Monday, January 27, 2020

E-Commerce in Fashion

E-Commerce in Fashion Background E-commerce is in fashion so many companies of all sizes and types are reviewing their sales strategies.   Consideration is being given to either (or both) selling to other businesses electronically (B2B) or selling directly to individual customers over the Internet (B2C).   Many companies are failing to live up to expectations, with problems such as poor website design making ordering difficult, website failure (crashes) from overload or because they were incomplete, failure to confirm the order, subsequent out-of-stock, failure to deliver on time. The Project Brief You, as the project manager, are to plan a project for a Triangle software house to develop an online Hotel Management system for an international hotel chain.   The project is scheduled to start on6thof July 2010. The project should have the following options Guests: Room Reservations for guests Services: Adding other services use, restaurant use, bar use by guests Maintenance: To maintain records in the system Inquires: To know about availability of rooms, reservations, gust lists Four computers have to be supplied for the selected project and these computers needs to be networked. Required time schedule for the project is three months. From the Project Managers point of view, an e-commerce project is no different from any other project.   You need a framework to plan resources and budget; you must set the plan against an appropriate calendar; and you need to ensure that you include the managerial and quality-related tasks that will help the project manager succeed. You need to plan how the project should be initiated.   However, your initiation plan should be presented in sufficient detail for someone else to manage it.   You are not expected to have all the answers at this stage; part of the skill of project planning is to ensure that you put the tasks in place to find out what is unknown and to manage the obvious risks. Task 1 (a) As the Project Manager, you are expected to decide on the following: 1. The tasks required to carry out the project aim for at least 10-15 tasks.   Traditional File System (SDLC-System Development Life Cycle) Strategic Study Business study Feasibility study Requirement analysis Requirement Specification Logical system specification Logical Design Physical Design Coding Testing Implementation Maintenance Paste out Relate Traditional File System steps to Hotel management system Case Study. We use Traditional File System for Hotel management systemto develop their system. Strategic study: Project Manager goes to the Hotel study the current system; after he understood what the system that they need to develop is what they technology must use to develop the hotel. Business study:- Project Manager prepare a document project initiation document this will give the general   definition for the developing system   that document shown to the hotel managing director we get the approval to proceed the development the new system. Feasibility study: These step uses to traditional file system how to feasible for hotel computerizes Economical, Technical Operational, even the developing system is most modern if end users are working within difficulty that system isnt operational but this system is not difficulty use. Cost effective ways and ensuring that the investment can be recovered and realize the benefits with allocated budget. The technology needed is available and can be integrated with the other systems of the organization. Deciding how the new system going to fit the current operational system and whether its operationally acceptable. Checking whether the new project is violating law both local and international Requirement analysis: Firstly we interview Hotel managing Director asked question about the current system what they want to include their system to computerize ..,.   Investigating forms and documents which are very useful to determine system data flows and transactions Identifying the outputs by investigating below reports, Hourly report Daily report Monthly report Yearly report Then Checking latest updated procedure manuals and user manuals To study user activities and to concentrate on how it is being handle. Interviewing and supervisor level users to gather opinions about the efficiency about the system, determine the needs of the users that to be in the new system, more specific details about the system. Producing and arranging online Questionnaires for all operational users who are going to use the system. By this can gather information from all the people who are going to have direct contact with the system. Planning formal observation sessions at 3 main hotels, specially the reception area And closely observing the activities performed by the users. And observing customer inquiries reservation process etc Studying a subset documents or subset of the activity in the area in order to get an impression of the whole activity or document set .it is useful to verify findings from interviews or the above discussed techniques. Requirement Specification: How the new computer system should be working this is a kind of the document which clearly specifies the requirement of the users. Use :- Entity Relationship Diagram (ERD)    Data Flow Diagram (DFD). Logical system specification:- This hotel computerize system   include several logical specification there are may be several technical option that could be adapted which are capable of delivering the requirement in this stage system analysis first design define what those technical options and then the help of manager select the most suitable option. Logical Design: This step we design a dialog design initial interface are design Update process that change on the line system data and Enquiry process concern the interaction of useful information from system data.(we should involve the hotel manager very strongly specially dialog design influence how to system looks and behave to its users) Physical Design: This step we design program design database design (ERD map into database components), this stage provides all the information required by the programmer. Coding: We use language is Visual Basic for coding.(First programmer code will be written in short pieces that outlines simple as well-defined program function.) Testing:- we tested correctness testing, performance testing ,reliability and recovery testing then security testing stress testing usability testing, unit and integration testing external function testing ,system testing, regression testing, acceptance testing, installation testing, completion testing, test documentation.(   discover and rectify errors below steps are planned to be done) Implementation:- This stage involve preparation of the target side and making the environment the network here the hotel new system to target environment will done and prepare in the user manual and training the hotel worker for the New system.| System will be installed shared in 4 computers which will be networked [LAN] (Configuration with I7 processors, 4 GB Ram..) With all required software. 2. Decide on appropriate task dependencies and state durations of them. Task Duration (1= 1 day)Reference Strategic study 1 A Business study 1   B Feasibility study 1 C Technical Feasibility2 Operational Feasibility1 Legal FeasibilityParallel with Op Feasibility(1) Economical Feasibility3 Requirement analysis D (Forms and documents)1 (Reports)1 (Procedureuser manuals)1 Interview-(Management level)3 Interview-(Supervisor level)3 (Questionnaires)1 (Observation)2 (Subset documentsactivity)1 Requirement specification 3 E Logical system specification 2F Logical design 10 G Physical design 20H Coding 5 I Testing J (Unit) 5 (Integrated) 1 (System)1 (User)2 DebuggingParallel with testing(8)K Implementation L (Installation)2 (User Training)2 (Parallel Running)7 MaintenanceContinues until phase out.M Total Duration81 -The explained tasks in task 1 are shortened and listed down above, under task name. -The Duration 1 is equals to 1 day. -Maintenance starts after implementing the project until phase out. -Total days for the project is 87-(81- planned days, and balances 6 days are to manage risks during the project period. (Table1.1) 3. Create an Activity Net work Diagram with respect to your identified tasks,AND must be given using a standard Tool such as MS Project or MS Visio Critical path- A   B C D E F G H I J   L MS Project Output (b)There are many elements in a typical project plan. One such element is the   Introduction which briefly describes the objectives of the project and the constraints, which affect project management. Prepare such introduction for this project using reasonable assumptions. List and explain with a sentence each other contents of a typical project plan. I am Nadeeshani and Im appointed as a project manager to develop this online hotel Management system for an international hotel chain by the triangle software house. The project is based on upgrading the existing system as an online system along with these main functions, Room reservations for guests The options to add other services like restaurant use, bar use, gym use, etc The system which has the ability to obtain inquires from the guests and the ability to give them an answer/feedback, for example for the customer queries like availability of rooms, reservations and guest list, etc. And to get all the above updates and inquiries from the parties and to maintain the records in the system We hope to start the project on 6Th of July 2010 and we were going to be finished in September 30th 2010 (3 month) period. On that project running period we are considering Saturdays Sundays as working days. We hope to finished this project 26Th of September 2010. The project has run 87 days but we are planning to be completed within 82 days rest 5 days we are planning to do collecting unanticipated problems complete the project report however we will make sure to complete this project in this 87 days period. This is the project plan how we are going to do the project. I hope the committee members will do their best to complete the project. The quality of the system will be maintained throughout the project by regular progress checking and progress monitoring. The project has been run through the 13 stages. Strategic study Business study Feasibility study Requirement analysis Requirement specification Logical system specification Logical design Physical design Coding, Testing Debugging Implementation Maintenance These stages are planned in a greater level of detail. (These plans are used to track progress on a week by week basis through regular progress monitoring.) These stages are also separated into sub tasks basically contains the lowest details. It will specify activities down to a daily level. This will be created in parallel with the above mentioned stage plans. And the monitoring and tracking will be on daily basis. As a project manager I hope we will be finished the project with less errors I believe you all are will be do your best. Clearly indicated whose responsible for what in the project, clearly shown what the project is to deliver, why and for whom and by making the project that can easily understand by everyone, mainly on time and within budget My motivation is to completely utilize my accumulated experience and knowledge to the fullest extent possible and making this projects a success. Task 2 (a) Explain what are your typical responsibilities as a Software Project   Manager in managing any type of software project and your typical tasks A software project manager has the overall responsibility for the successful initiation, planning, execution and closure of a project. A successful Project Manager must simultaneously manage the four basic elements of a project: resources, time, money, and most importantly, scope. All these elements are interrelated. Each must be managed effectively. All must be managed together if the project, and the project manager, is to be a success. Resources People, equipment, material Time Task durations, dependencies, critical path Money Costs, contingencies, profit Scope Project size, goals, requirements This title is used in the construction industry, architecture, information technology and many different occupations that are based on production of a product or service. The project manager must possess a combination of skills including an ability to ask penetrating questions, detect unstated assumptions and resolve interpersonal conflicts as well as more systematic management skills. The role of the project manager encompasses many activities including :-Planning and Defining Scope, Activity Planning and Sequencing, Resource Planning, Developing Schedules, Time Estimating, Cost Estimating, Developing a Budget, Controlling Quality, Managing Risks and Issues, Creating Charts and Schedules, Risk Analysis, Benefits Realization, Scalability, Interoperability and Portability Analysis,Documentation,Team Leadership, Strategic Influencing, Customer Liaison. As a software project manager my typical tasks in managing a software project will be below. Manage the production of the required product. Direct and motivate the project team. Plan and monitor the project. Manage business and project risks. Responsible for change control. Report the true progress report and stage assessment to the steering committee. Prepare the end project report. Responsible for project administration. Responsibility Matrix In a large project, there may be many people who have some role in the creation and approval of project deliverables. Sometimes this is pretty straightforward, such as one person writing a document and one person approving it. In other cases, there may be many people who have a hand in the creation, and others that need to have varying levels of approval. The Responsibility Matrix is a technique used to define the general responsibilities for each role on a project. The matrix can then be used to communicate the roles to the appropriate people associated with the team. This helps set expectations, and ensures people know what is expected from them. On the matrix, the different people, or roles, appear as columns, with the specific deliverables in question listed as rows. Then, use the intersecting points to describe each persons responsibility for each deliverable. Ex: (Table 2.1) A Approves the deliverable R Reviews the deliverable (and provides feedback). C Creates the deliverable (could be C (1) for primary, C (2) for backup). Usually there is only one person who is responsible for creating a deliverable, although many people may provide input. I Provides input N Is notified when a deliverable is complete M Manages the deliverables (such as a librarian, or person responsible for the document repository) In the table above, the Requirements Management Plan is created by the project manager, approved by the sponsor and client managers, and reviewed by the project team and analysts. The purpose of the matrix is to gain clarity and agreement on who does what, so you can define the columns with as much detail as makes sense. For instance, in the above example, the Project Team could have been broken into specific people or the person responsible for creating the Data Model could have been broken out into a separate column. After the matrix is completed, it should be circulated for approval. If it is done in the Project Charter process, it can be an addendum to the Project Charter. If it is created as a part of the initial Analysis Phase, it should be circulated as a separate document. Examples of responsibility codes are as follows. Our project may define different codes, as long as you explain what they mean so that people know what the expectations are for them. References http://www.lifecyclestep.com/open/407.0LifecycleRoles.htm (b) Briefly explain how you are going to manage the risk in the above project. Risk management is the process of analyzing exposure to risk and determining how to best handle such exposure. The project is planned to be a continuous process throughout the project until completion and considered in two main parts, the risk analysis part and the risk management part. I have planned to run risk management as below, At the start of the project, as a part of the decision of whether to undertake the project And at every end stage assessments Risk management includes the following activities Planning how risk management will be held in the particular project. Plan should include risk management tasks, responsibilities, activities and budget. Assigning risk officer a team member other than a project manager who is responsible for foreseeing potential project problems. Typical characteristic of risk officer is a healthy skepticism. Maintaining live project risk database. Each risk should have the following attributes: opening date, title, short description, probability and importance. Optionally risk can have assigned person responsible for its resolution and date till then risk still can be resolved. Creating anonymous risk reporting channel. Each team member should have possibility to report risk that he foresees in the project. Preparing mitigation plans for risks that are chosen to be mitigated. The purpose of the mitigation plan is to describe how this particular risk will be handled what, when, by who and how will be done to avoid it or minimize consequences if it becomes a liability. Summarizing planned and faced risks, effectiveness of mitigation activities and effort spend for the risk management. As an analyzing tool to assist in the risk management process, Decision tree is used to analyze the risks, Because the explanation for the result is easily described by simple graph in a simply understandable way which can be combined with other decision techniques as well. Important details can be generated based on its alternatives, probabilities, costs and their preferences for outcomes. First after analyzing the possible risks by identifying, Estimating the effectiveness by comparing the likelihood with the impact of a risk and finally evaluating by confirming that they are in correct sequence and the cross checking with the risk reduction options assessing the acceptable level of each other. We select the most suitable risk management approach for each risk and a detailed plan of action which confirms its goals will be prepared by discussing with members. The risk management consist four main activities and below tasks will be completed at the end of each part. Planning-: Most appropriate selection will be selected for each risk and a detailed plan of action which confirms its desirability and objectives will be developed. Sometimes this activity may proceed in parallel with risk evaluation.  §Resourcing-: This will identify and assign the necessary resources to do the work and will confirm that the revised plan is feasible and cost effective.  §Controlling-: This will make sure that the execution of the plan is having the desired effect on the risk. This will ensure the management of the risk process will apply effectively and it will modify the plan where it necessary.  §Monitoring-: This will check the stages of the risk and also check that the counted measures are happening effectively. During monitoring, if it feels that the risk management plan is ineffective, then we can go back to the risk analysis part. When managing the risks these below features will be considered mainly, Factors that need to continue correctly, threats, systemic risks for the successful delivery project and benefits, risks to the business, risks for the customers and suppliers, risks of unexpected outputs and success of the international hotel chain. This is how I have planned to manage the risk, which can happen during a process and which will effect with a negative result to the process in the project. Task 3 Configuration Management is an essential part of a project. In a large project Configuration librarian plays a major role. Configuration management (CM) is the detailed recording and updating of information that describes an enterprises hardware and software. Such information typically includes the versions and updates that have been applied to installed software packages and the locations and network addresses of hardware devices. Special configuration management software is available. When a system needs hardware or software upgrade, a computer technician can accesses the configuration management program and database to see what is currently installed. The technician can then make a more informed decision about the upgrade needed. An advantage of a configuration management application is that the entire collection of systems can be reviewed to make sure any changes made to one system do not adversely affect any of the other systems Configuration management is also used in software development, where it is called Unified Configuration Management (UCM). Using UCM, developers can keep track of the source code, documentation, problems, changes requested, and changes made. (a) Briefly out line some configuration items in the project given in the scenario. Manage the configuration: Hotel Management systemPlan what is required and how it will be achieved Guests: Room Reservations for guests Services: Adding other services use, restaurant use, bar use by guests Maintenance: To maintain records in the system Inquires: To know about availability of rooms, reservations, gust lists Four computers have to be supplied for the selected project and these computers needs to be networked. Required time schedule for the project is three months. (Use a Configuration Management Plan (Project Quality Plan) Identify components of the final product Use Defining and Analyzing Products (PL2) to create a Configuration Item Record Use unique identifiers for each product and each version: Project Product Type Product Name Product Version. Control changes to baseline products by using change authority Submit products to the Configuration Librarian to put under configuration control Release (issue) products and/or copiesS Product Status Account to record and report product information Report the status of products from the Configuration Librarian Verify product integrity Perform product configuration audits by the Configuration Librarian Perform project audits by Project Assurance. In the above hotel management system developing project at each stage end as an output as below final deliverables will be reported. 1st stage -Strategic study -information technology strategy will be produced. 2nd stage Business study -project initiation document. 3th stage Feasibility study- Feasibility report. 4th stage -Requirement analysis- the gathered exact requirements of the users to develop  Ã‚  Ã‚   the system will be produced as Requirement analysis report 5th stage -Requirement specifications-the requirements will be produced in a diagrammatic way and a wordy report. 6th stage Logical system specification -the mapped business and technical aspects of the system will be produced. 7th stage Logical design- interface design will be produced. 8th stage -Physical design -the database design and program design using miniature specifications like pseudo codes, flowcharts, structure diagrams, etc will be produced. 9th stage -Coding- the written program which is written with a programming language will be produced. 10th stage -Testing -testing report. 11th stage -Debugging-debugging report. 12th stage -Implementation- the released version of the system in the target environment. 13th stage -Maintenance-reports regarding the changes carried out throughout the system after the implementation. (b) Give a statement of the configuration librarians responsibilities. Configuration Librarian is the guardian of all the master copies of the projects products.   Ã‚   The role will be also to look after change control on behalf of the project manager. Purpose   : Custodian and guardian of all master copies of the projects products Receives, baselines and releases (issues) products Updates the product status and informs the Project Manager Maintains the Issue Log. The major tasks of the configuration librarian are summarized as follows:- To control the receipt, identification, storage and issues of all project products To provide information on the status of all products To number, record, store and distribute change control documents The specific responsibilities of the configuration librarian are as follows:- Assist the project manager to prepare the configuration management plan Create libraries at other storage areas to hold products Assist in the identification of products Create configuration item description records Hold the master copies of all project products Maintain the change control records Assist in conducting configuration audits Liaise with other configuration librarians where products required by the project are common to other systems (c) Briefly outline what are the things that we must consider in change control of Project Management. In this hotel management system development, will develop several documents that include all the importance issues regarding to   the development but sometime these document may need to be changed due to various reasons, when doing this changers it has to be done by stranded procedures its called ChangeControl . The change control document is the formal way into this projects any enquiry of a complaint or request, it can be raised by anyone associated with hotel project about anything such as:- A new function occurrence A frailer of a product In meeting some aspect of the user requirement Because of a possible misunderstand A problem with the planning A frailer of communication The change control mainly it has recharge control document such as:- Question document (when a question occurs about a change) It will be submitted to the configuration library and the configuration librar E-Commerce in Fashion E-Commerce in Fashion Background E-commerce is in fashion so many companies of all sizes and types are reviewing their sales strategies.   Consideration is being given to either (or both) selling to other businesses electronically (B2B) or selling directly to individual customers over the Internet (B2C).   Many companies are failing to live up to expectations, with problems such as poor website design making ordering difficult, website failure (crashes) from overload or because they were incomplete, failure to confirm the order, subsequent out-of-stock, failure to deliver on time. The Project Brief You, as the project manager, are to plan a project for a Triangle software house to develop an online Hotel Management system for an international hotel chain.   The project is scheduled to start on6thof July 2010. The project should have the following options Guests: Room Reservations for guests Services: Adding other services use, restaurant use, bar use by guests Maintenance: To maintain records in the system Inquires: To know about availability of rooms, reservations, gust lists Four computers have to be supplied for the selected project and these computers needs to be networked. Required time schedule for the project is three months. From the Project Managers point of view, an e-commerce project is no different from any other project.   You need a framework to plan resources and budget; you must set the plan against an appropriate calendar; and you need to ensure that you include the managerial and quality-related tasks that will help the project manager succeed. You need to plan how the project should be initiated.   However, your initiation plan should be presented in sufficient detail for someone else to manage it.   You are not expected to have all the answers at this stage; part of the skill of project planning is to ensure that you put the tasks in place to find out what is unknown and to manage the obvious risks. Task 1 (a) As the Project Manager, you are expected to decide on the following: 1. The tasks required to carry out the project aim for at least 10-15 tasks.   Traditional File System (SDLC-System Development Life Cycle) Strategic Study Business study Feasibility study Requirement analysis Requirement Specification Logical system specification Logical Design Physical Design Coding Testing Implementation Maintenance Paste out Relate Traditional File System steps to Hotel management system Case Study. We use Traditional File System for Hotel management systemto develop their system. Strategic study: Project Manager goes to the Hotel study the current system; after he understood what the system that they need to develop is what they technology must use to develop the hotel. Business study:- Project Manager prepare a document project initiation document this will give the general   definition for the developing system   that document shown to the hotel managing director we get the approval to proceed the development the new system. Feasibility study: These step uses to traditional file system how to feasible for hotel computerizes Economical, Technical Operational, even the developing system is most modern if end users are working within difficulty that system isnt operational but this system is not difficulty use. Cost effective ways and ensuring that the investment can be recovered and realize the benefits with allocated budget. The technology needed is available and can be integrated with the other systems of the organization. Deciding how the new system going to fit the current operational system and whether its operationally acceptable. Checking whether the new project is violating law both local and international Requirement analysis: Firstly we interview Hotel managing Director asked question about the current system what they want to include their system to computerize ..,.   Investigating forms and documents which are very useful to determine system data flows and transactions Identifying the outputs by investigating below reports, Hourly report Daily report Monthly report Yearly report Then Checking latest updated procedure manuals and user manuals To study user activities and to concentrate on how it is being handle. Interviewing and supervisor level users to gather opinions about the efficiency about the system, determine the needs of the users that to be in the new system, more specific details about the system. Producing and arranging online Questionnaires for all operational users who are going to use the system. By this can gather information from all the people who are going to have direct contact with the system. Planning formal observation sessions at 3 main hotels, specially the reception area And closely observing the activities performed by the users. And observing customer inquiries reservation process etc Studying a subset documents or subset of the activity in the area in order to get an impression of the whole activity or document set .it is useful to verify findings from interviews or the above discussed techniques. Requirement Specification: How the new computer system should be working this is a kind of the document which clearly specifies the requirement of the users. Use :- Entity Relationship Diagram (ERD)    Data Flow Diagram (DFD). Logical system specification:- This hotel computerize system   include several logical specification there are may be several technical option that could be adapted which are capable of delivering the requirement in this stage system analysis first design define what those technical options and then the help of manager select the most suitable option. Logical Design: This step we design a dialog design initial interface are design Update process that change on the line system data and Enquiry process concern the interaction of useful information from system data.(we should involve the hotel manager very strongly specially dialog design influence how to system looks and behave to its users) Physical Design: This step we design program design database design (ERD map into database components), this stage provides all the information required by the programmer. Coding: We use language is Visual Basic for coding.(First programmer code will be written in short pieces that outlines simple as well-defined program function.) Testing:- we tested correctness testing, performance testing ,reliability and recovery testing then security testing stress testing usability testing, unit and integration testing external function testing ,system testing, regression testing, acceptance testing, installation testing, completion testing, test documentation.(   discover and rectify errors below steps are planned to be done) Implementation:- This stage involve preparation of the target side and making the environment the network here the hotel new system to target environment will done and prepare in the user manual and training the hotel worker for the New system.| System will be installed shared in 4 computers which will be networked [LAN] (Configuration with I7 processors, 4 GB Ram..) With all required software. 2. Decide on appropriate task dependencies and state durations of them. Task Duration (1= 1 day)Reference Strategic study 1 A Business study 1   B Feasibility study 1 C Technical Feasibility2 Operational Feasibility1 Legal FeasibilityParallel with Op Feasibility(1) Economical Feasibility3 Requirement analysis D (Forms and documents)1 (Reports)1 (Procedureuser manuals)1 Interview-(Management level)3 Interview-(Supervisor level)3 (Questionnaires)1 (Observation)2 (Subset documentsactivity)1 Requirement specification 3 E Logical system specification 2F Logical design 10 G Physical design 20H Coding 5 I Testing J (Unit) 5 (Integrated) 1 (System)1 (User)2 DebuggingParallel with testing(8)K Implementation L (Installation)2 (User Training)2 (Parallel Running)7 MaintenanceContinues until phase out.M Total Duration81 -The explained tasks in task 1 are shortened and listed down above, under task name. -The Duration 1 is equals to 1 day. -Maintenance starts after implementing the project until phase out. -Total days for the project is 87-(81- planned days, and balances 6 days are to manage risks during the project period. (Table1.1) 3. Create an Activity Net work Diagram with respect to your identified tasks,AND must be given using a standard Tool such as MS Project or MS Visio Critical path- A   B C D E F G H I J   L MS Project Output (b)There are many elements in a typical project plan. One such element is the   Introduction which briefly describes the objectives of the project and the constraints, which affect project management. Prepare such introduction for this project using reasonable assumptions. List and explain with a sentence each other contents of a typical project plan. I am Nadeeshani and Im appointed as a project manager to develop this online hotel Management system for an international hotel chain by the triangle software house. The project is based on upgrading the existing system as an online system along with these main functions, Room reservations for guests The options to add other services like restaurant use, bar use, gym use, etc The system which has the ability to obtain inquires from the guests and the ability to give them an answer/feedback, for example for the customer queries like availability of rooms, reservations and guest list, etc. And to get all the above updates and inquiries from the parties and to maintain the records in the system We hope to start the project on 6Th of July 2010 and we were going to be finished in September 30th 2010 (3 month) period. On that project running period we are considering Saturdays Sundays as working days. We hope to finished this project 26Th of September 2010. The project has run 87 days but we are planning to be completed within 82 days rest 5 days we are planning to do collecting unanticipated problems complete the project report however we will make sure to complete this project in this 87 days period. This is the project plan how we are going to do the project. I hope the committee members will do their best to complete the project. The quality of the system will be maintained throughout the project by regular progress checking and progress monitoring. The project has been run through the 13 stages. Strategic study Business study Feasibility study Requirement analysis Requirement specification Logical system specification Logical design Physical design Coding, Testing Debugging Implementation Maintenance These stages are planned in a greater level of detail. (These plans are used to track progress on a week by week basis through regular progress monitoring.) These stages are also separated into sub tasks basically contains the lowest details. It will specify activities down to a daily level. This will be created in parallel with the above mentioned stage plans. And the monitoring and tracking will be on daily basis. As a project manager I hope we will be finished the project with less errors I believe you all are will be do your best. Clearly indicated whose responsible for what in the project, clearly shown what the project is to deliver, why and for whom and by making the project that can easily understand by everyone, mainly on time and within budget My motivation is to completely utilize my accumulated experience and knowledge to the fullest extent possible and making this projects a success. Task 2 (a) Explain what are your typical responsibilities as a Software Project   Manager in managing any type of software project and your typical tasks A software project manager has the overall responsibility for the successful initiation, planning, execution and closure of a project. A successful Project Manager must simultaneously manage the four basic elements of a project: resources, time, money, and most importantly, scope. All these elements are interrelated. Each must be managed effectively. All must be managed together if the project, and the project manager, is to be a success. Resources People, equipment, material Time Task durations, dependencies, critical path Money Costs, contingencies, profit Scope Project size, goals, requirements This title is used in the construction industry, architecture, information technology and many different occupations that are based on production of a product or service. The project manager must possess a combination of skills including an ability to ask penetrating questions, detect unstated assumptions and resolve interpersonal conflicts as well as more systematic management skills. The role of the project manager encompasses many activities including :-Planning and Defining Scope, Activity Planning and Sequencing, Resource Planning, Developing Schedules, Time Estimating, Cost Estimating, Developing a Budget, Controlling Quality, Managing Risks and Issues, Creating Charts and Schedules, Risk Analysis, Benefits Realization, Scalability, Interoperability and Portability Analysis,Documentation,Team Leadership, Strategic Influencing, Customer Liaison. As a software project manager my typical tasks in managing a software project will be below. Manage the production of the required product. Direct and motivate the project team. Plan and monitor the project. Manage business and project risks. Responsible for change control. Report the true progress report and stage assessment to the steering committee. Prepare the end project report. Responsible for project administration. Responsibility Matrix In a large project, there may be many people who have some role in the creation and approval of project deliverables. Sometimes this is pretty straightforward, such as one person writing a document and one person approving it. In other cases, there may be many people who have a hand in the creation, and others that need to have varying levels of approval. The Responsibility Matrix is a technique used to define the general responsibilities for each role on a project. The matrix can then be used to communicate the roles to the appropriate people associated with the team. This helps set expectations, and ensures people know what is expected from them. On the matrix, the different people, or roles, appear as columns, with the specific deliverables in question listed as rows. Then, use the intersecting points to describe each persons responsibility for each deliverable. Ex: (Table 2.1) A Approves the deliverable R Reviews the deliverable (and provides feedback). C Creates the deliverable (could be C (1) for primary, C (2) for backup). Usually there is only one person who is responsible for creating a deliverable, although many people may provide input. I Provides input N Is notified when a deliverable is complete M Manages the deliverables (such as a librarian, or person responsible for the document repository) In the table above, the Requirements Management Plan is created by the project manager, approved by the sponsor and client managers, and reviewed by the project team and analysts. The purpose of the matrix is to gain clarity and agreement on who does what, so you can define the columns with as much detail as makes sense. For instance, in the above example, the Project Team could have been broken into specific people or the person responsible for creating the Data Model could have been broken out into a separate column. After the matrix is completed, it should be circulated for approval. If it is done in the Project Charter process, it can be an addendum to the Project Charter. If it is created as a part of the initial Analysis Phase, it should be circulated as a separate document. Examples of responsibility codes are as follows. Our project may define different codes, as long as you explain what they mean so that people know what the expectations are for them. References http://www.lifecyclestep.com/open/407.0LifecycleRoles.htm (b) Briefly explain how you are going to manage the risk in the above project. Risk management is the process of analyzing exposure to risk and determining how to best handle such exposure. The project is planned to be a continuous process throughout the project until completion and considered in two main parts, the risk analysis part and the risk management part. I have planned to run risk management as below, At the start of the project, as a part of the decision of whether to undertake the project And at every end stage assessments Risk management includes the following activities Planning how risk management will be held in the particular project. Plan should include risk management tasks, responsibilities, activities and budget. Assigning risk officer a team member other than a project manager who is responsible for foreseeing potential project problems. Typical characteristic of risk officer is a healthy skepticism. Maintaining live project risk database. Each risk should have the following attributes: opening date, title, short description, probability and importance. Optionally risk can have assigned person responsible for its resolution and date till then risk still can be resolved. Creating anonymous risk reporting channel. Each team member should have possibility to report risk that he foresees in the project. Preparing mitigation plans for risks that are chosen to be mitigated. The purpose of the mitigation plan is to describe how this particular risk will be handled what, when, by who and how will be done to avoid it or minimize consequences if it becomes a liability. Summarizing planned and faced risks, effectiveness of mitigation activities and effort spend for the risk management. As an analyzing tool to assist in the risk management process, Decision tree is used to analyze the risks, Because the explanation for the result is easily described by simple graph in a simply understandable way which can be combined with other decision techniques as well. Important details can be generated based on its alternatives, probabilities, costs and their preferences for outcomes. First after analyzing the possible risks by identifying, Estimating the effectiveness by comparing the likelihood with the impact of a risk and finally evaluating by confirming that they are in correct sequence and the cross checking with the risk reduction options assessing the acceptable level of each other. We select the most suitable risk management approach for each risk and a detailed plan of action which confirms its goals will be prepared by discussing with members. The risk management consist four main activities and below tasks will be completed at the end of each part. Planning-: Most appropriate selection will be selected for each risk and a detailed plan of action which confirms its desirability and objectives will be developed. Sometimes this activity may proceed in parallel with risk evaluation.  §Resourcing-: This will identify and assign the necessary resources to do the work and will confirm that the revised plan is feasible and cost effective.  §Controlling-: This will make sure that the execution of the plan is having the desired effect on the risk. This will ensure the management of the risk process will apply effectively and it will modify the plan where it necessary.  §Monitoring-: This will check the stages of the risk and also check that the counted measures are happening effectively. During monitoring, if it feels that the risk management plan is ineffective, then we can go back to the risk analysis part. When managing the risks these below features will be considered mainly, Factors that need to continue correctly, threats, systemic risks for the successful delivery project and benefits, risks to the business, risks for the customers and suppliers, risks of unexpected outputs and success of the international hotel chain. This is how I have planned to manage the risk, which can happen during a process and which will effect with a negative result to the process in the project. Task 3 Configuration Management is an essential part of a project. In a large project Configuration librarian plays a major role. Configuration management (CM) is the detailed recording and updating of information that describes an enterprises hardware and software. Such information typically includes the versions and updates that have been applied to installed software packages and the locations and network addresses of hardware devices. Special configuration management software is available. When a system needs hardware or software upgrade, a computer technician can accesses the configuration management program and database to see what is currently installed. The technician can then make a more informed decision about the upgrade needed. An advantage of a configuration management application is that the entire collection of systems can be reviewed to make sure any changes made to one system do not adversely affect any of the other systems Configuration management is also used in software development, where it is called Unified Configuration Management (UCM). Using UCM, developers can keep track of the source code, documentation, problems, changes requested, and changes made. (a) Briefly out line some configuration items in the project given in the scenario. Manage the configuration: Hotel Management systemPlan what is required and how it will be achieved Guests: Room Reservations for guests Services: Adding other services use, restaurant use, bar use by guests Maintenance: To maintain records in the system Inquires: To know about availability of rooms, reservations, gust lists Four computers have to be supplied for the selected project and these computers needs to be networked. Required time schedule for the project is three months. (Use a Configuration Management Plan (Project Quality Plan) Identify components of the final product Use Defining and Analyzing Products (PL2) to create a Configuration Item Record Use unique identifiers for each product and each version: Project Product Type Product Name Product Version. Control changes to baseline products by using change authority Submit products to the Configuration Librarian to put under configuration control Release (issue) products and/or copiesS Product Status Account to record and report product information Report the status of products from the Configuration Librarian Verify product integrity Perform product configuration audits by the Configuration Librarian Perform project audits by Project Assurance. In the above hotel management system developing project at each stage end as an output as below final deliverables will be reported. 1st stage -Strategic study -information technology strategy will be produced. 2nd stage Business study -project initiation document. 3th stage Feasibility study- Feasibility report. 4th stage -Requirement analysis- the gathered exact requirements of the users to develop  Ã‚  Ã‚   the system will be produced as Requirement analysis report 5th stage -Requirement specifications-the requirements will be produced in a diagrammatic way and a wordy report. 6th stage Logical system specification -the mapped business and technical aspects of the system will be produced. 7th stage Logical design- interface design will be produced. 8th stage -Physical design -the database design and program design using miniature specifications like pseudo codes, flowcharts, structure diagrams, etc will be produced. 9th stage -Coding- the written program which is written with a programming language will be produced. 10th stage -Testing -testing report. 11th stage -Debugging-debugging report. 12th stage -Implementation- the released version of the system in the target environment. 13th stage -Maintenance-reports regarding the changes carried out throughout the system after the implementation. (b) Give a statement of the configuration librarians responsibilities. Configuration Librarian is the guardian of all the master copies of the projects products.   Ã‚   The role will be also to look after change control on behalf of the project manager. Purpose   : Custodian and guardian of all master copies of the projects products Receives, baselines and releases (issues) products Updates the product status and informs the Project Manager Maintains the Issue Log. The major tasks of the configuration librarian are summarized as follows:- To control the receipt, identification, storage and issues of all project products To provide information on the status of all products To number, record, store and distribute change control documents The specific responsibilities of the configuration librarian are as follows:- Assist the project manager to prepare the configuration management plan Create libraries at other storage areas to hold products Assist in the identification of products Create configuration item description records Hold the master copies of all project products Maintain the change control records Assist in conducting configuration audits Liaise with other configuration librarians where products required by the project are common to other systems (c) Briefly outline what are the things that we must consider in change control of Project Management. In this hotel management system development, will develop several documents that include all the importance issues regarding to   the development but sometime these document may need to be changed due to various reasons, when doing this changers it has to be done by stranded procedures its called ChangeControl . The change control document is the formal way into this projects any enquiry of a complaint or request, it can be raised by anyone associated with hotel project about anything such as:- A new function occurrence A frailer of a product In meeting some aspect of the user requirement Because of a possible misunderstand A problem with the planning A frailer of communication The change control mainly it has recharge control document such as:- Question document (when a question occurs about a change) It will be submitted to the configuration library and the configuration librar

Sunday, January 19, 2020

Essay --

Title: character list Dr. Henry Jekyll- Is a well reputed and respected doctor. He is a wealthy man that was also born into a fortune. He had a good life growing up and is a kind man that has never done anything bad in his entire life until the creation of Hyde. He is well set and known in the community. Has a dark side that’s burning to be set free. As a result he creates a potion that separates one body into two people and personalities. Used to unleash his dark side which ultimately takes over in the end. He is friends with Lanyon a doctor, as well as Utterson a lawyer. Mr. Edward Hyde- Was not born, but created. Was the result of a potion Dr. Jekyll created that gives one’s self a second personality where the body strips away your civilized nature , brings you down to... (only first 800 chars shown) Analysis complete. Our feedback is listed below in printable form. Some of the items have been truncated or removed to provide better print compatibility. Title Checker Review Title Looks like we may have found a problem with your paper's title: †¢The first word of the title should be capitalized. †¢The last word of the title should be capitalized. Spelling Spelling Suggestions †¢Spelling: side thats [suggestions: that, that's, that s, tats, teats] Grammar Grammar Suggestions †¢Revise...: wealthy man that [suggestions: man who] †¢Revise...: kind man that [suggestions: man who] †¢Missing apostrophe: side thats [suggestions: that's] †¢Missing Article: loose all of Jekylls [suggestions: all of the Jekylls] †¢Missing apostrophe: that wouldnt [suggestions: wouldn't] †¢Did you mean...: that its the [suggestions: it's the] Word Choice Bad Phrase Score Bad Phrase Score*: 2.244 (lower is better) *based on the number and qualit... ...eater usage of vocabulary words. Although your vocabulary score is within the average range for most writers, boosting it above 60 will help your paper stand out. Consider using the Vocab Builder. Tips Whether you are writing for a school assignment or professionally, it is imperative that you have a vocabulary that will provide for clear communication of your ideas and thoughts. You need to know the type and level of your audience and adjust your vocabulary accordingly. It is worthwhile to constantly work at improving your knowledge of words. To help with this task, please consider using our Vocabulary Builder to improve your comprehension and usage of words. Grade Incompatible Paper Type The Auto-Grading feature is only compatible with certain types of submissions (e.g., Essays, Research Papers, etc.), yet the paper type listed for this submission is Other

Saturday, January 11, 2020

Nestle CSR Essay

Corporate Social Responsibility is about how companies manage the business processes to produce an overall positive impact on society. Also you could say that it is a company’s sense of responsibility towards the community and environment in which it operates. Nestlà © believes that for a company to be successful in the long term and create value for its shareholders, it must also create value for society. At Nestlà © this begins with the creation of superior long term value for shareholders by offering products and services that help people improve their nutrition, health and wellness. This is what they call Creating Shared Value. Creating shared value begins with the understanding that for Nestlà © to succeed over the long term, the communities we serve must also be succeeded. It explains how businesses can create competitive advantage, which in turn will deliver better returns for shareholders, through actions that substantially address a social or environmental challenge. Nestlà © focuses on six point, which are the following: -nutrition. – CSV, water. – Rural development. – environment. – sourcing. And human rights. Now we will explain these six points. Starting with nutrition: Nestlà © plays an important role in offering the right kind of products and helping consumers make the right nutritional choices. The second is CSV- Water. A global water crisis is threatening food security because two-third of all fresh water is used in agriculture. With demand for water to set rise by 50 % by 2030, water scarity is a likely scenario for billions of people. Nestlà © is determined to help in addressing this crisis. Rural development. As a global population increases and continues to shift to urban areas, the challenge of producing sufficient agricultural raw materials is becoming ever more difficult. This is why nestle is working hard to ensure they source raw materials in a responsible and sustainable way. (farmers, workers, com munities) Environment: Nestlà © is helping to protect the environment and scarce resources, now and for future generations.

Friday, January 3, 2020

Chinese Foreign Trade Relations Intellectual Property...

Improving Chinese Foreign Trade Relations: Intellectual Property Enforcement Context I. Introduction American businesses are losing up to an estimated $60 billion each year in the global market from intellectual property violations. The problem continues to grow as more American companies invest overseas, and more products consist of intangible or intellectual property. American companies face more than just economic challenges: if losses of intellectual property rights continue to go unchecked, businesses may choose not to make foreign investments, customers may be injured, and innovation discouraged. One of the biggest challenges for many North American companies is protecting their business or trade secrets. When such companies invest abroad, they often forge relationships such as joint ventures or partnerships with foreign companies. In these relationships, the American company generally provides the technology or â€Å"know-how† needed for the venture. Providing the â€Å"know-how† creates risk for the American company because it reveals its s ecrets at the outset of the relationship while the foreign partner must share only the business profits later on. When the business relationship works, the secret is safe. However, when the relationship fails, the secret may well be lost. The common saying that a trade secret once lost is lost forever is especially true in international violations. Damages and injunctions often are not adequate to recover the lost opportunityShow MoreRelatedIntellectual Property Rights On Sino Us Economic And Trade Relations3447 Words   |  14 Pagesundergone three intense intellectual property disputes, each to the brink of a trade war. Intellectual property issues in Sino-US economic and trade relations in the 1990s to become one of the major outstanding issues. With the signing of the Sino-US memorandum of understanding on the protection of intellectual property rights in 1992, and the signing of two bilateral intellectual property agreements in February 1995, and June 1996, China and the U S intellectual property disputes have been easedRead MoreThe Origins and Context of Ethical and Cultural Considerations for Doing Business in China2537 Words   |  11 PagesIntroduction In an effort to develop a better understanding of the lessons learned for a recent trade delegation visit to the People’s Republic of China(PRC), this briefing note will build on the salient points of the ethical and cultural considerations required before undertaking business ventures in the PRC. First, through a closer look at some aspects of the origins of the Chinese cultural and ethical business context one may develop an appropriate frame of reference for the present discussion. Then,Read MoreBarack Obama Legacy : President Of The United States1590 Words   |  7 Pagesdeficit, his normalisation of relations with Iran and Cuba as well as his implementation of ‘Obamacare’: all of which have occurred within the context of an increasingly obstructionist Republican led Congress. Rather strikingly, such discussions have failed to discuss Obama’s trade record; in January 2015 The New York Magazine asked 53 Historians their opinions on the Obama legacy and the word ‘trade’ is not mentioned once (New York Magazine, January 2015). This absence of trade policy within discussionsRead MoreImpact Of Trade Policies On Trade Patterns Between Usa And China2160 Words   |  9 PagesThe impact of trade policies on the trade patterns between USA and China and the analysis of China’s manufacturing sector of IT products vis-a-vis consumption sector of the US. Abstract Introduction The following paper coherently illustrates the trade patterns of USA and China and describes the various trade policies developed over the past years that have impacted the respective economies of both countries alongside the effect of the same on the bilateral trade relations between the two. BasedRead MoreDifference Between Private and Public International Law4183 Words   |  17 Pagesbetween public international law, concerned with the rights and obligations of states with respect to other states and individuals, and private international law, concerned with issues of jurisdiction, applicable law and the recognition and enforcement of foreign judgments in international private law disputes before national courts. Private international law is viewed as national law, which is and ought to be focused on resolving individual private disputes based on domestic conceptions of justiceRead MoreThe Political Economy of International Trade7141 Words   |  29 PagesThe Political Economy of International Trade Chapter Outline OPENING CASE: Why Are Global Food Prices Soaring? INTRODUCTION INSTRUMENTS OF TRADE POLICY Tariffs Subsides Country Focus: Subsidized Wheat Production in Japan Import Quotas and Voluntary Export Restraints Local Content Requirements Administrative Polices Antidumping Policies Management Focus: U.S. Magnesium Seeks Protection THE CASE FOR GOVERNMENT INTERVENTION Read More FDI in Real Estate of India and China Essay4411 Words   |  18 Pagesinvestment made by a foreign individual or company in productive capacity of another country for example, the purchase or construction of a factory. FDI also refers to the purchase of a controlling interest in existing operations and businesses (known as mergers and acquisitions). Multinational firms seeking to tap natural resources, access lucrative or emerging markets, and keep production costs down by accessing low-wage labour pools in developing countries are FDI investors. Foreign direct investmentRead MorePolitical Risk Management and Insurance: A Contextual Comparison12751 Words   |  51 PagesPolitical Risk Management and Insurance: A Contextual Comparison [Authors Name] [Institutions Name] Abstract This dissertations presents concept of political risk in the context of Efficient Market Theory (Hypothesis) and State capitalism. The paper explores the link between the three ways of insuring political risk to economic theories. Using case study of a multinational firm the political regime and its effect has been explored on business situations and how it can be managed. PoliticalRead MoreMaster plan for the development of Vietname s motorcycle industry in the period of 2006-2015 with a vision to 202026479 Words   |  106 Pages45 I.5. Value chain of motorcycle industry in Vietnam 47 II. Current situation of supporting industries and industrial human 50 resources for motorcycle industry II.1. Supporting industries 50 II.2. Industrial human resources 53 III. Intellectual property rights in motorcycle industry 54 IV. Overall evaluation about the motorcycle industry of Vietnam and 56 development orientation IV.1. General achievements 56 IV.2. Shortcomings in motorcycle industry 56 IV.3. Development trends 59 1Read MoreAdvantages and Disadvantages of Fdi in China and India7958 Words   |  32 PagesProfessor, Business Administration Discipline, Khulna University Khulna 9208, Bangladesh Tel: 880-1911-451-044 Received: February 25, 2012 doi:10.5539/ibr.v5n5p164 Abstract This study was directed towards detecting the positive and negative sides for the foreign investors while they go for direct investment in India and China. A descriptive and explorative research study has been carried out for investigating the current proposition of the concerned case of FDI in those two countries. Advantages of investing