Free Essay

Cis 517 Final Project Chapter 10

In: Business and Management

Submitted By shaun921
Words 595
Pages 3
We must always try to improve the effectiveness of a solution, every weakness and loopholes should always be identified and dealt with. It is impossible to eliminate all possibility however, by addressing each issue, will pave ways for development and improvement. In the case of green computing, no matter how propitious and innovative the effort is, there always a desideratum to optically canvass the risks and potential quandary it will may cause later on. Similar with other technology, much consideration is accentuated on the security, cost and performance. If both security and performance are compromised, hence leads to cost overrun Meanwhile, from the sustainability aspect, it is essential to give it as much consideration as the other three aspects. If a technology has high level of sustainability, not only will it helps to save cost in the long run, but also improves the longevity of performance and security, without having to constantly keep up with the rapid growth of technology evolution.

Based on the Figure 1, which is the cause-and-effect diagram of green computing, there are four aspects highlighted; security, cost, performance and sustainability. Cost is the backbone in a project, therefore it is important to ensure that cost is kept within the allocated budget. In green computing, considering its complexity and the fact that it is still new in the computing technology, thus it is vital to be prepared of the unknown unknowns. Unknown unknowns or sometimes called as ‘management reserve’ is the portion of funding which is included in the cost estimate to allow for future situations that are unpredictable.
Moreover, complexity will require further consultation from other party or outsources, who are specialized in the area. And like other project, cost imposes limitation since it needs to be watched over throughout the project’s duration. As for security aspect, green computing is risky if the hardware used is made from recycled or reusable items. Risks lead to vulnerability and if the technology is vulnerable hence it is easier to be compromised. Performance and security are interrelated in such a way that better security features will entail higher usage, which will in turn burdens the response time. Slower response time can also be contributed by the complicated nature of the technology.
All in all, a way to maintain all three aspect; cost, security and performance is by accentuating on the sustainability factor. Sustainable in this context, is the ability for the technology to be maintained at certain rate or level, even in few years to come. Technology evolution has come to its peak magnification where incrementing number of technology are relinquished virtually daily.
Therefore, one of the effects of rapid growth has on sustainability factor is that it is difficult to keep one technology for a period of time due to one of the elements the technology use might be going thru another evolution therefore making it incompatible and needs upgrades. Rapid growth accelerates the phase of technology in becoming obsolete. Thus, one way to overcome the technology obsolescent is to make the technology itself exclusive and privileged. Exclusiveness controls the mass distribution of the technology and at the same time protect the quality of the technology produced.

References

Malone, M. (2011, September 9). Adobe Unveils Major Innovations for Video Technology at IBC 2014 | Business Wire. Retrieved from http://www.businesswire.com/news/home/20140907005064/en/Adobe-Unveils-Major-Innovations-Video-Technology-

Source Wire News Distribution. (2013, March 14). LEED Project Review Process Simplified. Retrieved from http://www.buildings.com/news/industry-news/articleid/17946/title/leed-project-review-process-simplified.aspx…...

Similar Documents

Premium Essay

Cis 517

...Strayer University IT Project Management Assessment Payton Ridley CIS 517 October 21, 2012 Morrow Campus Dr. 1. Summarizes how the project manager or team exhibited exceptional and ethical project management practices. Often, the project manager (PM) is faced with an issue that is not easily resolved by theory or the knowledge acquired from formal training. These types of problems are usually not of a technical nature and more often tend to be ethical or human resource issues (Stare, 2011). The satisfactory answer is often debatable and may suit one set of circumstances and yet not another. It is these difficult issues where the PM must draw from their practical experiences, moral and ethical obligations, and sometimes the rule of law. For example, international projects take the PM out of the comfort zone of the local laws and customs that they are used to working at home. In many host countries, doing business results in uncertainty and inconsistencies from the way business is conducted at home. Sometimes a practice that is permissible in the foreign country is not at home (Stare, 2011). Will making a payment to a foreign government official to obtain permits, licenses or police protection be seen as a bribe or just facilitating and expediting to get things done? That is why it is useful to have a set of guidelines. Companies should have a set of best practices or code of conduct to assist them, however, many do not. Here is a list of questions to......

Words: 1296 - Pages: 6

Premium Essay

Cis 517 Assignment 2

...February 17, 2013 CIS 517 Project Management Dr. Huang Project Title: Green Computing Research Project Project Manager: Rotunda Robinson rrobinson@GCRS.com Requirements Traceability Matrix Requirement No. Name Category Source Status 1 Data Center Building Project Charter Accepted 2 Recycling Building Project Charter Accepted 3 Office Material Operations Project Charter Accepted 4 User Support and Training Operations Project Charter Accepted 5 Working from home Operations Project Charter Accepted 6 Hours of Operation Operations Project Charter Accepted 7 Environmental Friendly Operations Project Charter Accepted 8 CPU & Laptops Hardware Project Charter Accepted 9 Cloud and Virtualization Software Project Charter Accepted 10 Open Source Software Software Project Charter Accepted 11 Solar Computing Energy Source Project Charter Accepted 12 Electricity Outputting Energy Source Project Charter Accepted 13 Power Management Energy Source Project Charter Accepted List of Questions to ask the Sponsors I. When will you expect this project to be completed? II. What are your expectations? III. Do you have any additional resources that could be of assistance to the project? IV. How strenuous will be the training on the new hardware and software? V. Do you have any suggestions? VI. Are there any green technologies available in the area? Project Charter: • Helping to improve the......

Words: 356 - Pages: 2

Premium Essay

Chapter 10

... Chapter 10 Product Liability I. Definition of Product Liability Manufacturers and anyone in the chain of product distribution can be legally liable for defective products that cause injury to the purchaser, a user or bystander, or their property. Most states have adopted strict product liability, whereby an injured person may recover damages without showing that the manufacturer was negligent or otherwise at fault without a contractual relationship. II. Theories of Recovery The primary theories on which a product liability claim can be brought are breach of warranty, negligence, and strict liability. A. Breach of Warranty In a warranty action, the question is whether the quality, characteristics, and safety of the product were consistent with the implied or express representations made by the seller. 1. UCC Warranties  may be either express or implied for merchantability or fitness for a particular purchase, as set forth in Chapter 8. 2. Privity of Contract  Breach-of-warranty is based on contract law. Generally, an injured person to recover for a breach of warranty, he must be in a contractual relationship (privity) with the seller (a consumer or buyer of the product) and prevents recovery from bystanders not in privity with the seller. B. Negligence To prove negligence in a product liability case, plaintiff must show defendant did not use reasonable care in designing or manufacturing its product or in providing adequate......

Words: 4228 - Pages: 17

Premium Essay

Chapter 10

...Chapter 10 Property, Plant, and Equipment and Intangible Assets: Acquisition and Disposition AACSB assurance of learning standards in accounting and business education require documentation of outcomes assessment. Although schools, departments, and faculty may approach assessment and its documentation differently, one approach is to provide specific questions on exams that become the basis for assessment. To aid faculty in this endeavor, we have labeled each question, exercise, and problem in Intermediate Accounting, 7e, with the following AACSB learning skills: |Questions |AACSB Tags |Brief Exercises |AACSB Tags | |10–1 |Reflective thinking |10–13 |Analytic | |10–2 |Reflective thinking |10–14 |Analytic | |10–3 |Reflective thinking |10–15 |Analytic | |10–4 |Reflective thinking |10–16 |Analytic | |10–5 |Reflective thinking |Exercises cont. |AACSB Tags | |10–6 |Reflective thinking ...

Words: 13744 - Pages: 55

Premium Essay

Cis 517 Http: //Www.Helperstudy.Com/Products/Cis-517

...CIS 517 WEEK 5 MIDTERM download here Question 1 A(n) ____ is a formal group of people responsible for approving or rejecting changes to a project. Question 2 The project procurement management knowledge area maps to the ____ process group through the activity of administering procurements. Question 3 The first step in determining the NPV is to ____. Question 4 Some people say that ____ achieve the vision of a project. Question 5 4 out of 4 points A(n) ____ is a document that formally recognizes the existence of a project and provides direction on the project’s objectives and management. Question 6 Many companies have realized that information technology is integral to their business and have created a vice president or equivalent-level position for the head of information technology, often called the ____. Question 7 The ____ model uses an approach in which developers work with an evolving prototype. Question 8 During ____ processes for a new project, the organization recognizes that a new project exists, and completes a project charter as part of this recognition. Question 9 The ____ should list and describe all of the deliverables required for the project. Question 10 The goal of ____ is to influence the factors that cause scope changes, assure changes are processed according to procedures developed as part of integrated change control, and manage changes when they occur. Question 11 The project scope management knowledge area maps to the ____......

Words: 531 - Pages: 3

Premium Essay

Cis 517 Http: //Www.Helperstudy.Com/Products/Cis-517

...CIS 517 WEEK 5 MIDTERM download here Question 1 A(n) ____ is a formal group of people responsible for approving or rejecting changes to a project. Question 2 The project procurement management knowledge area maps to the ____ process group through the activity of administering procurements. Question 3 The first step in determining the NPV is to ____. Question 4 Some people say that ____ achieve the vision of a project. Question 5 4 out of 4 points A(n) ____ is a document that formally recognizes the existence of a project and provides direction on the project’s objectives and management. Question 6 Many companies have realized that information technology is integral to their business and have created a vice president or equivalent-level position for the head of information technology, often called the ____. Question 7 The ____ model uses an approach in which developers work with an evolving prototype. Question 8 During ____ processes for a new project, the organization recognizes that a new project exists, and completes a project charter as part of this recognition. Question 9 The ____ should list and describe all of the deliverables required for the project. Question 10 The goal of ____ is to influence the factors that cause scope changes, assure changes are processed according to procedures developed as part of integrated change control, and manage changes when they occur. Question 11 The project scope management knowledge area maps to the ____......

Words: 531 - Pages: 3

Free Essay

Cis 517 Http: //Www.Helperstudy.Com/Products/Cis-517

...CIS 517 WEEK 9 CASE STUDY 3- GREEN COMPUTING RESEARCH PROJECT download here Case Study 3: Green Computing Research Project – Part 5 Read the Green Computing Research Project, Part 5 in Appendix C and review the Seven Basic Tools of Quality located in Chapter 8. Write a two to three (2-3) page paper in which you: Select one (1) of the seven (7) tools of quality from Chapter 8 and create a scenario related to this project where it would be useful. Document and defend your recommendation, scenario, and tool. Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Explain and defend the various quality factors in project quality. Use technology and information resources to research issues in IT project management. Write clearly and concisely about issues in IT project management using proper writing mechanics and...

Words: 250 - Pages: 1

Free Essay

Chapter 10

...Megan VanSickle Climate Change Collapse Summaries Chapter 10-Malthus in Africa: Rwanda’s Genocide Summary In Chapter 10 Jared Diamond is educating the readers in the instance of Rwanda’s collapse with the conditions of lack of farming land, hunger, war, poverty, lack of natural resources and more. These were caused by population pressure. Overpopulation is the primary cause which brings many problems along with it. Diamond begins the chapter by discussing and talking about his family’s stay in East Africa. He and his family saw overpopulated streets of poor people which sadly most of them were children. The children were on the side of the road begging. Diamond also discusses how population problems such as this with East Africa are sometimes pointed out as Malthusian theory. This is when population grows rapidly compared to food production increases. Diamond also discusses the Rwanda’s people that were controlled and influenced by Hutus, mostly farmers and Tutsis. Hutus and Tutsis did not like each other so Hutus army started killing Tutsis with weapons. Diamond later causes many examples such as overpopulation in Kanama. This caused population consuming below the average daily required calories. This educated readers about the different regions that are coming to be thee victims of population pressure. At the end of chapter 10, Diamond thinks that overpopulation had great impact on the Rwandan genocide. Diamond uses three counterarguments in order to prove his point...

Words: 272 - Pages: 2

Free Essay

Cis 333 Week 10 Technical Project Paper – New 2015

...CIS 333 Week 10 Technical Project Paper – New 2015 http://homeworkfy.com/downloads/cis-333-week-10-technical-project-paper-new-2015/ To Get this Tutorial Copy & Paste above URL Into Your Browser Hit Us Email for Any Inquiry at: Homeworkfy@gmail.com Visit our Site for More Tutorials: (http://homeworkfy.com/ ) Preview : After looking at your network security structure there are various physical threats that we will focus on that could have a Hugh impact on your business intellectual property and availability. For example threat like fire, hurricanes, tornadoes, flooding, lighting, earthquakes and electrical failure that can destroy the network vital information to be lost. In the case of any of these events, to protect the pharmacy from losing important patient data we need to secure this data by implementing a backup and recovery plan to help reduce the downtime to get back online and not loss customer loyalty. Offsite storage like Cloud technology can allow access to all critical information without invests additional resource to maintain the storage solutions and the staff to maintain integrity of the network. When looking at logical threats we must protect the network from unauthorized access internally and external attacks. Hackers understand that every device on the network has it weakness and they are trying to take advantage of it, devices that are most looked at are: servers, switches, routers, desktops, security devices and internal employees themselves....

Words: 462 - Pages: 2

Free Essay

Cis 333 Wk 10 Technical Project Paper

...CIS 333 WK 10 TECHNICAL PROJECT PAPER To purchase this visit here: http://www.activitymode.com/product/cis-333-wk-10-technical-project-paper/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 333 WK 10 TECHNICAL PROJECT PAPER CIS 333 WK 10 Technical Project Paper - Information Systems Security Write a ten to fifteen (10-15) page paper in which you: 1. Identify and analyze any potential physical vulnerabilities and threats that require consideration. 2. Identify and analyze any potential logical vulnerabilities and threats that require consideration. 3. Illustrate in writing the potential impact of all identified physical vulnerabilities and threats to the network and the pharmacy. 4. Identify all potential vulnerabilities that may exist in the documented network. 5. Illustrate in writing the potential impact of all identified logical vulnerabilities to the network and the pharmacy. More Details hidden... Activity mode aims to provide quality study notes and tutorials to the students of CIS 333 WK 10 Technical Project Paper in order to ace their studies. CIS 333 WK 10 TECHNICAL PROJECT PAPER To purchase this visit here: http://www.activitymode.com/product/cis-333-wk-10-technical-project-paper/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 333 WK 10 TECHNICAL PROJECT PAPER CIS 333 WK 10 Technical Project Paper - Information Systems Security Write a ten to fifteen (10-15) page paper in which you: 1. Identify and analyze any potential physical......

Words: 496 - Pages: 2

Premium Essay

Cis 517 Wk 2 Assignment 1 It Project

...CIS 517 WK 2 ASSIGNMENT 1 IT PROJECT To purchase this visit here: http://www.activitymode.com/product/cis-517-wk-2-assignment-1-it-project/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 517 WK 2 ASSIGNMENT 1 IT PROJECT CIS 517 WK 2 Assignment 1 - IT Project Management Assessment Research and read an article on recent recipients of the Project Management Institute’s Project of the Year Award. Write a two to three (2-3) page paper in which you: 1. Summarize how the project manager or team exhibited exceptional and ethical project management practices. 2. Discuss the role of the project manager or team, the organizational setting, the recipient’s approach to project integration management, and obstacles that had the potential of adversely impacting the triple constraints. More Details hidden... Activity mode aims to provide quality study notes and tutorials to the students of CIS 517 WK 2 Assignment 1 IT Project in order to ace their studies. CIS 517 WK 2 ASSIGNMENT 1 IT PROJECT To purchase this visit here: http://www.activitymode.com/product/cis-517-wk-2-assignment-1-it-project/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 517 WK 2 ASSIGNMENT 1 IT PROJECT CIS 517 WK 2 Assignment 1 - IT Project Management Assessment Research and read an article on recent recipients of the Project Management Institute’s Project of the Year Award. Write a two to three (2-3) page paper in which you: 1. Summarize how the project manager or team exhibited exceptional and......

Words: 633 - Pages: 3

Premium Essay

Cis 517 Wk 11 Final Exam

...CIS 517 WK 11 FINAL EXAM To purchase this visit here: http://www.activitymode.com/ product/cis-517-wk-11-final-exam/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 517 WK 11 FINAL EXAM CIS 517 WK 11 Final Exam 1. Overrun is the additional percentage amount by which estimates exceed actual costs. 2. The primary output of the planning cost management process is a change request. 3. IT project managers must be able to present and discuss project information both in financial and technical terms. 4. Project managers must conduct cash flow analysis to determine net present value. 5. Intangible costs can be easily measured in monetary terms. 6. When deciding what projects to invest in or continue, one should include sunk costs. 7. It is important for project managers to focus on indirect costs because they can be easily controlled. 8. If an important supplier goes out of business, management reserves can be set aside to cover the resulting costs. 9. Contingency reserves are also known as unknown unknowns. 10. A cost management plan can include organizational procedures links, control thresholds, and process descriptions. 11. A budgetary estimate is the most accurate of the three types of estimates. 12. Budgetary estimates are made even before a project is officially started. 13. Definitive estimates are made one year or less prior to project completion. 14. Estimates should become more accurate as time progresses. 15. Supporting details for an estimate include...

Words: 879 - Pages: 4

Premium Essay

Cis Final Project

...Computer Concepts and Applications-GS July 2015 Final Project You have been hired by a medium size (approximately 200 employees) widget manufacturing company to do a complete evaluation of their computer needs and make recommendations to them about an information system to support their business. Currently several of their support departments are using manual processes and they wish to automate their accounting and human resources business processes. They also want to harness the power of the Internet in their business. Making Your Company Greater Through Technology As we head into the future, it important for any business organization to be prepared. The evolution of business technologically is rapid, and it’s important to stay updated. As this company continues to grow, many changes need to be considered to help its continued success. One of the most important changes that need to be considered is an implementation of an information system to support the business. This system will be implemented throughout the company and support departments such as accounting and human resources. What is an Information System? An information system is the corresponding networks or components of hardware and software that are used to accumulate, filter, develop, create, and deliver information. There are four main components of an information system: hardware, software, data, and communication. Hardware is the part of the information system that a person can touch- the......

Words: 1593 - Pages: 7

Premium Essay

Project Management Chapters 10 and 11

...Kelli Harper March 19, 2016 BA3110 2. What are some essential skills for an effective project manager? How can these skills be developed? Strong leadership ability, ability to develop people, excellent communication skills, good interpersonal skills, handle stress, problem solving, negotiating, and time management skills. Gain experience, learn from others, Interview project managers that have the skills you want to develop in yourself, conduct a self-evaluation, and learn from your mistakes, mentor, participate in education and training programs, join organizations such as Project Management Institute, read subscribe to journals or look up articles, earn a credential, and volunteer. 3. What leadership skills have project managers with whom you have worked possessed? How can you develop these skills? Good communication skills, interpersonal skills, developing people skills, leadership skills, the one I can say that she was lacking in was the ability to handle stress. I can shadow her, interview her, read and study articles, take some classes on effective Project management, continue to evaluate myself. 9. What is meant by the term delegation? Why is delegation essential for project management? Give examples. Delegation involves empowering the project team to accomplish the project objective and empowering each team member to achieve the expected results for his or her area of responsibility. It is the act of allowing individuals to carry out assigned task successfully...

Words: 963 - Pages: 4

Premium Essay

Cis 517 - Case Study 1

...Case Study 1: Green Computing Research Project – Part 1 James Johnson IT Project Management – CIS 517 Dr. Howell July 31, 2012 As technology increases through massive changes it becomes apparent that the individual user must also make changes that are environmentally safe. Green IT, also known as Green Computing, is the movement towards a more environmentally friendly and cost-effective use of power and production in technology. The crux of Green IT is to double or triple the bottom line investment costs by converting existing structures and systems to this more conservative mode of operation in green computing (eweek.com, 2012). The greening of information technology (IT) offers numerous ways for companies to significantly improve the bottom line, whether through energy efficiency of computers and printers via power management, smart e-waste or asset management, or greening data centers with virtualization or cloud computing (greenbiz.com, 2012). Maintaining efficiency throughout daily operations is high on the priority list in an effort for business to not only cut costs but manage their services in a much more streamlined fashion. The transformation to become green friendly is one that requires the coordination of many areas. To ensure that working groups are formed, timelines are established, and end results are defined based off of the recommendations and requirements of the stakeholders the formation of a project management team is required. At the We...

Words: 1068 - Pages: 5