Discuss how your company will use Enterprise Resource Planning (ERP) to integrate the various functions of an entity.

 
Strategic Tech and Enterprise Systems 
Technology and Enterprise Resource Planning

As an IT manager, discuss how your company will use Enterprise Resource Planning (ERP) to integrate the various functions of an entity. What are the advantages of using ERP? In your discussion, please be sure to provide substantive explanation of what ERP is and give example(s) of ERP. Use APA throughout.

Describe the conditions for which parametric, analogous and bottom up estimation techniques work best.

  
This assignment consists of 2 parts: questions about budget estimation and developing a budget. 

Part 1 Questions (10 points)
Provide responses to the following questions
1.    You are providing a review of contractor bids for a component of your upcoming project.  What can be done to determine whether or not a vendor’s bid is reasonable?
2.    Describe the conditions for which parametric, analogous and bottom up estimation techniques work best, and provide 2 examples in support of each method.
3.    Why is a cost management plan important?  How does the plan benefit the project manager?
Part 2 Budget Estimating (30 points)
Using the same scenario from the previous unit on scheduling, create a time-phased budget for the following project.  Prepare a figure like Exhibit 10.9, CPT 4e, that illustrates the daily and cumulative costs for the resource-leveled project. 
Assume the following hourly rates:
Alcides $45 / hr.
Joan $50 / hr.
Part 3 Budget Estimating (50 points)

You are the project manager for a process improvement project for Company XYZ.    Prepare a figure like Exhibit 10.9 that illustrates the weekly and cumulative costs for the resource-leveled project. 
Hint: To accomplish this exercise, you’ll need to create a project schedule in MS Excel (or by hand), create resource assignments, assign costs to each resource, and assign the resources to each task.  Some resource leveling will be required. 
In this project, you have 3 employees: Ann, Becky and Clive.  Each person is limited to the amount of time allocated to your project.  Ann and Becky are available 30 hours/week; Clive is available 20 hours/week.  There hourly rates are: Ann: $60/hour; Becky: $35/hour; and Clive: $50/hour.
Mechanics (10 points)
Part 1 responses should be presented in a question-response format.  Use Arial font with 11 point. There is no word limit.
Your Instructor will use Turn-it-in to ensure your paper is authentic work.  To avoid plagiarism, see the course home page for more information and use the Purdue Online Writing Lab to learn how to paraphrase, summarize and cite the references you use in all academic writing assignments.
Parts 2 and 3 Use MS Excel (MS Project is not acceptable) to create the budget estimate and present it similar to Exhibit 10.9.  Show intermediate steps (schedule, resource schedule assignments, resource-leveled schedule and any other elements needed to create the time-phased budget estimate.
It is expected that each part of this assignment have excellent mechanics (presentation, grammar and spelling) and exhibit the quality of work capable of a group of graduate students and working professionals. All sections of the document submitted must be readable at 100% magnification.
Your Instructor will use Turn-it-in to ensure your paper is authentic work.  To avoid plagiarism, see the course home page for more information and use the Purdue Online Writing Lab to learn how to paraphrase, summarize and cite the references you use in all academic writing assignments.

Describe how probability sampling techniques could provide samples more representative of a target population than simple random sampling.

Discussion Points:

1. Create a survey of 5 questions with the following 5 level scale: Strongly Agree, Agree, Uncertain, Disagree, and Strongly Disagree. Your questions must revolve around your topic. Make sure the questions are generic and not personal. Post your survey for your peers. 
  2. Survey Research: Generally speaking, what are some advantages and disadvantages to doing survey research? Provide an example where the use of surveys (in-person, self report, etc) might be a good idea? 3. Sampling. Describe how probability sampling techniques could provide samples more representative of a target population than simple random sampling. Illustrate your answer with a information technology example. 4.What are the activities involved in conducting a qualitative research design (note read your textbook and complement with further research to address this question)?

5. What are the activities involved in conducting a quantitative research design (note read your textbook and complement with further research to address this question)? 6. There are three very important elements to every research design that must be considered: Validity, Reliability, and Generalizability. What do these three terms mean and why are they so important? You SHOULD consider these when developing your own design. 7. Summarize the IRB Student Research Policy: http://www.apus.edu/academic-community/research/institutional-review-board/index
Graduate Student Research Requiring an IRB:

Because most graduate level projects are very time sensitive, graduate students are encouraged to begin their discussions with their professor about the nature of their intended research and its potential IRB review as soon as possible. Students should expect the IRB process to take at least one month. All IB applications MUST have instructor approval. All IRB applicants are required to complete CITI IRB training prior to submitting their applications. Research will not be approved until the training requirements are met. Documentation of training must be provided to the IRB Office with all new applications or renewals. (Log on to:https://www.citiprogram.org/ to complete the training. You will be able to create your own user name and password ). (http://www.apus.edu/community-scholars/institutional-review-board/research.htm, 2011, para 4-6).
 

PLEASE MAKE A MENTAL NOTE OF THE INFORMATION BELOW:

Will your capstone research involve collecting data from human subjects, such as surveys, interviews, or focus groups? If so, you will need to submit an application to the Institutional Review Board (IRB) prior to conducting this research.

Learn how to complete the IRB application successfully by accessing the ClearPath learning app, “IRB Application Package Tutorial.” To access this tutorial, activate your ClearPath account from the ClearPath tab on your Ecampus page. Once you are in ClearPath, click on “Add a Goal” and choose the tutorial from the list of learning modules.

Graduate Forum Rubric: 

Vulnerabilities in Cellular Data Networks.

A) Conduct a web search for the key words “Vulnerabilities in Cellular Data Networks” and look for a paper written by the three authors of our textbook: Traynor, McDaniel, and La Porta with the title of “On Attack Causality in Internet-Connected Cellular Networks”. Then do the following:

Get the reference of the site that hosts this article
 
Save the pdf document
 
Within the article the authors state there are “two new denial of service (DoS) vulnerabilities in cellular data services.”
What are these two new vulnerabilities? Read from the article and name them.
 
Give a short description in your own words to explain what they are.
 
Give an example of each one of the vulnerabilities becoming exploits under attack
 

The Information Technology Infrastructure Library (ITIL) is a set of concepts.

The Information Technology Infrastructure Library (ITIL) is a set of concepts and techniques for managing IT infrastructure, development, and operations. ITIL offers eight sets of management procedures: service delivery, service support, service management, ICT infrastructure management, software asset management, business perspective, security management, and application management. Disney began adopting ITIL best practices in the mid-2000s. Read “Disney’s ITIL® Journey”, located at https://www.axelos.com/case-studies-and-white-papers/disneys-itil-journey-case-study.
Write a two to four (3-4) page paper in which you:

Describe the reasons for Disney’s adoption of ITIL.  
Examine the results that were attained by Disney.
Discuss the type of challenges a large organization such as Disney likely encountered during the ITIL implementation.  How can these challenges be overcome?  
Discuss at least three reasons you believe Disney was successful in its ITIL adoption.
ITIL is not the only IT Service Management (ITSM) methodology, compare and contrast ITIL, International Standard Organization ISO/IEC 20000, and Val IT with regard to whether Disney would have attained the same results with the ISO/IEC 20000 or Val IT framework.
Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Explain the role of audit and compliance in enterprise architecture.
Demonstrate an understanding of the integration of enterprise systems with inter-organizational partners.
Use technology and information resources to research issues in enterprise architecture.
Write clearly and concisely about enterprise architecture topics using proper writing mechanics and technical style conventions.

What voluntary professional certifications your industry recognizes and rewards professionally.

 Instructions: Focus on the voluntary professional certifications (McKillip, 2000) for cyber security analyst career field offers it’s professionals.  Visit Monster.com (www.monster.com) and search for jobs that relate to cyber security analyst career. Read thru several of the job postings and determine what voluntary professional certifications your industry recognizes and rewards professionally.

Submit an approx 250 word response in .doc or .rtf file format on a voluntary professional certification in or related to your career field. Grading will be based on:

– Topic coverage
– Personal reflection
– Correct APA format – citations, references, paragraph and double-spacing, etc.
– Writing standards

Reference

McKillip, J. (July 2000). Voluntary Professional Certifications: Requirements and Validation Activities. Society for Industrial and Organizational Psychology. Retrieved online 31 Jan 2011 from: http://www.siop.org/tip/backissues/TipJuly00/09McKillip.aspx

Number of Pages: 1 Page

Page Line Spacing: Double spaced (Default)

Academic Level: College

Paper Format: APA