...UMUC Haircuts Stage 3 The implementation of a new scheduling web-based application, Schedulicity, will bring customer scheduling into the 21st century. The web based program will simply require internet service and a computer in order to access the online application from within the store. From the store computer, call in customers can be manually entered into the online scheduling application or the customer may schedule themselves from their own personal computer or mobile phone application. This technology system was specifically chosen for UMUC Haircuts because the cost for implementation and maintenance is very low and requires minimal resources aside from a computer and local internet connection. Myra will finally have customer scheduling linked to her employees schedules via the Schedulicity calendar her business will utilize for customer appointment times. This calendar will display the times Mya’s employees will be working in order for customers to select their desires hairstylist and time. Generic Strategy: Differentiation Strategic business area: Operations Management Process to be improved: Customer and employee scheduling | High/Medium/Low Importance or Relevance or Not Applicable (N/A) | Explanation for Ranking(minimum 2 sentences for each, linked to specific technology solution proposed) | Usability | High | The web application has to be easy to use because although customers may receive services without utilizing the new system, the employees and...
Words: 1488 - Pages: 6
...Availability will ensure that data is readily available to authorized users. Data availability will provide MMPS' new small IT specialists team with the required information to continuously track the organization's telecommunication network for any potential discrepancies, and take appropriate steps to prevent potential system crashes. This will provide more uptime for business operation. Data reliability is particularly important for MMPS due to its load of customer base. With 75000 customers' data to manage, duplicate or erroneous data will only put too much of a burden on MMPS' network, thus could lead to system crashes as the company is currently experiencing. Scalability wise, due to the age of the current network, the new network should be flexible and able to adapt future growths and expansions. Because the company is planning to acquire some more small suppliers in the future, its new telecommunication network should be implemented with proper technologies to integrate future addition. With the new design MMPS' data security will be primordial and will be protected. To achieve data security, procedures to achieve data confidentiality and integrity must be implemented. Confidentiality consists of protecting an information asset by providing access to only authorized users while unauthorized users are denied access. In other words, confidentiality is the privacy of an asset, and can specifically be defined as which people; under what conditions are authorized to access an...
Words: 805 - Pages: 4
...Week 1 – Project #1 INSTRUCTIONS: Please read the entire assignment before beginning so that you have all of the needed information before you begin planning your network architecture. You must either submit a typed Word document that contains all of the parameters for the assignment or you may provide a hybrid Word document that implements tables or diagrams to aid in the explanation of your architecture. While a diagram requires more effort and work, and is not required, it may serve to make the assignment easier as you begin assigning IP addresses and as you begin deciding on a routing protocol. I leave this decision to you, whichever works best for you! There is no mandatory length to this assignment. If it takes you two pages or ten to meet the criteria for receiving full credit, that is up to you. Understand that there is no one correct way to implement this architecture. This assignment leaves a lot of room for customization and personalization; however, to receive full credit for the assignment you MUST complete all 10 items listed below. This project will be a practical application assignment that tests the student’s ability to plan various aspects of a company’s network architecture. This assignment is designed to mimic a real world scenario that you may encounter at your company’s location or as a service that you provide to your clients in the future. Believe it or not, while the assignment may sound and seem simple in the classroom, it can become stressful when...
Words: 984 - Pages: 4
...questions must be answered before students can submit a quiz for grading. The first passing score (70+) will automatically post to the Portfolio. Although the quiz can be taken multiple times in this course, ONLY THE FIRST PASSING GRADE (70 or above) will be counted towards your final grade—the rest will serve strictly as final exam preparation. Please note that while the instructions before each Concept Checkup state "You may take the quiz as many times as you wish in order to improve your score or comprehensively test yourself", only the first passing grade (70+) will be posted to the Portfolio. Once you earn a passing grade, you can retake a concept checkup but higher scores will NOT count towards your grade. OLI Quizzes This section of IFSM 201 is utilizing material found in a link to the Carnegie Mellon Open Learning Initiative site. You should have already registered to gain access to this site. Here you will be reading material in “Modules” and completing quizzes, at the end of each module and at the end of each of the two units assigned. The due dates for completion of the quizzes are found in the schedule in this syllabus and in the OLI syllabus area. The grades for the two UNIT Quizzes will be entered by your instructor Personal Budget: Excel This assignment...
Words: 1030 - Pages: 5
...IFSM 201 November 16, 2014 Identity Theft The fastest growing financial crime is identity theft, it has affected 500,000-700,000 people in the United States. Identity theft occurs when people steal other people’s information and use the information to apply for credit cards and loans. The different types of information taken from victims can be: bank statements, copies of credit applications, lost or stolen credit cards, physician statements. Identity thieves will impersonate as representatives of government agencies, banks, and even internet service providers to collect social security number, passwords, mother’s maiden names, financial information, and other identifying information. Imposters will use different ways to acquire identity from victims through stealing wallets and purses which contain identification and bank cards. Also imposters will steal mail, which include those annoying preapproved credit offers, bank statements, tax information. Identity theft is serious as any major crimes it has caused people to commit suicide because of the stress and hardship that an individual endures. Identity theft can affect a person a week or even years of hardship and stress. I personally was a victim of identity theft on 2006 resulting in months of hardship and stress. On June 18, 2006 my family and I took a vacation to Philippines for a month and left our house with my brother to look after. As we were enjoying our vacation within two weeks I received a call from my brother...
Words: 1047 - Pages: 5
...Specification for*********, IFSM 201 Due: June 22 Our educational company is a small business with users who will use specialized applications and customized configurations. Staff needs to use desktop computers that are connected together and capable of running sophisticated software programs. The office handles multimedia contents which demand a lot of the PCs’ processor time, resources as well as upload/download contents from the internet. Given the needs of our office, my recommendations are: desktop computers with fast processors preferably, Intel® Core™ i5-4570 Processor (Quad Core, 3.20GHz Turbo, 6MB) plenty of memory (ram); graphic cards for smooth video presentation; video capture cards for multimedia input; and at least 6 USB ports for attaching any extra peripherals. A solid state drive will improve read/write performance of the PCs. A Gigabit Ethernet cards will ensure fast internet speed when uploading or downloading media contents. I have recommended specific details in the following tables, with references to websites where the items can be purchased. Hardware Table: GROUP | DEVICE- Make/Model/Vendor | REQUIRMENTS | INPUT | Key board | US English (QWERTY) Dell KB212-B Quiet USB Keyboard | | | Mouse | Dell MS111 USB Optical Mouse | | | Scanner | HP Officejet Pro 8600 e-All-In-One Printer, Copier, Scanner | scan and edit the photos | | Digital Camera | Canon - Bundle S110 12.1 MP Camera with 5x Wide-Angle...
Words: 921 - Pages: 4
...UMUC Haircutters Stage 2 Introduction Generic Strategy for Competitive Advantage: Cost Leadership Strategy Business Process to be Improved: Customer and Employee Scheduling Table of Functional (Business) Requirements: Table of Functional (Business) RequirementsSteps in the Appointment Process | Process Step | Input Information/data item(s) entered into the system as part of this step | ProcessProcessing or action the system must perform for this step | OutputInformation/data item(s)/record created, or displayed, or printed out for the user in this step | 1 | Last name and Phone Number | Verify Last name and Phone Number from customer database | Welcome “Customer’s name”! or “Invalid Last name/Phone Number Combination | 2 | Last name and phone number | Enter new customer data into customer database | Welcome “new customer’s name”! | 3 | Services Required | Locate and present options and prices for services required | Prices of service required | 4 | Date and time for services required | Locate employee scheduling | Dates and times of stylist availability | 5 | Confirmation of appointment date and time | Verify date and time is correct/ and stylist is available | Your appointment has been set for” date and time” with “stylist name” | 6 | Paper receipt of services rendered | Verify all services have been accounted for; add up prices for final total | Your total for today is:”total” | 7 | Feedback from customer | Verify that feedback survey is complete;...
Words: 282 - Pages: 2
...ITSP #1 Assignment Hints Business Statement: Review the case-study overview and incorporate the information into this section. Include the type of business we are in, geographical information, background, and the current economic climate as well as future financial goals. Business Strategic Objectives: Under the Administration section of the case study, the three new strategies are underlined. List them with an elaboration on each. Add one not listed/related to the three and discuss it. There are also three federal and state mandates listed which can be considered and incorporated as your new strategic objective. Do not incorporate old technology such as the use of cell phones and fax machines. Be innovative and consider the use of new technology for your additional objective. * Links on sample company strategies/strategic plans: * FedEx: http://investors.fedex.com/company-overview/mission-and-goals/default.aspx * County of San Diego IT Strategy: http://www.sandiegocounty.gov/cto/docs/it_strat_plan.pdf * San Diego Strategic Plan Complete: http://www.sdcounty.ca.gov/dmpr/gfx/CAO_Strategic_Plan/stratplancomplete.pdf * United States Office of Personnel Management Strategic Information Technology Plan: http://www.opm.gov/about-us/budget-performance/strategic-plans/strategic-it-plan.pdf * University of Maryland Strategic Plan: www.umaryland.edu/strategicplan/ * University of Maryland Strategic Plan Update: http://www...
Words: 766 - Pages: 4
...Due to growth and the continued requirements of rapid availability of data which must also be secure the dental business has sought to upgrade its current network infrastructure. Presently the dental business consists of 5 offices located throughout the city. There are 15 dentists and 12 dental assistants that will need instant access to patient records and schedules. Additionally, four of the dentists regularly work outside of the office and will require mobile access. It is imperative that this patient data is protected from hackers. These goals all must be achieved with any new network redesign as they are all mission critical to the dentistry business. To ensure the rapid transfer of data between the offices there will need to be a Metropolitan Area Network (MAN). This will allow the offices to all communicate directly with one another without having to reach a central network location before being redirected. This boosted communication capability will allow better coordination which will improve customer satisfaction and could even be the difference in saving someone’s life in a medical emergency. Setting up a MAN can be done through a local internet service provider and can give access to even greater speeds than some other services. This is also cheaper to set up compared to creating a new MAN. To deal with the needs of the mobile dentists a two part solution is needed. First, the company will set up a Virtual Private Network (VPN). This will allow people that have...
Words: 733 - Pages: 3
...Medical Privacy and Your Information IFSM 304 Abstract With the increasing amount of personal data which is being compiled on the Internet and specifically medical information we must look at the ethical dilemma of who has access to our data. Not only general demographic data such as full name, home address, phone number and date of birth but also extremely sensitive medical information such as diagnosis, and medication prescribed. Even though the convenience of digital records accessible to care providers via the web can expedite service, security and privacy have to be considered and maintained. Ethical dilemma: Medical Privacy and Your Information | Stakeholders | Veracity | Confidentiality | Autonomy | 1: Individual | Individual must ensure truthfulness and accuracy in providing any information to medical personnel. | Individuals must the right for privacy of all medical information . | The individual patient must ensure their right to make any decisions in dealing with their treatment and how their personal information is handled. | 2: Medical Personnel | Have the responsibility to provide truthful information concerning a patient’s diagnosis and treatment. | Responsible to maintain the personal privacy of all patients’ information. | Have the responsibility to make appropriate decisions when dealing with patient data. | 3:Website/Cloud Administration | Must maintain the appropriate level of ethical and legal obligations and ensure all site users are...
Words: 549 - Pages: 3
...Rock Zang IFSM 300 MID TERM EXAM Professor Beach 1. List, describe, and provide an example of each of the five characteristics of high quality information. High quality information is; Accurate- Information that contains all properly spelled names, words, dates, etc. The accuracy of information is important for many reasons such as a package delivered properly to a customer, a return phone call regarding a customer service issue, or a misplaced decimal point on a bank deposit slip. Any of the previously mentioned mistakes, by the customer or the employee, could result in a loss of business or profits. When developing IT systems, there are certain conditions available to a programmer that can help minimize these easily made mistakes. One example of such a condition would be creating a rule that 5 digits must be entered when asking for a consumer’s zip code. Completeness- Any information that is incomplete will prevent accurate results. Imagine a medical survey with a cell requesting a person’s date of birth. If the survey only captures the day and month of birth, the information available will not include the samples actual age, only their day and month of birth. This could prevent the employee from maintaining the average age of the consumers. Consistency- The consistency of information across different data centers, or within a single data sheet can create a problem in trying to accurately search and find an individual or an individual’s tendencies...
Words: 2127 - Pages: 9
...WEB SECURITY POLICY IFSM 304 Overview : With the increasing amount of personal data that is being compiled on the Internet and specifically individual’s medical information we must look at the ethical dilemma of who has access to our data. Not only general demographic data such as full name, home address, phone number, and date of birth but also extremely sensitive medical information such as diagnosis and medication prescribed. Even though the convenience of digital records accessible to care providers via the web can expedite service, security and privacy have to be considered and maintained. An organizational policy is required to provide guidance, direction and responsibilities to ensure compliance with all Health Insurance Portability and Accountability Act (HIPAA) requirements. HIPAA is the acronym that was passed by Congress in 1996. (Health, n.d.) Purpose: To promulgate organizational policy, procedures, and program management for web security. This policy defines the technical controls and security configurations users and information technology (IT) administrators are required to implement in order to ensure the confidentiality, integrity, and availability of the data environment in accordance with HIPAA does the following: Provides the ability to transfer and continue health insurance coverage for millions of American workers and their families when they change or lose their jobs; Reduces health care fraud and abuse; Mandates industry-wide standards...
Words: 1100 - Pages: 5
...SOFTWARE PIRACY IFSM 304 Abstract In the various media industries there are extreme worries concerning unauthorized downloading and copying of their products known as piracy. Piracy of items has been part of commerce for centuries; counterfeiting of currency for example. With the information age the ease at which media can be pirated has caused an explosion of this phenomenon. This practice is an illegal act that is done by individuals for personal use and also for profit. The first do not seem to see the issues caused by this practice such as; the spreading of viruses and lower quality products. We will use Reynolds' Seven-Step Ethical Decision Making Approach for the breakdown of the ethical reality of software piracy. Introduction Software piracy is defined as illegally copying software for distribution within the organization, or to friends, clubs and other groups, or for duplication and resale (PC Mag, n.d.). Software piracy is a worldwide issue. With the increase in the access to and the speed of the Internet the availability of pirated media continues to increase in availability. The most common of types of piracy follow: Softlifting: Borrowing and installing a copy of a software application from a colleague. Client-server overuse: Installing more copies of the software than you have licenses for. Hard-disk loading: Installing and selling unauthorized copies of software on refurbished or new computers. Counterfeiting: Duplicating and selling copyrighted...
Words: 1354 - Pages: 6
...INFINITE DANGERS TO INFINITE DATA UMUC Two point five quintillion bytes of data are generated daily across the cyber world(Mora et al., 2012). With the expansion and capability to generate and store data so much so that 90% of the data stored has been generated in the last two years. (Mora et al., 2012) With the sheer volume of the data that exists and speed at which new data is generated the ability of organizational IT Staffs to meet the security and privacy requirements is being pushed to the limits. With the capability of data mining algorithms to gather and correlate such large volumes of data at such speeds there exists the potential for extreme privacy and ethical concerns; as companies become experts at slicing and dicing data to reveal details as personal as mortgage defaults and heart attack risks, the threat of egregious privacy violations grows(Waxer, 2013). The requirements to maintain the privacy and security of these vast amounts of data are both ethically and legally mandated. What are the available tool sets that are accessible to an organizations IT Staff to secure databases from intrusion and exploitation? This is of extreme importance when dealing with the volume of data that exists and the personal and private nature of so much information. There are concerns over Personally Identifiable Information (PII) as well as Personal Health Information (PHI); unauthorized access to these could lead to identity theft through the access to PII or misuse...
Words: 827 - Pages: 4
...IFSM 310 Quiz 4 Click Link Below To Buy: http://hwcampus.com/shop/ifsm-310-quiz-4/ This is an individual assignment. 1. Define and provide two specific examples of embedded operating systems. 2. What are the four factors that drive operating system design? 3. List and define the three basic user interfaces enabled by the operating system. 4. How do computer systems minimize memory fetches? 5. Describe the differences between compilers and interpreters. 6. What is a transaction manager? 7. List and define the four properties of a transaction. 8. What is a Java Virtual Machine? 9. What is the purpose of an In-Circuit Emulator (ICE)? 10. What is an I/O subsystem? Provide three examples of an I/O subsystem. 11. What is the difference between parallel and serial data transmission? Which would you use for transmitting data over long distances and explain why? 12. What is the difference between rigid and solid state drives? 13. Describe the purpose of an interrupt. 14. Describe how multiple I/O devices are connected to the CPU. 15. What is the difference between multiprogramming and multiprocessing? Multiprogramming and multithreading? 16. Cloud Computing is used as a means to provide off-site computing power to an organization. Describe the three main types of Cloud Computing platforms. 17. What is the...
Words: 276 - Pages: 2