Verified Document

Project Management For Computer Upgrade Term Paper

IT Project Management PROJECT CHARTER

Objective of this project is to upgrade the new computer system for the ACME Incorporation. The company has decided to launch the 200 desktop computers to enhance organization efficiencies. The company will also take the advantage of the new system to integrated effective security systems, which will include:

Account lockout policy (SANS CSC 16-9),

Password policy (SANS CSC 16-8), and Screen Lock Policy (SANS CSC 16-6).

Integrated of effective security system will enhance efficiencies of all employees across all departments within the organization. The estimated costs to complete the project are $300,000, which will cover the computer upgrade and integration of the security systems. The time frame to complete the project will be 3 months, and the project team will consist...

The standard required for the project is that the new system should be able to enhance efficiency of all ACME departments. Moreover, the new system should be able to save costs of the company business operations. Moreover, the new project should be able to enhance the IT security against internal and external threats.
However, the project is subjected to the following risks and constraints:

Inflation may increase the cost of materials used to complete the project.

Communication breakdown,

Incomplete design.

Inaccurate cost estimates.

Outsourcing delays

Inaccurate time-frame to complete the project.

Authorized by CME vice IT President John Wall Date: 30 March, 2014

Cite this Document:
Copy Bibliography Citation

Related Documents

Project Management Review the "Lessons Learned" Section
Words: 994 Length: 4 Document Type: Term Paper

Project Management Review the "Lessons Learned" section of the project risk diagram. Describe how the Lessons Learned activity helps you become a stronger project manager, who else it helps in the project team and also describe how it helps PMO. 200 words Documenting the lessons learned is one of the most important aspects of the closure phase of the project. It is important to an individual project manager because they can reflect

Management and Decision Sciences From
Words: 25680 Length: 90 Document Type: Thesis

76). As automation increasingly assumes the more mundane and routine aspects of work of all types, Drucker was visionary in his assessment of how decisions would be made in the years to come. "In the future," said Drucker, "it was possible that all employment would be managerial in nature, and we would then have progressed from a society of labor to a society of management" (Witzel, p. 76). The

Upgrade to an ERP System
Words: 628 Length: 2 Document Type: Essay

charter summary as well as some scholarly research that covers both organizational culture and project management. The project charter will include the scope of the project, the objectives of the project and the participants and stakeholders that will be involved in said project. The project in question will be an upgrade to an all-encompassing and all-inclusive enterprise resource planning (ERP) system that will replace the disparate and different moving

It Portfolio Management Systems Portfolio
Words: 4890 Length: 15 Document Type: Term Paper

In fact, an incoherent approach to it can lead to negative effects such as escalation of costs and lowering of efficiencies. It portfolio management addresses this key issue right from the conceptual stage of projects. The portfolio approach ensures that it projects are implemented with shared commitment, within the statutory framework. Some of the important measures implemented are: Collaborative decision making for key and large scale projects Stakeholder commitment and support

It Infrastructure Project Description the
Words: 7426 Length: 25 Document Type: Capstone Project

Secured real time protocol (SRTP) is also being identified to enhance the security parameter of WAN and LAN network elements. "SRTP provides protection with encryption keys for wired and wireless networks including bandwidth limited channels." (Guillen and Chacon 2009 P. 690). There is also a growing use of IP secure to protect organization from the interception of data over the LAN and WAN environment. To enhance network security, Chen, Horng,

Government Spending and Management
Words: 4932 Length: 3 Document Type: Research Paper

Technology and Software Identify How the Data Will Be Collected Before and the After Solution States Synthesis of data Research analysis and synthesis methods Discuss analysis and synthesis of measurement results Discuss findings of the measurement results Discussion and Conclusion on Approach (Week 4) Compilation of Findings, Conclusions, and Recommendations (Week 5) The pace of technological development, inclusive of both hardware and software advances, has been rather unrelenting and chaotic in the last generation or two of

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now