Preview

MIS 3534 Executive Report 2

Satisfactory Essays
Open Document
Open Document
639 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
MIS 3534 Executive Report 2
Brittany Bardo
Min-Seok Pang
MIS 3534
10/31/2014

Executive Report #2: Topic #3 – Southeastern Pennsylvania Joint Infrastructure Consolidation Project

I. Introduction:
The city of Philadelphia is proposing that the Southeastern Pennsylvania municipalities build a shared computing infrastructure that integrates the enterprise systems for common intergovernmental functions such as police, accounting, payroll, tax deduction, and utility. This proposal includes neighboring local governments: Montgomery, Bucks, Chester, and Delaware counties. By Montgomery County participating in the consortium, the project can promise the government savings of millions in tax and government revenues, less energy consumption, improved security, efficiency for service employees, and many other benefits. However, by not participating in the consortium, there are also many benefits such as flexibility, independent decision making, and control that would not be available if they were to participate in a shared computing infrastructure.

II. Evaluation:

Participation in the Joint Infrastructure Consolidation Project
Not Participating in the Joint Infrastructure Consolidation Project
Pros
Improved Security: strictly enforced standards and the reduction of networks and data centers, thereby reducing the number of vulnerable seams
Lower Costs for taxpayers and government
Lower energy consumption on shared systems
Easier maintenance on one set of common systems
Consistent and improved user experience
Stability as vendors normally change/come and go
More standardized data centers: easier to access, relocate, and monitor resources
Improved efficiency of service employees: can provide better service to citizens
Minimizes unnecessary redundancies and duplication of data
Local support and service
Allows flexibility for the different agencies
Each agency can control and set up systems differently to meet their needs
Each municipality can make their own decisions and policies regarding IT

You May Also Find These Documents Helpful

  • Satisfactory Essays

    | * Patch history * VPN * Firewall * Stateful Inspection * Whitelists-Blacklists * Boundary Encryption * Backups and archiving…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    During week 2, Learning Team D broken down the sections that we will each work on for the final Employee Handbook Nondiscrimination Paper due in week 3. Karen White has stepped up and agreed to lead the team for weeks 2 and 3 since the projects overlap during those weeks. Karen will be covering the introduction, conclusion, one bullet point, and editing the final draft together. Sharon, Shani, and Sade will each be covering 2 bullet points for the final assignment due in week 3. As a team we also chose what topics we would like to cover in the nondiscrimination handbook paper.…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Case Study Module 1 Mgt509

    • 1651 Words
    • 7 Pages

    This plan ensures that the organization has highly competent employees in a range of areas. It can be referred to as the Organization Entry Plan. This plan is developed in accordance with employee competency required in different operations. In order for this plan to be effective, accuracy, and the mission of the cooperation should be at the forefront. The recruitment, selection and on board process plan is a key element to the success of the organization.…

    • 1651 Words
    • 7 Pages
    Better Essays
  • Good Essays

    RLOT2 Task 2 B rev 1

    • 569 Words
    • 2 Pages

    The only zero cost opportunity, standardizing polices and procedures, is also the most difficult. Processes for incident response, patch management, and preventative maintenance must be developed, refined and communicated to the appropriate staff. Incident response processes must further be exercised so all incident responders know exactly what to do in the event of a (D)DoS. Development and deployment policies must be developed defining the process for development and deployment and use of University owned and managed computing devices. Security must be forefront-outlining security in the software development life cycle (SDLC) for both University developed applications and off the shelf applications.…

    • 569 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Kynfolk Kennel (KK) is a professional, well-established kennel located in Laveen, Arizona. We consider ourselves one of the top Bully breeders in the world. Here at Kynfolk Kennel, we breed only the highest quality American Pit Bull Terriers. It is our belief that quality is not just a matter of pedigree; it is a complete balance of care, nutrition, socialization, and exercise that measures the high standard of quality of the American Bully. At Kynfolk Kennels, we are very proud of our achievements in producing some of the worlds most eccentric American Bullies, from our prized foundation Bullies that come from top grand champion ancestry, to the worlds most consistent and proven bloodline, "RAZORS EDGE”. The excellence we strive for at Kynfolk Kennel allows us to produce dogs with great temperament, correct conformation, and compact structure with substance, amazing musculature, and beautiful headpieces. Are mission is to give the best to the best. Here at Kynfolk Kennel, “We Are The Best, At What We Do!"…

    • 2414 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Mis 535 Course Project

    • 2484 Words
    • 8 Pages

    Restaurants are built of complex systems for buying, storing, preparing and selling food. Cuban Pete’s is a popular independently owned restaurant located in Montclair, New Jersey. The restaurant offers a dynamic menu of Cuban ethnic items and has received renowned recognition. The restaurant has 285 seats — 195 of them in three sprawling dining rooms and 90 on an outdoor patio decked; takes reservations only for groups of six or more; and boasts that two-hour waits not uncommon; employs 40 PTE’s and 15 FTE’s; serves 500 patrons on average a day; and generates $400K in revenue monthly.…

    • 2484 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Case Study Page 168

    • 417 Words
    • 2 Pages

    1-Antonio is definitely feeling stressed. He has too many tasks to perform in a short amount of time. Also he has become the team lead just recently. Anytime one begins a new position there is some amount of stress because of the unknown. New nurses usually have the skills required to perform their job, but can lack management skills, like time management, to get the job done. Management skills are acquired through experience and time.…

    • 417 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Since the 1950’s the café has been using very, very old equipment. That equipment includes: old cash registers, espresso makers, coffee makers, and so on. But the most important old method that was being used is the manual entry of time and attendance. Now since I have started upgrading the café, I feel that it is now time for a new time system. This particular time system will allow employees to key in a special employee number that will automatically stamp the time displayed on the clock. The same method will be used for clocking out for lunch and clocking out for good.…

    • 411 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Eva-Consulting-Report

    • 2883 Words
    • 12 Pages

    TABLE OF CONTENTS INTRODUCTION DISTRIBUTION STRIKE CHALLENGE RECOMMENDATIONS IT FAILURE CHALLENGE RECOMMENDATIONS CELEBRITY MARKETING EXPANSION INTO JEWELLERY RANGE CHILD LABOUR ACCUSATION CHALLENGE RECOMMENDATIONS CONCLUSION APPENDICES APPENDIX A-1: DISTRIBUTOR STRIKE APPENDIX A-2: DISTRIBUTOR STRIKE APPENDIX A-3: DISTRIBUTOR STRIKE APPENDIX A-4: DISTRIBUTOR STRIKE APPENDIX B: IT SYSTEM FAILURE APPENDIX C: CELEBRITY MARKETING 3 5 5 6 7 7 8 9 9 10 10 11 11 Error! Bookmark not defined. Error! Bookmark not defined. Error! Bookmark not defined. Error! Bookmark not defined. Error! Bookmark not defined. Error! Bookmark not defined. Error! Bookmark not defined. Error! Bookmark not Error! Bookmark not…

    • 2883 Words
    • 12 Pages
    Powerful Essays
  • Better Essays

    Bus4002 Business Report

    • 4988 Words
    • 20 Pages

    There are four core values in Toyota, Customer first, Respect for people, International focus and Continuous improvement and innovation. (Toyota, 2012) Toyota leads the automobile industry in environmental technologies with the success of the hybrid technology in the Prius and Camry Hybrid. Fuel cell vehicles are also in development. ( Toyota Australia official websites,…

    • 4988 Words
    • 20 Pages
    Better Essays
  • Good Essays

    The use of technology in government services “supplies a direct order of magnitude improvement in productivity, efficiencies, cost savings…and empowers business leaders to drive improved services and achieve better results for their customers” (Evans). The fact that the government is implementing such technological practices becomes an example to other individuals and businesses to adopt such tools and become more productive. For this reason, according to the same article by Karen Evans, e-government “convened a high-level interagency task force to determine new ways for the government to provide better services to citizens, business, and governments and to transform itself.” The fact that Americans look forward to evolve the way they provide services, especially their government, is a clear example of how Americans value innovation and implement it on the way they are governed.…

    • 925 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Danger Of Homelessness

    • 277 Words
    • 2 Pages

    Rarely would we be able to accomplish immaculate security: no reasonable dangers and no exercisable vulnerabilities. Now and then we neglect to perceive a risk, or different times we might be not able or unwilling to close a defenselessness. Inadequate security is not an awful circumstance; rather, it shows an exercise in careful control: Control certain dangers and vulnerabilities, apply countermeasures that are sensible, and acknowledge the danger of damage from uncountered cases.…

    • 277 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    P2: Outline how legislation, policies and procedures relating to health, safety and security influence health and social care settings.…

    • 999 Words
    • 4 Pages
    Better Essays
  • Best Essays

    MIS Assignment

    • 1597 Words
    • 7 Pages

    Whether it is a small organization or a multi-national organization in which every customers count and it is important to develop strong relationships with customers based on loyalty and providing maximum satisfaction. It is possible to maintain one time purchases for a regular customer or even a window shopper who visits every weekend by offering a financial benefit, by establishing proper online network and a reward program which will have socially have the potential to spread word about the business and become loyal customers. Recognition is best word acknowledge the customer with distinct gratification.…

    • 1597 Words
    • 7 Pages
    Best Essays
  • Powerful Essays

    Internet Protocol Journal

    • 17243 Words
    • 69 Pages

    In this issue, Geoff Huston concludes his two-part article on Interconnection, Peering, and Settlements. Last time Geoff discussed the technical aspects for Internet Service Provider (ISP) interconnection. This time he examines the associated business relationships that arise out of ISP peering arrangements. He also looks at some future directions for the ISP interconnection environment, particularly with respect to Quality-of-Service considerations. A recurring theme in this journal has been the traditional lack of security in Internet technologies and systems. We have examined several ways in which security has been added at all levels of the protocol stack. This time we look at firewalls, a popular way to segregate internal corporate intranet traffic from Internet traffic while still maintaining Internet connectivity. Fred Avolio gives the history of firewalls, their current state, and future directions. Computer viruses have probably existed for as long as we have had computers. However, the ease with which viruses can be distributed as Internet e-mail attachments has made the problem more prevalent. Recently, the Melissa virus achieved some notoriety because of its “selfreplication” properties. Barbara Fraser, Lawrence Rogers, and Linda Pesante of the Software Engineering Institute at Carnegie Mellon University examines some of the issues raised by this kind of virus. This issue is the first anniversary issue of The Internet Protocol Journal (IPJ). You can find all of our back issues in…

    • 17243 Words
    • 69 Pages
    Powerful Essays