GU has multiple systems and applications that must communicate with each other. Changes in the operating system and platforms must be carefully considered. One system can offset multiple other systems. GU runs multiple dashboards and overlays in order to access information globally in real time. The system has no downtime per se as the servers are updating every six hours (12am, 6am, 12pm, 6pm Central Standard Time) and different backup systems are in place globally and online.
The project has been planned out and GU has signed off on the plan. GU has installed development and test environments. No significant issues have been reported. The rollout throughout the office has gone well with support level and administrative personnel. The rollout is now extending to pilot users in the nursing graduate program. A system failure is occurring due to unknown software which many of the instructors and nursing students have loaded on their computers (desktop and laptop). The failure has brought down the system and is negatively impacting the credibility of the system. What is your first course of action? What plans and measures will you put in place, and how will this impact your schedule? What could have been preventative measures to reduce these risks?
Write a 3-4 page paper describing sources of resource risk. Please give examples based on your experience and/or from your project management textbook to illustrate the sources of resource risk. Save your assignments for review and use on your BA599 Capstone project.© BrainMass Inc. brainmass.com October 17, 2018, 11:42 am ad1c9bdddf
There is unknown software being downloaded by many of the instructors and nursing students. As a result there is a system failure that has been occurring again and again which is bringing down the system and is negatively impacting the credibility of the system?
Since users are accessing internet to downloading the software, the university is exposed to different types of security risks. It is prone to being hacked, virus attack, and other malicious programs. Information is being accessed real-time globally in real time due to which there is urgent need to protect information to ensure its confidentiality, integrity, and availability to those who need it for making business decisions. Without security an organization cannot be sure of whether its information is protected. The first step to security is installing a firewall to prevent any unauthorized access across the internet. In addition, it is also important to install an antivirus and antispyware. Thereafter action would be to disable or uninstall such software from all user machines. All users need to be educated on risks of downloading software from incredible sources. Data backup should be taken after end of every month so that in case of data loss business does not get affected.
Since GU is an information holding organization, the need for security awareness and training and education is critical in successful business operations. The objective of ...
The multiple systems and applications which must be communicated with resource risks.
You work for a major defense contractor. Your company prepared and submitted a bid for a recent Department of Defense RFP, entitled Automated Mobile Defense System (AMDS). You have been assigned to lead Project X, which will design, develop, test, demonstrate and deploy 10 AMDS units to a location to be determined by the DoD assuming a successful demonstration. This project is expected to take at least 5 years to complete at a cost of $1.5 billion. If you are successful and deliver a quality product on time and within budget, the DoD will order 150 more AMDS units at a price of $10 million per unit. The goal of Project X is to develop a defense system to protect major and strategic cities within the US in the event of a missile attack from a hostile nation. It is to be a redundant system; the last in a series of defensive weapons to be used only in the event that all other defensive systems have failed; when enemy ABMs are approaching the US and only AMDS is left to take them down.
The conceptual design for the AMDS that your company submitted in response to the RFP consists of a mobile housing unit (MHU) containing 20 anti-ballistic missiles (ABMs) based on a radically new design; an anti-missile control computer (AMCC) used to automatically target and deploy the ABMs; and a retrofitted detection device (code name: SKYEYE) built on proven, patented radar technology which your company owns. All of these devices: the ABMs, the AMCC and SKYEYE will be completely housed in the MHU, which is planned to be an enhanced18-wheel tractor-trailer. A self-contained power source (for the ABMs) and solar charged batteries for the AMCC and SKYEYE make the entire AMDS portable and completely automatic (no personnel are required to operate any of the systems). However, military personnel on a regular basis will perform routine system monitoring and maintenance, preferably from a remote site. On-site maintenance should only be needed on rare occasions expected to arise from unforeseen events such as earthquake, tornados, ice storms, etc. Should it become necessary, military personnel will move the AMDS to a location known only to them. While it was not included in the design accepted by the DoD, your company would like to be able to provide additional capability with the system: they would like the AMDS to be able to operate while it is being moved.
You are the project manager and oversee the efforts of over a dozen nuclear scientists, engineers, and technology professionals. Many of them are acquainted with the rudiments of project management, but very few know much about project risk management. You'll need to do some education along with managing schedule, budget and scope.
Create a Risk Template by listing those risks that you think are appropriate for Project X. The template should include:
Description of the risk
Categorize and quantify them according to your knowledge of risks and risk templates. If you have made assumptions about the project, include them at the top or bottom of the template.
Use effective communication techniques.
Employ the techniques for monitoring and controlling risks
Apply the basic competencies of the project manager in understanding and planning for risk
I have compiled a risk template however would like to integrate the information which was provided but am unsure the breakdown or specifcs. Therefore am referring the template and document for further assistance. As the information was excellently formated and would like to integrate it in some way due to the work that was put into it. Any assistance with this area would be greatly appreciated.View Full Posting Details