Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Assignment: Legacy to Cloud Computing Migration Project

 

This assignment consists of three (3) sections: a written paper, a Work Breakdown Structure (WBS), and a Gantt Chart. You must submit each section as a separate file for the completion of this assignment. Label each file name according to the section of the assignment it is written for.

 

Imagine that you have been hired as a project manager to oversee the migration of a legacy system to a cloud computing based platform within a government agency. The resources within the organization are limited in number, knowledge, and availability. This project will require outsourcing of skilled resources and expertise to move forward with the initiative. The organization is characterized by working in silos and having redundant functional resources available within many of its divisions. 

 

To complete this assignment, you will be required to research similar cloud migration projects and understand the resources and challenges that an information systems project of this magnitude requires. Using the concepts presented throughout the course, you will develop a project plan that will meet the project goals and requirements.

 

Section 1: Written Paper

 

Write a ten to twelve (10-12) page paper in which you:

 

    • Use the Internet to research similar cloud migration projects that have been successful. Of the researched projects, recommend measurable organization values for a project of this type and include expected benefits in terms of money, percentage, or potential optimizations.
    • Write a two to three (2-3) paragraph executive summary which defines the phases and their activities that the project will require. Develop the executive summary for a senior management audience.
    • Perform a stakeholder analysis for the researched project in which you:
      • Include all major stakeholders that the project will require.
      • Describe each stakeholder's title, role within the project, and objectives each should meet for the project.
      • Provide details if this organization is more of a functional organization or project based. 
      • Suggest at least three (3) risks that should be monitored based on the selected organization type.
    • Produce a procurement management plan for the activities that will be required within the project in which you: 
  • List the activities that will be outsourced, the skills / labor / material required, and the contract type.
  • Analyze the monitoring requirements and potential pitfalls for each selected contract type.
    • Provide a scope change control method that could be used within the project management process in which you:
  • Describe the review and approval process that will ensure scope control.
  • Suggest at least three (3) scenarios that could resemble scope creep.
    • Perform a risk impact analysis in which you:
    • List at least ten (10) risks that could take place within this project.
    • Provide the probability for each risk (%), level of impact, and a probability impact score.
    • Prioritize your list based on the probability impact score and develop a risk response plan for the top five (5) risks.
    • Include the risk, the trigger, response, and resources required for response.
  • Based on the Gantt Chart created in Section 3:
    • Explain the basis for your assumptions and constraints
    • Explain the basis for your estimates on tasks, skills, material, and equipment costs for each activity.
    • Identify the resources you used to arrive at your assumptions, constraints, and estimates.

    Section 2: Work Breakdown Structure (WBS)

    Required Format (MS Project File)

  • Use MS Project or an Open Source alternative, such as Open Project to:
    • Develop a hierarchical Work Breakdown Structure (WBS) with defined activities and estimated budgets per activity in which you:
      • Group each activity under each major phase.
      • Identify a control account index number for each activity. 
      • Include at least twenty to twenty-five (20-25) work packages in the WBS that show the various efforts required to complete the project.

 

Section 3: Gantt Chart

 

  • Use MS Project to develop a Gantt chart in which you:
    • Group all activities (tasks) by phase, duration estimates of each activity, start and end dates, major milestones (with black diamond), resources required per activity (in terms of personnel, labor and material), activity precedence relationships, and costs per activity. 
    • Use at least (ten to fifteen) 10-15 resources in your Gantt chart.
    • For each activity:
      • Ensure that control account index numbers match the WBS in Section 2.
      • Provide resources required in terms of labor and material, estimates of duration, and risks that each activity may have. Note: To document risks, you will need to create a new column and label column titled "Risk".
      • Base cost estimates on research you perform on the Internet for similar tasks, skills, material, equipment, etc. Note: Be sure to explain the basis and research sources for costs in your written paper.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91374137
  • Price:- $80

Guranteed 48 Hours Delivery, In Price:- $80

Have any Question?


Related Questions in Computer Engineering

Looping structures can be very helpful when coding an

Looping structures can be very helpful when coding an application. These are designed for iterative statements that need to happen multiple times. There are several looping structures you can utilize in C++, For, While a ...

What is the sum after execution assume that min and max are

What is the SUM after execution? Assume that MIN and MAX are integers provided provided by the user, and that MAX is greater than MIN. (Solve without choosing actual values) INPUT MIN, MAX SUM= 0 DOFOR M= MIN, MAX SUM= S ...

Question suppose that in the definition of an euler cycle

Question : Suppose that in the definition of an Euler cycle, we drop the seemingly superfluous requirement that the Euler cycle visit every vertex and require only that the cycle include every edge. Show that now the the ...

Assignmentsuppose you are an isp that owns a 19 address

Assignment Suppose you are an ISP that owns a /19 address CIDR block starting at 118.235.160.0/19. Answer the following questions to allocate address blocks to 10 customers who want to pay for the smallest CIDR blocks to ...

Taskstudents are required to do the following tasks for

Task Students are required to do the following tasks for write report by answering all the questions at the end of case study: Task a: Answering all the questions at the end of case study. Task b: Student is required to ...

Explain how financial leverage at investment banks differed

Explain how financial leverage at investment banks differed from financial leverage at more traditional commercial banks. What is the benefits of this leverage? What are the primary risks associated with financial levera ...

Writing a research paperprepare a research paper on

Writing a Research Paper Prepare a research paper on Antisocial Personality Disorder. In this project, you will modify a research paper. You will add and format text and format the document using themes and paragraph for ...

Suppose that on your birthday you checked the balance on

Suppose that on your birthday you checked the balance on your retirement account and you decided to make a $1,000 payment at the end of every month until you retire at the specified age. If you disreagard the inflation ( ...

Answer the question given belowwhat is the relationship

Answer the question given below What is the relationship between a context diagram and diagram 0, and which symbol is not used in a context diagram? The response must be typed, single spaced, must be in times new roman f ...

Truefalse questions no explanation is neededa on a

True/False Questions (NO explanation is needed): (a) On a Windows-based laptop computer the SECURITY registry file maintains a list of the host computer's wireless connections. (b) IEEE 802.11 Security Standard WEP (Wire ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As