 1014 - Pages: 5

Free Essay

Ums Fee Stuctur

...|TeRm PaPeR for Oops … | | | |Topic:-Fee Structure Of a University | | | |03/12/2009 | |Submitted to:- Ms .Jagriti sharma | |Submitted by :Hitesh Arora | |RD-1801A21 | |Reg.no-10800783 | Contents for synopsis:- 1.Introduction 2. TOOLS / PLATFORMS & LANGUAGE 3. OBJECTIVE OF THE PROJECT 4. INPUT TO THE PROJECT 5. OUTPUT OF THE PROJECT 6. DATABASE DESIGN 7. DATA FLOW DIAGRAMS 8. SCOPE OF FUTURE APPLICATION 9.SOURCE CODE ACKNOWLEDGEMENT It acknowledges all the contributors involved in the preparation of this project. Including me, there is a hand of my teachers, some books and internet. I express most gratitude to my subject teacher, who guided me in the right direction. The guidelines provided by her helped me a lot in...

Words: 915 - Pages: 4

Premium Essay

Business

...Economics | 09 | International Journal I.T. & Knowledge Management | 10 | International Journal of I.T. & Library science technology | 11 | International Journal of Reliability & Quality Performance(IJRQP) | 12 | International Journal of Advanced Research in Management & Technology | 13 | International Journal of Applied Business & Economics Research (JABER) | 14 | International Journal of Asian Management & Finance | 15 | International Journal of Business Intelligence & Management (IJBIM) | 16 | International Journal of business Management Economics & I.T. | 17 | International Journal of Business Statistics & Finance | 18 | International Journal of Contemporary Issues in management | 19 | International Journal of Data analysis & Information System (IJDAIS) | 20 | International Journal of Decision Making is supply chain & Logistics | 21 | International Journal of Decision Science (IJDS) | 22 | International Journal of Digital Libraries & Knowledge Management | 23 | International Journal of Entrepreneurship & Management Research | 24 | International Journal of Entrepreneurship & Public Policy | 25 | International Journal of Financial Markets | 26 | International Journal of Human Resource Development & Management Review | 27 | International Journal of Information Retrieval (IJIR) | 28 | International Journal of Intelligent information processing | 29 | International Journal...

Words: 640 - Pages: 3

Premium Essay

Risk Management Plan

...------------------------------------------------- Risk Management – Sector I Risk Management Plan Introduction Version 1.2.0 Designed by: Defense Logistics Information Systems Designers: Matthew Gugumuck Michael Mawyer Daryl Giggetts | Overview | * The goal of the Risk Management plan is to design and execute the implementation of various security policies and different counter-measures in the event of any type of risk, threat, and/or vulnerabilities against the organizations daily operations and sensitive information. By combining both hardware devices and software applications will boost the effectiveness of security and preventing unauthorized access and effectively repulsing attacks. | Authority/Ownership | * Any information and sensitive contents contained in this document has been planned and developed by DLA Logistics Information Service and in which is the rightful owner of this document. All materials contained within this document is considered CLASSIFIED and is also copyrighted by DLA Logistics Information Service (DLIS). Any wrongful use of such material and/or reference to this document without the rightful expressed and written consent of the owner(s) may result in criminal prosecution. | Sections contained in DLIS Risk Management Plan | * Risk Management Overview * Planning and Implementation of Risk Management * Key Personnel Roles * Risk Assessment Plan * System Analysis and Characterization ...

Words: 4166 - Pages: 17

Free Essay

System Flowchart

...The above are all the some weaknesses which are not present. If management wants to overcome these weaknesses in short time then first change the policy and make new strategy and immediately implement on the business to get the good results in less time. If the organization keeps going on the old policies and with the weaknesses then it will lead a failure or may be shutdown of operations in future. Internal control means different things to different people. This causes confusion among businesspeople, legislators, regulators and others. Resulting miscommunication and different expectations cause problems within an enterprise. Problems are compounded when the term, if not clearly defined, is written into law, regulation or rule. This report deals with the needs and expectations of management and others. It defines and describes internal control to: 1. Establish a common definition serving the needs of different parties. 2. Provide a standard against which business and other entities--large or small, in the public or private sector, for profit or not can assess their control systems and determine how to improve them. Internal control is broadly defined as a process, affected by an entity's board of directors, management and other personnel, designed to provide reasonable assurance regarding the achievement of objectives in the...

Words: 1027 - Pages: 5

Premium Essay

What Would I Do

...Communication is an important facet of life. Communication skills are essential in all spheres of life. Be it an interview or dealing with the project leader or working out a solution with a team or writing a report, getting across the point effectively is what matters. The success of an endeavour hinges on the ability to communicate effectively in today's fast paced life, everyone is asked to do more with less. In such a scenario effective communication holds the key. Effectively communication centers round the usage of words, speed of delivery of words, pitch modulation and body language. Using the right tools to communicate the right messages at the right time can salvage a crises and motivate people to work towards success. Truly said, communication works but for those who work at it. In the existing globalization scenario, most of the Information Technology, I.T Enabled Services, management institutes, public and private sector, multi-national Companies, Union Public Service Commission, and State Public Service Commission are search for a right and suitable fresher for executive posts. Whatever be the recruiting criteria that I.T, ITES, industry giants had in their agenda, once this was clear a first class degree would not serve the purpose, the candidate have to satisfy the skill sets that the companies were looking for. And unanimously, the skills set that they were looking for communication skills. People in organisations usually spends 75 percent of their daily...

Words: 453 - Pages: 2

Premium Essay

Importance Of E-Business

...Introduction During the last decade, the I.T. Security industry has struggled to keep up with the new trends and developments caused by the growing importance of Information Technology and e-Business. BIS (2004) describes e-Business as a specific way of doing business utilising electronic media such as the Internet. Jelassi and Enders (2005: p.4) on the other hand, define e-Business as “the use of networked information technologies to conduct an organisation's business internally and/or externally. Internal business activities include the linking of an organisation's business units and employees with each other through an intranet to improve information sharing, facilitate knowledge dissemination, and support management reporting. With an external...

Words: 2482 - Pages: 10

Free Essay

Disaster Recovery Plan

...Business running again – after 47 hours from the airplane impact at the WTC. The reason: * A well conceived DRP; * A skillful execution of the DRP, with people working on adrenaline and reacting on instincts. DRP – based on several mirror sites. Triangular architecture: WTC – Rochelle Park – London. The significant loss of lives made recovery from this event especially difficult. Sources (moving forward): http://www.baselinemag.com/c/a/Business-Intelligence/Pop-Culture/ From day one, Rochelle Park was seen as a concurrent system, not a disaster-recovery site. The shift was driven by eSpeed's role as the largest player in electronic bond-trading, which meant uninterrupted service was an imperative. The nondescript building in a blue-collar town was perfect—a former telecom facility across from another telecom building. Systems alternated between the trade center and the mirror site, with particular products (e.g., zero coupon bonds) running live for a month at one location and then switching to the other; about half of the company's approximately 40 products were live at each location at any given time. "In that sense we had run our disaster-recovery tests the day before," says Noviello. The mirror site and the World Trade Center were connected by a high-speed optical line, over which eSpeed linked the storage area networks at each site. Sybase data-replication software mirrored critical databases between the sites. Half of the company's Microsoft...

Words: 2816 - Pages: 12

Free Essay

N Report

...ON-THE-JOB TRAINING AT THE DEAN’S OFFICE, COLLEGE OF COMPUTING AND INFORMATION TECHNOLOGY, ISABELA STATE UNIVERSITY, CAUAYAN CITY, ISABELA JOHN DAVID C. CADIENTE ============================= NARRATIVE REPORT ============================= Republic of the Philippines ISABELA STATE UNIVERSITY College of Computing and Information Technology Cauayan City, Isabela March 2012 APPROVAL SHEET The narrative report entitled, “ON-THE-JOB TRAINING AT THE DEAN’S OFFICE, COLLEGE OF COMPUTING AND INFORMATION TECHNOLOGY, ISABELA STATE UNIVERSITY, CAUAYAN CITY, ISABELA”, prepared and submitted by JOHN DAVID C. CADIENTE, in partial fulfillment in the requirements for graduation with the course, BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY (BSIT), is hereby endorsed. GUIDANCE/ADVISORY COMMITTE DIONICIO D. GANTE OJT Coordinator/ Adviser CARMELO M. IBBARETA English Critic ________________________________________________________________________ Accepted as a partial fulfillment of the requirements for graduation with the course Bachelor of Science in Information Technology. MARY JANE S. BITANGA _________________ Dean, CCIT Date Recorded by: ADELA L. REYNO _________________ Campus Registrar Date ACKNOWLEDGEMENT DEDICATION TABLE OF...

Words: 728 - Pages: 3