...Service Request SR-rm-022 - Part 1 Antonio Walden BSA/375 December 8, 2014 Bill Schuyler Service Request SR-rm-022 - Part 1 This paper will identify key stakeholders in Riordan Manufacturing who can provide requirements for the service request, and describe information gathering techniques and system analysis tools that can be used for the project. It will also identify key factors that assist in tracking necessary information for the project, the scope of the project, and the areas of project feasibility that will be focused on. Key Stakeholders There are many stakeholders of this project at Riordan Manufacturing. These stakeholders include the requester of service and COO Hugh McCauley, CEO Michael Riordan, Executive Assistant Jan McCall, HR department employees, and IT service managers. Stakeholders would also include any end users of the HR tools and applications involved in this project. Any supporters and opponents of the project should also be identified. Information Gathering The identification of the system requirements involves eliciting information from stakeholders (Mochal, 2008). There are multiple information gathering techniques to use to gain a complete view of the requirements from different perspectives. These are not procedural, can occur in any order and revisited multiple times to obtain a clear picture of system requirements. 1. One-on-One interviews: This is a method where the analyst will sit down with stakeholders on a one-on-one basis...
Words: 979 - Pages: 4
...Service Request SR-rm-022 - Part 1 Joshua Proctor BSA/375 November 4, 2013 Laura Smith Service Request SR-rm-022 - Part 1 This paper will describe each of the key stakeholders or stakeholder groups in Riordan Manufacturing who provide requirements for the service request, explain two separate information gathering techniques used during proposed projects, identify two factors that are necessary to ensure that the information required for the project is gathered successfully, define the scope of the project by specifying business functions that will be included in the project, describe the project’s operational, technical, and economic feasibility areas that are examined in the SDLC analysis phase summary. Key Stakeholders Riordan Manufacturing has many stakeholders and most of its stakeholders that would remain influential to the change process would gain the focus and those who can directly use the new system are also given importance. The stakeholders of the firm include CEO Michael Riordan, Executive Assistant Jan McCall, SVP-RD Kenneth Collins, COO Hugh McCauley, VP international operations Charles Williamson and the IT service managers. Further, before the input and revisions as per the information gathering steps are finalized, the individual users of the final app will be consulted for advice. Information-Gathering The completion of the system requires collection of information and it is categorized into ten parts that makes sure that system and processes...
Words: 1232 - Pages: 5
...t Service Request SR-rm-022 - Part 1 Joshua Proctor BSA/375 November 4, 2013 Laura Smith Service Request SR-rm-022 - Part 1 This paper will describe each of the key stakeholders or stakeholder groups in Riordan Manufacturing who provide requirements for the service request, explain two separate information gathering techniques used during proposed projects, identify two factors that are necessary to ensure that the information required for the project is gathered successfully, define the scope of the project by specifying business functions that will be included in the project, describe the project’s operational, technical, and economic feasibility areas that are examined in the SDLC analysis phase summary. Key Stakeholders Riordan Manufacturing has many stakeholders and most of its stakeholders that would remain influential to the change process would gain the focus and those who can directly use the new system are also given importance. The stakeholders of the firm include CEO Michael Riordan, Executive Assistant Jan McCall, SVP-RD Kenneth Collins, COO Hugh McCauley, VP international operations Charles Williamson and the IT service managers. Further, before the input and revisions as per the information gathering steps are finalized, the individual users of the final app will be consulted for advice. Information-Gathering The completion of the system requires collection of information and it is categorized into ten parts that makes sure that system and processes...
Words: 1233 - Pages: 5
...Having a secure WLAN is very important, I would even go to say more important than a normal LAN. One way to secure a WLAN is to use encryption. This uses a key that will encrypt and decrypt data on the WLAN so only people what the key would be able to connect to the network. The encryption needs to be strong or a sniffer will crack the key so using a WPA2 would be best. Another way would be to simple change the SSID or ESSID. The reason this is a good way to secure a WLAN is because in most cases if you didn’t change the SSID a hack would think that you didn’t do anything to your network, making it easier to hack. “Though knowing the SSID does not allow anyone to break into your network, it usually indicates that the person hasn't taken any steps to protect their network, thus these networks are the most common targets” ("How to secure," 2007). The ramification of your WLAN being breached could be many things. The first thing I can think of is data theft and by that personal or secret information if someone can get on your WLAN. Also they could be trying to disrupt your network to cause damage or just want to ride on your wireless to gain access to the Internet. I think that stolen information would be the biggest threat. Reference: How to secure a wlan. (2007, February 15). Retrieved from...
Words: 254 - Pages: 2
...Ducati feedback Q1. I wanted you to begin by recognising that this was a turnaround situation, with Ducati in 1996 close to bankruptcy. A new management team led by Minoli changed strategy with clear objectives of aggressive growth within a niche of the sports segment and competing as a focussed differentiator. The logic of the turnaround can be conceptualised as follows (a) Ducati reduced costs without affecting the WTP for the physical product (i.e. the quality and reliability of the product has increased despite reduced costs). Major reductions were in motorcycle material costs (from 68.2% to 59% of unit costs, exhibit 12) and can be attributed to the following factors: (1) rationalised suppliers from 200 to 130 with the effect of increasing the quality of suppliers and Ducati’s bargaining power (2)Ducati increased its outsourcing from 80% to 90% and thus tapped more the potential of the Emilian mechanical district (3) Ducati further increased its bargaining leverage by instituting dual sourcing for the major components of the motorcycle and adopted short-term contracts (4) Ducati enjoyed economies of scale by increasing output from 12000 bikes in 1996 to 39000 in 2000 (5) Ducati increased the standardisation of its products (parts) and thus increased the bikes produced per worker from 76 to 87 in 200 (14% increase) (exhibit 13). (b) Ducati increased costs to boost WTP for the product’s intangible aspects (i.e. sport character, community, design, exclusivity, Italianess...
Words: 1328 - Pages: 6
...potential and increase the effectiveness of the department and the organisation’s work. To do this it has the following elements: • An assessment of performance. This reviews past performance by looking at: o Outputs – the achievements against standards, targets and objectives. • Planning for the future. This looks at: o Agreeing personal targets and objectives with the employee. o Creating personal development plan for the employee. The assessment of performance should help us identify and repeat success, build personal strengths and minimise weaknesses. The appraisal review will only work if the manager and the jobholder are fully committed to its achievement. The main emphasis of the appraisal should be planning for the future. KEY COMPONENTS OF APPRAISALS Key Responsibilities These are central to the appraisal process as they define the whole purpose of a job and are identical for the same job irrespective of which company it is in. Key Responsibilities only change if the job fundamentally changes. They define the areas where results need to be achieved and they are not activities. There are typically 5 – 8 per job. They are easily derived form job descriptions and focus group discussions on the key elements of a job. Examples: Recruit, lead and...
Words: 1082 - Pages: 5
...estimate the level of applicability of each TQM characteristic to the organization. 5. Discuss your finding and provide conclusion on the state of TQM in the organization. Q2. Exercise No. 4 on pg. 151 Give an example of the use of the PDSA cycle in your personal life and in your work experiences. Personal Life Experience A personal life experience of the Plan, Do, Study and Act cycle is my decision to go back to school to get my Masters degree in Engineering. The planning required me to define the length of time it would take for me to finish my degree. The key sequence of events were for me to let my manager know of my intention to get my degree and that it would not affect my job performance. Then I had to lay our my educational plan and my overall purpose of getting my degree. The Do cycle required me register for a class and ensure that it didn’t interfere with my job performance. Another key part of the do process was for me to study and get a passing grade. The Study cycle required me to study for my exams and assignments on my own time and not on company time. The Act cycle requires me to continue to push myself to finish my degree in a recent amount of time. Work Experience A work experience of the Plan, Do, Study and Act cycle is my involvement on our latest diesel engine in our Superduty truck line where I was the lead for powerplant NVH. The planning required...
Words: 875 - Pages: 4
...Buildings Correct B.Logical systems C.Computer Rooms D.Computer devices Answer Key: B Feedback: Answer: B Reference: Introduction Question 2 of 20 5.0/ 5.0 Points Tracing the history of a transaction through an institution is called: Correct A.Audit trail B.Intrusion control C.Biometrics D.Authentication control Answer Key: A Feedback: Answer: A Reference: Audit Trails/Access Logs Question 3 of 20 5.0/ 5.0 Points Which of the following are categories of intrusion detection devices? A.Perimeter intrusion detectors B.Motion detectors Correct C.Both of the above D.Neither of the above Answer Key: C Feedback: Answer: C Reference: Intrusion Detection Question 4 of 20 5.0/ 5.0 Points Which of the following is NOT a resource that operations security identifies the controls for? A.Software B.Hardware C.Media Correct D.All of the above are resources Answer Key: D Feedback: Answer: D Reference: Introduction Question 5 of 20 5.0/ 5.0 Points Which of the following is NOT a key element of a system of internal and security controls? A.Employ competent people B.Have adequate separation of job duties Correct C.Execute internal and external transactions D.Maintain adequate documents and records Answer Key: C Feedback: Answer: C Reference: Operations Security Principles Question 6 of 20 5.0/...
Words: 929 - Pages: 4
...have extensively researched this project and are able to confidently demonstrate our knowledge. We offer a complex | | |analysis of the key features of our chosen topic and are able to compare the story with other events in history and reach | | |substantiated conclusions. It is evident that we have used a variety of sources in researching our story. | | |Organisation & Communication: | | |Our presentation is innovative and of high quality. It uses language and historical terms precisely in a way which clearly | | |communicates complex ideas. It is a team effort. | |Level 6 | Enquiry using sources / Knowledge: | | |We have researched the project in some depth and are able to demonstrate that knowledge. We offer a detailed analysis of | | |the key features of our story and have used a number of sources in our enquiry. We are able to compare the story with other| | |events in history. ...
Words: 453 - Pages: 2
...REPORT STRUCTURE AND ORGANIZATION Project findings are organized into an executive summary, topical chapters and an appendix. 1) Executive Summary – The executive summary contains a discussion of the background factors that led to the study, a description of the Best Practices, LLC research methodology, a summary of the key project findings and recommendations for identifying and closing performance gaps. 2) Topical Chapters – These chapters provide, by subject, a graphical depiction of survey responses, discussion of key trends identified from an analysis of the data and write-ups of best practices harvested from in-depth interviews: Program Management & Organization –Includes sections on Budget, Staffing, Structure, Activities & Events, Hiring Top Talent (including interns and co-ops) and Program Effectiveness. Hiring Top Talent – Discusses best practices for building the talent pool, screening and selecting candidates and managing intern and co-op programs Building Strong Stakeholder Relationships – Covers effective partnership with line staff, practices for sharing candidates across lines of business, developing alumni as recruiting talent, training line recruiters and maintaining long-term relationships with university hires. School Selection & Ranking - Illustrates best practices for choosing core recruiting schools. Technology: Impact & Innovation - Highlights innovative uses of technology in the recruiting process. 3) Appendix...
Words: 503 - Pages: 3
...around. Burton was expected to develop a sustainable business platform that would be capable of doubling the company’s size and generating an attractive return on investment. Jim Burton did everything in his power to help turn around Norton Lilly International. Due to the fact that he was new to this industry and dealing with veterans that had 30 years of experience he had to use an incremental approach by introducing ideas and building on them once accepted. He formed an executive committee in order to begin decentralizing the decision-making processes away from the owners. Burton also established process mapping, which focused on the key processes involved in delivering each type of service. This process helped management understand the underlying causes of service failures and began to close performance gaps. Burton then established key performance indicators that identified operating level...
Words: 996 - Pages: 4
...am writing to express my interest in your advertisement/ current opening for a [……],and submit my résumé for your review. Having served in sales and operational leadership roles for the past 8 years with continued success in meeting business/operational goals, I can make a valuable contribution to your organisation’s future projects and initiatives. I am aware of your products and familiar with your new line of [show you know something about what the organisation does] and believe that I can assist with increasing sales in the area of [again, show you know what they do]. [Sell yourself. Point out why you would be best for the role. Use examples/or use as a guide your current or most recent position. Provide detailed summary of the role’s key responsibilities and accountabilities]. [Example only]What I bring to this position is a combination of team leadership, strategic planning, and business development skills that I have leveraged to meet and exceed expectations. I have analysed core operational/business functions and implemented the most appropriate solutions to drive continual business growth. I have demonstrated proficiency in all core office administration functions, including document preparation, internal/external communications. I can manage the office environment without supervision, juggle...
Words: 525 - Pages: 3
...|Project |IEEE 802.16 Broadband Wireless Access Working Group | |Title |Nonce based TEK Update for Handover | |Date Submitted |2008-01-21 | |Source(s) |Stavros Tzavidas |Voice: +1-847-632-4313 | | | |E-mail: stavros.tzavidas@motorola.com | | |Motorola Inc. | | | | | | | |1501 W. Shure Dr. | | | |Arlington Heights IL 60004 | | | | ...
Words: 4252 - Pages: 18
...the planning or organization that go in to creating such a complex environment. Clearly, safety issues concerning air travel have been heightened during the past decade. While it is clear that major precautions are taken to secure the actual aircraft, prior to takeoff, during flight, and once the landing process has commenced, one often forgets about the safety implications involved in the actual airport. This paper evaluates AC No: 150/5070-7, titled “The Airport System Planning Process.” The aim is to give an overview of the process, including background regarding the purpose of the complex strategy, Within an integrated airport planning system, which is expected to provide guidance for future establishments in the field, there are four key aspects that must be exhibited. First, the system needs identification, where there is a specific reason that the airport was designed using the planning process selected. Second, there must be a system-wide development cost estimate. Such an expensive project, one might assume, does not require an accurate budget. However, it is crucial that one remain within the realm of the budget by meeting the estimated cost. Third, proper planning and organizing must be implemented through studies, surveys, and other collective actions to gain information and decide which aeronautical needs are to be met by the system of airports in question. This process is complex as there are a variety of requirements necessary to plan and implement the proper airport...
Words: 1639 - Pages: 7
...Hashing values over single Encryption of a value When it comes to the common username and password verification, the most widely used mechanism for encryption is public and private key. While this level of encryption is good enough for protecting a password it does have a few downsides. 1. The Private key has to be kept confidential at all times if leaked all information is now accessible from any source. 2. A common username and password are contained in the payload of a packet that is encrypted. 3. Once the packet is decrypted, the server will store the credentials or compare them to previous credentials. 4. If a digital certificate is offered, is this a valid certificate or has it been tampered with in any way? With these four downsides identified it could be time to adopt what has been learned by FIDO. The main characteristics of FIDO are that your personal information is never exposed to a server. This is where FIDO has the edge over common login credentials, everyone is kept anonymous. The next stage is to develop a hybrid approach where the user has control of the information that is going to be used for login credentials. This could be done by saving the user’s first name, second name, age, address, country and email into a secure chip that can only be accessed using...
Words: 1229 - Pages: 5