Practice problem- no grade
Revise Excel Spreadsheet (attached) to a time-phased budget for implementing software. Identify the primary cost drivers.
Do not need to worry about depreciation of the software. Need to focus on understanding what the costs are, and when those costs will be incurred during the implementation process. Need the total cost for "startup."
When calculating the people (indirect) cost.... need to not only account for the time the 12 individuals will be trained, but also need to realize that the 2 people being trained by the vendor will be training the other 10 people....so there is additional people time needed to account for.
The Managed Care Department of the hospital has decided to implement a Case Management System called Ultima. The cost of the software is $450,000. This includes the cost of the software, software configuration, conversion of existing data into the software database, training for 2 people, and on-site resources for 2 days during the initial installation and go-live. A total number of 12 users will need training to operate this software. Training time is 2 days per person. This will be accomplished by the 2 people in-house that are trained by the vendor. This software system will require the purchase of 3 servers ($1,250 each) that will be configured in a cluster to support the department's request for redundancy and failover. In addition, backup software for each server is $1,500. The average salary of an IT worker is $91/hour. You will need 1 programmer (40 hours), 1 database manager (65 hours), 1 project analyst (150 hours), 1 operations analyst (20 hours), 1 interface manager (20 hours), and 1 networking analyst (10 hours).
See attached chart to change and re-post© BrainMass Inc. brainmass.com October 24, 2018, 6:53 pm ad1c9bdddf
You will find the answer to this puzzling scenario inside...
Security and the Supply Chain
Read the sources referenced on the Background page. Then, respond to the following questions:
1. Is a security-oriented culture, with respect to the supply chain, just good business? Explain.
2. What are the benefits of viewing security issues beyond the individual firm?
3. Why is RFID technology viewed by many to be an important tool in securing a supply chain?
4. Which of the 10 security competencies discussed in the Closs, Speier, Whipple, and Voss article are likely to be the most challenging to implement? Why?
Display an understanding of how terrorism, and other international developments, can threaten global logistics. Discuss measures that can be taken to reduce these threats.
Blanchard, D. (2006 Dec.) Protecting the Global Supply Chain, Industry Week, Cleveland: Vol. 255, Iss. 12, pg. 43, 2 pgs. [ProQuest doc ID: 219748947]
Closs, D, Spier, C, Whipple, J, M. & Voss, D. (2008 Sep) A Framework for Protecting your Supply Chain, Logistics Management (2002) Highland Ranch: Vol.47, Iss. 9; pg. 45, 1 pgs. [ProQuest doc ID: 197209740]
Sheffi, Y (2001) Supply Chain Management Under the Threat of International Terrorism, International Journal of Logistics Management, Ponte Vedra Beach: Vol. 12, Iss. 2; pg. 1, 11 pgs. [ProQuest doc ID: 235866128]
Suder, G, & Czinkota, M. (2005 Fall) Towards An Understanding of Terrorism Risk in the MNE, Multinational Business Review, Detroit: Vol 13, Iss. 3, pg. 3. [ProQuest doc ID: 194181282]
Zalud, Bill, (2010 May) Every Link in the Chain, Security, Troy: Vol. 47, Iss.5; pg. 28, 3 pgs. [ProQuest doc ID: 197786976]