Mercurial Essays

Free Essays & Assignment Examples

Team Project Entire Paper

In order to acquire new reward, an organization will need to delegate some funding based on the amount of hardware and what particular hardware is needed. A project manager will need to request funding or search through the annual budget limits for the organization and the department requiring the new hardware installed to determine what they are able to apply. Each team that will be involved in the hardware installation will determine on what hardware is being installed. For instance the HER department requires new desktop computers and phones.

First of all the local desktop support team will be the major supporting asset to the installation of the hardware. This team will be establishing all of the desktops software programs and making the new desktops accessible for the users. Next there will need to be some assistance with the network operations and/or communications team. This team’s goal will be to adjust any firewall settings and security protocols on the network to remove the old IP/MAC addresses and configure the network with the new ones.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

This way the old systems cannot be used as a way to bypass security settings. Once all installation of the hardware is successful and all appropriate connections are established, testing and monitoring can be done to ensure he newly installed hardware is functioning correctly. Budgetary limitations are always top priority and the biggest aspect that needs to be considered when procuring hardware and installing new equipment within an organization.

Establishing an appropriate budget depends on the type of hardware, the department needing the new hardware, what capabilities the hardware must perform, and what resources will be needed whether adding new ones or upgrading previous resources to ensure accessibility and functionality of the newly installed hardware. A project manager will need to identify what funds are currently available within he organization’s annual budget and what the particular department needs as far as new hardware goes.

When budget limitations are in review, each department involved with the new hardware installation will need to collaborate on the expenses that it will take to acquire the hardware, make the necessary network changes, adding new resources, purchasing the hardware, and installing the hardware. There are a lot of aspects that are to be reviewed and agreed upon in order to successfully define the budget that will be used for the hardware installation. Every company has key stakeholders. A key stakeholder from business dictionary is “a person, group or organization that has interest or concern in an organization” (business dictionary, n. . ). To start the project, its stakeholders have to be recognized. A representative from the company (stakeholders) is suggested to be on hand, able to contact in a timely manner or to follow up each day with the project manager for updates and matters they may arise outside the scope of the project scope. For the communication plan hierarchy, team leaders will meet with the project manager on a daily basis to provide detail on current progress and projected times. On a weekly basis, the project manager will meet the stakeholders in order to provide details about current progress and address stakeholder questions and concerns.

Prior to starting the project the, it will be the company’s responsibility to determine its expectation for their user, system and function. To better explain the intent of the project scope, the company has answered the following questions in regards to additional details: Who is the intended user? The company infrastructure to include all employees locally and throughout the region. How many users are there? The company is expected o grow in each department to include the field offices. The departments consist of Human Resource, Security, Operations, Logistics, Communications and Finance.

Are they the same type of user or different? The company hierarchy will separate department and supervisors. What level of computer experience will the users have (or is needed)? Depending on the type hardware purchased, not all employees will be trained on the same platforms. What is the required security? Physical security will be the first level and enforce at each level. Access will granted on a need to know basis once approved by supervisor and security. Are there hardware constraints networked or stand-alone?

There are always hardware restraints in regards to power outlets, switch ports and authorized software. What technical support is necessary and available in-house? For technical support it will require Cyber-Awareness, Information Awareness, Network Operations Support, Configuration Management, and Hardware Support. What other systems need to integrate/communicate? All desktops and laptops will receive the same company image utilizing the current Windows 7 with current updates. The network should be monitored to recognize system using older Windows Operating Systems.

The Work Breakdown Structure (WEBS) is simpler to follow. The Project Manager is the mediator between the sub-contractor and sponsor rep. As the project moves forward, the stakeholder a kept up to date on a weekly basis with the Sponsor Rep and Project Manager updated daily. A common technique for cost estimating is to list the resources you need for the project and to total their costs. Typical resources include equipment, material, services and labor. You can get costs for equipment, material and services by consulting price lists or by going out for bids for the larger pieces.

Labor costs are hourly, and you can base it on the total costs on estimates from similar projects or ask for bids to carry out the work. Small businesses use resource costing for larger or more complicated projects. Small and simple projects can be evaluated using a cost-per-unit that is characteristic of the project. This characteristic unit is a measure of the size of the project that is indicative for the particular project. It might be a cubic foot, a square foot or a work station. Typical applications are for building costs, paving, renovating or for standard systems such as data processing.

Costs are a liar amount per unit. To get the total cost, you decide how large the building or surface is or how many people will be working on the data. Multiply that by the unit cost to get the total. You can get typical unit costs from prospective suppliers or from industry associations. Historical Costing One of the most transparent ways of estimating the cost of a project is to base it on previous work and if your company has completed a similar project recently, all the required costing information is available from the project files.

If you don’t have such a project then other work your company has done n the past can help determine the cost of similar work on the new project. If a local business that is not a competitor has completed a similar project, they might be willing to help. If available, historical data often gives the most accurate prediction of future costs. The delivery of a project is more so the most crucial part when it comes to expectancy and ensuring the clients are receiving the project to its fullest capabilities with minimal impact on the client’s availability.

This is where developers, stakeholders, and even the clients must collaborate with each other through the early stages of a project o allocate all resources and materials that will be needed to complete the project sufficiently and on time. When it comes to allocation resources for the project task, both labor and materials that will be needed through the duration of the project must be identified and purchased accordingly to best meet the needs of the client and expectations of the projects final production best.

Throughout the development and testing stages of any project, objects and tasks are likely to change and must be altered for everything to work accordingly. Having constant meetings and consultations throughout the reject time line will allow developers and clients to discuss opportunity changes that they will discuss, if needed, new materials and labor involved. First, there is the need to identify the appropriate materials that will be needed to complete the project as defined in initial stages of the project development.

Materials must be identified prior to allocating any other resources so the development teams and clients can discuss what must be accomplished and provided to complete the project as it is foreseen before it moves into its production stages. Procuring the hardware that is needed for he project is part of the allocation of resources stages that should be identified and completed first Since the HER Department is receiving all new Desktop systems and phones to increase productivity and speed, the discussion of which operating systems, software programs, and other applications that will be needed for the users will need to be defined.

As for the phone systems, reviewing phones through a major source such as Cisco, should be reviewed as the project will need to have phones that are more operationally functional and reliable than what has been previously used. It is al about better supporting the company as a whole to provide more efficient services in a faster manner. Then, the discussion of labor comes in to play. The installation of hardware is not an easy task as it may seem for desktops and phone systems. Most, if not all areas in the information technology field must be involved.

Labor for this particular type of project would need to include labor from Network and communication operations to ensure proper cabling has been dropped, firewalls and networking protocols are placed within the company’s network to allow the appropriate access to specific systems and sites, Window administrators will need to allocate servers and disk-space throughout the network to ensure access is maintained and reliable, and the Desktop support team will be involved in the imaging of the operating systems, installation of all needed software programs and applications, and the overall installation Of the hardware itself into the prospective locations. The allocation of resources including labor and materials can be a difficult stage. It all falls into what the client is searching for when it comes to the company providing its services. Ensuring all necessary materials that are added for hardware and installation is a must. Once the materials and services are identified, allows the project management team to define the labor needs which each team involved in the project development will need to collaborate with one another to complete the project in a timely manner.

Based on the session to define the best solution for this initiative, the project scope has been defined as providing storage devices that will house file data that can transfer expeditiously over the network and to also provide storage devices that will house transitionally accessed data that will transport with sigh-speed and allow for block-level access to (multiple hard drives) email, database and possible high usage files servers, as the company expands. The first device to be solution will be the in device that will be designed as an open sourced, self-contained solution providing file sharing options over the network and allow remote computers to requests a portion of an abstract file rather than a disk block unlike where transitioned accessed data will be factored. This option will allow the business to increase the availability of data by using a clustering design and this solution will provide the business both outrage and a file system.

This solution will perform at its highest potential due the prcited tuning for the file serving capability that would not otherwise be executed on any other server that executes other processes and having optimal performing cache memory provisioned on each storage device. Since the infrastructure is a generalized hardware component, not much customization is needed to install this equipment, which will cut cost and allow our project team to expedite the timeline for installation of this infrastructure. The second solution defined in the devices that will be provisioned for the businesses to access block-level data from various hard drive resources such as email servers, databases and high usage files servers. This solution will allow storage capacity utilization to increase and consolidate proprietary information to be stored onto disk arrays.

Based on the solution provided these storage devices will be provisioned according to the line of business defined (Accounting HER. Network Operations, PM and Retail banking) as needing this infrastructure and will be rolled-out in a phased approach and be provided feasibility study to ensure 99% accuracy in performance and latency executions. According to historical data collected from past infrastructure projects, the best and most effective project management methodology to use is the agile approach that will allow the project lifestyle phases to be executed simultaneously. This methodology will be most useful when rolling-out the multiple phases and allowing lessons learned to be implemented through-out the project life cycle, as each phase has been completed.

This infrastructure is net-new equipment that will be provisioned and installed to the companies platform of the network architect and will require a matrix reporting structure to ensure high-visibility of project regress to the Leadership team and Sir. Management levels. This methodology will ensure that the project is being tracked for progression and that the project team will meet the projects timeliness, date of delivery and within budget. Risk mitigation is always a strategy that needs to be reviewed after testing and the initial stages of production have taken affect. What needs to be identified are ways that the project team and organization will establish a plan of procedure to resolve any issues that may arise or as soon as possible as to not cause a loss in availability and reliability.

During any enplaned outages, you risk the obligations you have established with your clients and also stated in an SAL (Service Level Agreement) that defines the percentage of the amount of time that the systems and services must be available. One way for our organizations risk mitigation strategy, we will implement a hot site. A hot site is defined as a central location that has all systems with matching back up configurations to the current operational system so there will be no down time for the clients and the services. If the main system was to fail, the hot site will kick in to operation and take over all revise until the main system is properly resolved. To help and prevent any possible down time for the main system, the organization could apply weekly patches that are configured to identify and react to any known and potential attacks that will cause the system to fail.

These patches can be schedule and coordinated with the clients so we may decide on the least active time that the services are being used that we offer to the client so we can have planned and scheduled down time to apply the patches and maintenance and reboot the system servers. These two controls will provide the most effective way to taiga any risks that could potentially arise. External circumstances or events may occur hindering the successful completion of a project Identifying project risk allows risk management to be proactive in successfully handling these risks. Most companies are moving towards using en;ark attached Storage devices. The implementation of network attached Storage requires specialized experience.

Because of the infrequency of maintaining these devices, most information technology organizations lack the skills needed for maintaining these devices. This issue runs the risk of an elongated period of he device implementation process. There are also a few disadvantages of using Network Attached storage. The heavy use of these will congest LANA which will affect the users. Network attached storage is somewhat inefficient since data transfer rides on top of standard TCP/IP protocol. In contrast, SAN uses protocols designed especially for data transfer. This is a shared storage which may allow some users opportunity to monopolize storage at the expense of other users. This problem can be solved by having the system administrator enforce quotas. reject budget was based on detailed infrastructure document. Project budget was also aligned with business goals considered. Budget goals considered included hardware and software design and development. Information technology support cost including the implementation of current system was also considered in baseline budget. Above mentioned financial considerations along with vendor considerations was calculated at a baseline budget. The baseline project budget will be considered on a month to month basis in order to track variances. The establishment of the project scope, schedule, and cost baseline were all steps taken to manage variances.

If variances are found within the duration of the reject, the team will submit a project change request for approval. Variances such as being ahead of schedule or being under budgeted are positive variances. Being over budget or behind in schedule is a negative variance that requires action which may result in an increase Of the budget or reduced profit margins. To avoid variances, month to month tracking of the baseline cost and expense will take place. Testing is the process of executing the system with the purpose of finding errors. The best test cases will have a good chance of finding undiscovered errors in the system. Testing of the system will be conducted by the software engineer.

During this process, the software engineer will produce a series of test that are used to uncover errors in the software. The software engineer will attach are these devices to the companies LANA. The devices will maintain their own IP address comparable to the TCP/IP devices on the network. Using the software provided in conjunction with the devices, the software engineer will set up automatic and manual backups and file copies between these and other network devices. The software engineer will test the system for data and application access. Performance testing will identify slow performance times and compare with gasoline performance expectations. Testing will also consist of consideration of hardware failure or exhibited signs.

Documentation of error logs will also help to tweak performance. The testing process will check for errors within user applications, servers, files and data storage resources. The devices will be measured based on the scope and business requirements. System test will measure performance in view of allowing the business to increase the availability of data by using a clustering design. These devices will be tested to see if the devices provide a solution for both storage and a file system. This reject solution will be tested to perform at its highest potential due the precise tuning for the file serving capability. The evaluation process is one of the most important parts of the life cycle of a project.

During the evaluation process an assessment is made on cost, efficiency, programs outcome, programs impact, program implementation, design, and program logic. A reflection of the project scope takes place during the evaluation process where a comparison between what was needed and what was provided is examined. An impact evaluation measures whether the project has achieved its intended outcomes. Cost effectiveness analysis assesses the efficiency Of a project. During the evaluation, an outline of the benefits and cost of the program will be reviewed for comparison. Throughout the life cycle of the project, the project team will collect lessons learned.

While the project is in cycle, the team members will record both good and bad lessons learned. In essence, the team will record new events that occurred within the life cycle of the project. This type of evaluation will both strengthen individual team members and the project team. The evaluation process will include both internal and external evaluations. The internal evaluation will be done by the project manager. The project manager will have a better overall knowledge of the program and also possess informal knowledge of the program. The project manager is already familiar with the project staff allowing the evaluation process to be less threatening.

Finally having the project manager perform the team evaluation is cost effective. The external evaluation will be done by a project sponsor. The project sponsor may be more objective of the project process. The project sponsor may offer a new perspective on the project as well as offer different angles to critique the project process. The project sponsor may also be able to dedicate more time and attention to the project evaluation as well as offer greater expertise and evaluation skills. Project closure is the final phase in the project life cycle. The commencement of the project closure is determined when all project objectives have been completed and accepted by the customer.

In closing this project, the release of both project staff and non-staff will transpire. At this point in the project closure phase, staff is redistributed and reallocated to other projects, if needed. The closure of any financial issues or dealings is finalized. Project records are completed and/or collected as well as the archiving of all project records. Lessons learned identified in the evaluation stage is recorded and review sessions with project teams are coming to a close. Closing includes the formal acceptance of the project and the ending thereof. Administrative activities include the archiving of the files and documenting lessons learned.


I'm Belinda!

Would you like to get a custom essay? How about receiving a customized one?

Check it out