Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Risks with use of technology

The design manager and the engineering manager were discussing with me the software tool they normally use for their design and engineering work. It is critical to their process, but there are some defects in the software that result in errors in the designs. The team knows how to find them and correct them, but it takes additional time during the desing and engineering timeline. The managers just received an e-mail from the software vendor stating that a new version of the tool will be available right as the design tasks are expected to begin. Historically, the vendor is known to deliver the software about four weeks later than announced. The upgrade corrects the defects that the team knows about, as well as provides some new functionality that will make some of the engineering tasks faster. The vendor is strongly encouraging training for the design and engineering teams to use this new version.

As the project manager, I must decide whether or not the team will use this new version of the software. The vendor is offering a 50% discount on the training if people are signed up within the next ten days.

In making a decision I need to answer the following questions:

What risks does this use of technology introduce to the project?

What is the impact of each risks? The probability?

Based on my understanding of the risks, will I be able to tell the managers whether or not they should sign their people up for training?

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M9202833

Have any Question?


Related Questions in Management Information System

Yre a member of the human resources department of a

You are a member of the Human Resources Department of a medium-sized organization that is implementing a new inter-organizational system that will impact employees, customers, and suppliers. Your manager has requested th ...

Recently a terminated employee used his mobile device to

Recently, a terminated employee used his mobile device to log in to the company network and steal sensitive data. As the manager of the information technology (IT) security department, you were asked by your boss to pres ...

Communication and team decision makingpart 1 sharpening the

Communication and Team Decision Making Part 1: Sharpening the Team Mind: Communication and Collective Intelligence A. What are some of the possible biases and points of error that may arise in team communication systems? ...

Business process management is the technique used by

Business process management is the technique used by organizations to comprehend and describe the activities that help them function. Good process management can help make organizations more efficient and productive. For ...

Addressing and numbering please respond to the following

"Addressing and Numbering." Please respond to the following: • Discuss how you would develop an addressing and naming model in an environment that has 10 departments in a 1000 employee organization, are equally separated ...

1 a major hurricane has struck the area where your company

1. A major hurricane has struck the area where your company has its central data center. There offsite backups and hardware at three other centers around the country. 2. Assume that the area is suffering greatly from the ...

Using an organization of your choicedevelop a complete

Using an organization of your choice: Develop a Complete Disaster Recovery Plan to be submitted to the executive board of your company. Please note that this is a formal writing, all references (peer-reviewed) must be ci ...

Descriptionrefer to this resource when completing the its

Description: Refer to this resource when completing the It's All About the HAT assignment. In this assignment, students will learn to use and identify tools that may be helpful in their navigation of security related eve ...

Evaluate performance requirements along with protocols that

Evaluate performance requirements, along with protocols that will allow CloudCrushers to work efficiently for their customers. In addition, using Microsoft® Visio®, begin to design the infrastructure required within the ...

Case study 1read the article in the attachmentan overview

Case Study 1 Read the Article in the attachment An overview of cyber-attack and computer network operations simulation Write a four to five (4-5) page paper in which you: Identify at least three (3) benefits or key knowl ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As