Ian Armus, Woodrow Crawford, Loretta Dawson, Joel Estrada, & Curtis Rodgers
CMGT/410
Chanda Sanders
July 8, 2013
Table of Contents Riordan Charter Approach 4 Project Background 4 Current System 4 Areas of Improvement 5 Project Goals 5 Compatibility 5 Storage and Recovery Planning 6 Network 6 Security Systems 6 Phases of Production 6 Project conceptualization 7 Project development 7 Project design 7 Project construction 7 Project testing 7 Project implementation 7 Project evaluation 7 Budgetary Limitations 8 Explanation of Sponsor 8 Stakeholders 8 Structure of the Project Team 9 Project Approach 9 Project Schedule 10 Business Requirements Document 10 Compatibility of Systems 10 Storage and Recovery 11 Network Design and Security 13 Additional Security 14 Work Breakdown Structure 15
Project Costing…………………………………………………………………………………18
Resource Establishment…………………………………………………………………….18
Timeline Establishment……………………………………………………………………..18
Critical Task Sequencing……………………………………………………………………18
Cost Implications………………………………………………………………………...…..19
Variance Baseline……………………………………………………………………………20
Delegation of Variance Targets…………………………………………………..……..20
Planned Versus Actual……………………………………………………………...……21
Estimates Versus Planned…………………………………………………….….……..21
References……………………………………………………………………………………..22
Riordan Charter Approach
Project Background The purpose of this project will be to appropriate a new Human Resources Client-Server Database system. This new system’s capabilities of centralizing Riordan Manufacturing’s data will increase the overall security of the data within. This was expressed to the IT department because of the increasingly overwhelming amount of personal data currently transmitted across unsecure data-lines,
References: Apollo Group. (2012). Riordan MTG. HRIS. Retrieved from https://ecampus.phoenix.edu /secure/aapd/cist/vop/Business/Riordan/HR/HRIS.asp Dennis, A., Wixom, B. H., & Roth, R. M. (2009). System Analysis and Design (4th ed.). Hoboken, NJ: John Wiley & Sons. Fortigate. (2005). Fortinet. Fortigate VPN Guide. Retrieved June 20, 2013 from http://docs.fortinet.com/fgt/archives/3.0/techdocs/FortiGate_IPSec_VPN_User_Guide_01-30005-0065-20081015.pdf Laudon, K. C., & Laudon, J. P. (2010). Management Information Systems (11th ed.). Upper Saddle River, NJ: Prentice Hall. Microsoft (2012) Microsoft TechNet. Chapter 7 Client/Server Architecture. Retrieved March 21, 2012 from http://technet.microsoft.com/en-us/library/cc917543.aspx Myers, C.R. (2003) Cornell University Library. Software Systems As Complex Networks. Retreieved June 20, 2013 from http://arxiv.org/abs/cond-mat/00305575 Suchan, J. (2012). Leading Practices for Applying Variance Data to Future Projects. Microsoft Office Valacich, J. S., George, J. F., & Hoffer, J. A. (2009). Essentials of Systems Analysis and Design (4th ed.). Upper Saddle River, NJ: Prentice Hall Virtual Organization (2012)