Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Background

This year, the assignment gives you quite a bit of flexibility as PM to work out how you will deploy your staff and what they will cost - given a basic set of parameters. Feel free to research the basic scenario and come up with an option for the firm.

Unlike in previous years, there is only one part to this assignment - MS Project, so focus on researching the background information as PM and be creative in your implementation.

Project Justification: Standish Roberts is one of the oldest legal firms in Sydney, 1 and in line with the provenance of such a firm, it has had some difficulty moving to the digital age. Standish Roberts does have IT in place - (they would not be in business in 2016 if they did not), but their IT is now outdated and an upgrade is required.

The firm employs roughly 60 lawyers and para-professionals, varying from article clerks through to recent graduates to senior partners.

You however are Bryant May the CIO (which in a law firm also makes you the project manager 2). Standish Roberts needs legal databases accessible sooner rather than later, and given the age of the firm, it has also been financially successful so money is not so much of an object!

You have under you 8 IT staff, so including yourself there are 9 IT staff. You have 1 law librarian in this mix who is also IT trained, but his main role is really searching the paper-based and now online legal databases for the law staff, particularly the older lawyers as the younger ones are quite familiar with IT, having used all manner of databases during their degree within the last decade. Naturally the younger lawyers in the firm are IT savvy (they are frustrated the firm is slow in upgrading the IT, but the status of the firm overcomes this downside of not so up to date IT).

In essence, there is you (CIO/PM), 1 law librarian, 2 BAs, 1 help-desk support, 2 developers and 2 network specialists.

Given the post 9/11 focus on security, the firm's senior partners have it in their heads that a ‘firewall' is needed for an ‘intranet' so that they can store their legal work securely on in-house servers and use legal databases on this same intranet - which can occasionally be updated from the cloud if and when the need arises. In short the firm is not keen on conducting its business solely in the cloud. 3

It is your role as CIO/PM to implement fully this intranet, with associated hardware/software upgrade, legal databases (6 of them) and the appropriate network backbone to support the intranet. This is not a COMP247/347 assignment, so we are talking about the basics of an intranet here - not a highly technical implementation. We are focused more on staffing - who, how much, for how long?

Now the difficult part is that you as CIO/PM have to:

a. work out the basics of what an intranet is going to look like

b. how many hours you are going to have your different staff working on this task, given you have 8 weeks to deliver the intranet, and a total budget of 90k 4 5

c. make notes to the senior partners justifying your assumptions.

1. Implement the above project scope into MS Project 2013 (or appropriate software). The following table forms an idea of the tasks/subtasks to be implemented. Remember the staffing, cost and timeframe constraints you have been provided with. You are free to modify these WBSs as you see appropriate

Again feel free to modify this WBS as you feel appropriate to your task as PM - I provide the WBS below as a starting point.

Initiating

Form project team

Develop project charter

Planning

Develop project plan

Develop and refine other plans

Define risks and risk management approach

Create WBS

Requirements Analysis

Define requirements

Evaluate current intranets

Define user requirements

Define content requirements

Define system requirements

Define specific functionality

System Design

Modelling in UML

Check constraints on models

Make final decision on platform to be adopted

Implementing

Setting up network

Testing

Roll Out

Undertake technical writing of completed system

Communicate roll out plan to users

Conduct user training

Release internal PR

Support

Determine what support resources are needed

Make appropriate staffing changes

Determine support process

Conduct Post Implementation Review (PIR)

Closing

Prepare and deliver final report and presentation

2. How long will the project take in days and weeks? Why is this the case? How have you calculated this?

3. Provide the critical path for your implementation. Illustrate your critical path using a sequence of nodes and edges along the following lines.

You may just use the network diagram in MS Project and modify/comment to illustrate your point, rather than redrawing from scratch.

776_Network Diagram.jpg

4. Provide a discussion/explanation of your approach - how did you arrive at your costings, timeframes, how staff were allocated etc.

Algorithm

1. Implement the project scope into MS Project 2013 (or appropriate software) with the basic parameters you have been provided, indenting subtasks appropriately.

a. Use the outline numbering feature to display the outline numbers. For example your WBS should start with
i. 1.0 Initiating
b. Enter any durations or dependencies
c. Show costing (hourly rate) for your staff members 6

2. Create a pdf document from your MS Word (or whatever) document in which you have:

a. MS Project WBS charts, including:
i. Gantt chart
ii. Network diagram
iii. Resource graphs (before and after showing correction for over-allocations).
iv. Critical path etc.
v. Explanation (q. 4) of what you have done etc.

1. One MS Project (2013 or appropriate) file.

2. One pdf file containing your MS project solutions (q 1), which will include:

a. MS Project WBS charts, including

i. Gantt chart
ii. Network diagram
iii. Resource graphs etc.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91726565
  • Price:- $70

Guranteed 36 Hours Delivery, In Price:- $70

Have any Question?


Related Questions in Computer Network & Security

Objectivesthis assessment item relates to the unit learning

Objective(s) This assessment item relates to the unit learning outcomes as in the unit descriptors. This checks your understanding about configuring and troubleshooting medium-size networks. PART-1 IP Addressing: 1. Subn ...

Buffer overflowthe common vulnerabilities and exposures cve

Buffer overflow The "Common Vulnerabilities and Exposures" (CVE) is a list of cybersecurity vulnerabilities that have been discovered, and they are collected in a database for everyone to see and improve or patch their s ...

Task1 in each of the following scenarios there is a

Task 1. In each of the following scenarios there is a relationship to work life in the IT industry. With each of the following question, ensure that your answer includes the explanation of how it would be applied to work ...

Part auniversity of neverland offers more than 300

Part A University of Neverland offers more than 300 undergraduate programs. The Bachelor of Dreams is one of the highly regarded program offered by the University. The University tries to improve all its programs by intr ...

Question suppose you wish encrypt the message beyonce using

Question : Suppose you wish encrypt the message BEYONCE using the one-time pad with the key RIHANNA (a) Encode to this message and the key as bits. (b) Encrypt with the one-time pad using XOR. What is the resulting ciphe ...

Wireless sensor networks wsn let users to access servers

Wireless Sensor Networks (WSN) let users to access servers, printers, and other network resources regardless of their location, within the wireless reach. This flexibility means that, for example, a user's laptop stays c ...

From the product designed expanded as follows1 from your

From the product designed expanded as follows. 1. From your list of possible responses to the threat, choose one that you will focus on in this product. Create the requirements for your product by completely identifying ...

Backgroundyou have obtained a contract position at a small

Background: You have obtained a contract position at a small marketing and advertising firm called the Colour Ability Corporation (CAC). Your contract responsibilities are to help them plan their emerging networking and ...

Question do some research and find a case of cyber

Question : Do some research and find a case of cyber harassment or cyberbullying. Explain the case, and discuss the relevant theories of criminal justice associated with the perpetrator(s). Your response should be a mini ...

Data model development and implementationpurpose of the

Data model development and implementation Purpose of the assessment The purpose of this assignment is to develop data models and map Database System into a standard development environment to gain understanding of data m ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As