Richard Lecator
1 Business Requirements
1.1 Project Overview
Since the firm works on web analytics and effective qualitative reportage. The project assist of software used by the firm that enables it to have high quality, data collection that is very effective that starts in minutes without any necessity of additional programming.
1.2Background including current process
The company is known for its dominant role in the collection and analysis of data. The firm has been operational for a duration almost equaling two years and has a total of approximate 20 employees, where four have been delegated to the IT department.
The firm is further able to collect native and email data from almost all the electronic sources, with the inclusion of the individual computers, storage devices for mobile media, backup tapes, networks belonging to the companies, and the mobile devices for personal use. This shows that the company is well equipped to manage almost all of the devices.
1.3 Scope
1.3.1 Scope of Project
The scope of this project should be controlled through the following tips:
Data warehousing involves the process of designing how data is stored for the goal of improving reporting and analysis (Sinha, 2011). Data warehouse specialists ensure that various stores of data are related and connected to each other both physically as well as conceptually. An organization’s data is usually stored in some databases.
To be able to analyze the broadest range of data, each of the databases needs to be connected in some way. This implies that the data within them need a way of being related to other relevant data and that the physical databases themselves have a connection so their data can be viewed at together for reporting and analysis purposes.
Data analytics can be utilized to examine whether a database is working as projected. With the information acquired from the analytics, the database administrators can establish which areas of the warehousing are accepted and which areas of their site are not accepted by the users. Analytics, therefore, enables the database designer to improve the user experience; analytics is a core aspect of this project implementation and adoption (Ohlhorst, 2013).
Interfaces and cloud computing are key to the company growth due to the rapid involving technological world. The virtualization of databases through cloud computing is a key concept since it enhances security by avoiding system failure and improved disaster recovery techniques.
Outsourcing and off-shoring needs potentially offer greater and wider benefits. Complex strategies in this project can be outsourced. Virtualization technologies such as cloud computing and security issues which are core in the project can be outsourced. Security is a major part of this project since failure to implement good security measures would mean that the company will not grow as speculated and therefore lowering its competitive edge. Therefore the project plan should lay down the security measures to be implemented so that the Wiggly Corporation can implement a secure database system.
The necessary resources for this project include analytics software for collecting the relevant data, database management system for managing the databases, and knowledgeable staff to manage key dockets of the project management.
The staff members may include Chief Technology Officer (CTO) who is responsible for ensuring the throughput, speed, accuracy, availability, and reliability of the relational databases and Chief Security Officer (CSO) who is responsible for ensuring the security of the database.
1.3.2 Constraints and Assumptions
The project should have well-defined constraints regarding who has access to what resources; for example, the database administrator should have different login credentials from other users. Assumptions have been made in defining the scope, objectives and approach in this case, are that the data collected is of both of qualitative and quantitative measures.
1.3.3 Risks
There are various risks that exist within the implementation and deployment of this project which may include the following:
1.3.4 Scope Control
Scope control is apprehensive of the factors that contribute to scope changes and therefore aims at ensuring that the scope changes are positive. Scope control determines whether the scope change has taken place and managed the changes in the case that they occur.
For scope control to succeed, it must be systematically incorporated with other control processes which include time control, risk control, and quality control (Martin, 2008). The aspect of scope control is made up of measuring the extent into which development towards goals and objectives is being accomplished, the evaluation of the possible reactions to any deviations, as well as the correcting any hostile trends.
1.3.5 Definition of Terms (if applicable)
Project Goal – This is the objective of the Project.
Project scope – This involves defining the activities that are involved so as to achieve the project goal.
The risk assessment – Defined regarding the probability of project occurrence and the negative cost impact of project outcomes.
Work Breakdown Structure (WBS) – This involves breaking down the project activities so as to plan for time and other resources.
Functional Point Analysis (FPA) – This would be extremely useful in managing the change of scope of the project, communicating functional requirements, as well as measuring productivity.
References
Sinha, A. K. (2011). Data warehousing. Indianapolis, IN Prompt Publications.
Martin, P. K., & Tate, K. (2008). Getting started in project management. New York: Wiley.
Ohlhorst, F. (2013). Big data analytics: Turning big data into big money. Hoboken, N.J: John Wiley & Sons.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more