StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer Sciences and Information Technology - Case Study Example

Cite this document
Summary
SUH Risk Analysis Name Institution SUH Risk Analysis Brief Description of Proposed IT Solution as it relates to the Case Study: Proposed IT Solution The SUH’s proposed IT solution involves the implementation of the EpicorVista software. This software has been associated with large profit margins with the best example being its application at CarbonTech…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER99% of users find it useful
Computer Sciences and Information Technology
Read Text Preview

Extract of sample "Computer Sciences and Information Technology"

SUH Risk Analysis SUH Risk Analysis Brief of Proposed IT Solution as it relates to the Case Study: Proposed IT Solution The SUH’s proposed IT solution involves the implementation of the EpicorVista software. This software has been associated with large profit margins with the best example being its application at CarbonTech. However, the software is regarded as a small operation but this can be expanded to make it applicable in the entire organization. The management of the organization is not pleased with the ongoing support levels it is receiving from the Microsoft Dynamics GP ERP system usage and its IT operations across its branches as they have all proved to be cost ineffective.

The introduction of EpicorVista software would serve as a solution to the unusual formatted or differentiated information problems. This is possible as the software is in a position to format such information in several ways and do this according to the specified organization needs (Indian Health Service, 2007). The process will remain independent of the quarterly consolidated reports production that is currently a major problem. The formatting will cut down on the manpower and time that is currently needed to consolidate financial information.

In addition, this inventory system will help the organization to standardize the acquiring materials procedures and the purchase of documents. Risk Matrix (Indian Health Service, 2007). Area of Risk Description Probability of Occurrence Impact of Occurrence Strategy for Mitigation 1. Strategic SUH has managed to have a good reputation following its sales representation across the region as well as its community network contacts that is extensive High high SUH offers a number of products that are used to support both international and domestic efforts on disaster relief 2.

Business Following the many challenges facing SUH as well as the opportunities before it, it has put together three companies to form a single integrated enterprise Medium Medium Improve its manufacturing, supply service and sales support as well as its corporate financial management. 3. Feasibility SUH enjoys a historical root of success in its regional sales thus this trend is expected to continue in future even after the introduction of this new solution Low Low The company to establish itself as a customer base concentrating in rental options more than purchase options 4.

Capability to Manage Investment The company wants to integrate its product line as well as its inventory managements High Medium The role of managing this investment being divided among the three companies 5. Organization and Change Management Both organization and change management normally lead to downsizing and this is viewed as being necessary following successful integration High Medium The desired change should not be in such a way that it is thrust upon the companies but have it carefully discussed and negotiated 6.

Dependencies and Interoperability All the three companies have their challenges thus need each other; SUH is unprofitable and poor financially, Carbon Tech does not earn enough money and MyRentals runs on operations that are localized Low Low Coming up with a centralized executive management that will help alleviate all the challenges the three companies are facing by putting together their opportunities and resources. 7. Security Users of the system who are authorized should have access to the system and such use has to be limited to specified responsibilities Medium Medium Authentication together with authorization 8.

Privacy Internet firewalls in the system prevent external access that is not authorized while intranet firewalls prevent unauthorized internal access. Low Medium Authorization and Authentication 9. Project Resources The project will depend on the enterprise-wide implementations from its manufacturing and sales. Medium Low Combining the resources from the three companies 10. Schedule In order to be successful, the system should be scheduled in such a way that its finances and other information be arranged as the format requires Low Low Each unit in the business will have to make use of a report format which best meets its needs. 11. Initial Cost SUH has involved the three areas of concern and has a system in place which facilitates the effective and efficient business operations Medium Low Reducing the company’s operation costs 12.

Life Cycle Cost SUH uses approximately $ 10K every year on consultants in an effort to support legacy visual version Low Low A well established inventory management that will reduce the holding costs 13. Technical Obsolescence The technical components included in the system to make it efficient include, software, hardware, network and data High Low Ensure that all this components are included in the system’s processes such as processing, output, input, control and storage 14. Technology Environment All the three companies are experiencing technological problems that have results to the challenges they are facing Low Low Combing the expertise and staff from the three companies to make the most of the available technology. 15. Reliability of Systems ERP is considered as being most suitable for the three business units forming SUH as it allows the integration of the three businesses financial systems Medium Medium Having the ERP system serve as a means of integrating its IT infrastructure 16.

Data and Information The Database and Information used in the respective companies should be applicable to all the three companies units Medium Medium Combining information retrieved from different sources and give room for additional data to be included in the system 17. Overall Risk of Investment Failure The company fears that the system may not be in a position to cut down on the effort and time needed to produce reports and be accurate . High Medium Having the inventory and the financial management integrated References Indian Health Service (2007).

“How to Guide to Risk Management.” Management Capital Investment, 99-001

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Sciences and Information Technology Case Study”, n.d.)
Computer Sciences and Information Technology Case Study. Retrieved from https://studentshare.org/information-technology/1454565-suh-risk-analysis
(Computer Sciences and Information Technology Case Study)
Computer Sciences and Information Technology Case Study. https://studentshare.org/information-technology/1454565-suh-risk-analysis.
“Computer Sciences and Information Technology Case Study”, n.d. https://studentshare.org/information-technology/1454565-suh-risk-analysis.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Sciences and Information Technology

Computer Sciences and Information Technology. User Experience

In order to get information regarding their experiences of using the website, the users are given a website usability form to be filled so that the website of the Phone4u can be evaluated.... This will require acquisition of user opinions and to present analysis of the information to guide the decision on the areas of improvement.... The evaluation will lead to the decision making for the new version of the website based on the information from user response....
9 Pages (2250 words) Essay

Discussion 1 and 2

Jobs in the networking industry are highly competitive therefore it is important that if one Computer Sciences and Information Technology Computer Sciences and Information Technology Part Employment Possibilities in the Networking Area There are a lot of employment opportunities in the networking area.... Some of the job titles related to a job in the area of networking include network administrator, network systems engineer, network service technician, network programmer/analyst and network/information systems… Positions in the networking area have varied salary ranges which will depend on one's experience and skills and the size and location of the company hiring....
1 Pages (250 words) Assignment

The Internet Provider ASA

Computer Sciences and Information Technology al affiliation Computer Sciences and Information Technology The moment users in the direct network or firm network desire an access to servers in the DMZ, the most appropriate practice would be enabling the verification of the internet provider's ASA.... Principles of information Security....
1 Pages (250 words) Essay

Personal statement for graduate school

Indeed, on completing my degree in Bachelor of Management Information… Therefore, I am applying for the same and I believe that by broadening my knowledge in this field, I will polish my skills more, and thus enable me to be even more Personal ment, Computer Sciences and Information Technology Affiliation Personal ment, Computer Sciences, and Information TechnologyTo me, being a normal worker is not gratifying.... ata technology is consistently developing at an un-recordable rate, and that makes PC machines the most significant devices in our lives, they are our present and future....
2 Pages (500 words) Personal Statement

Comparison of Closed Mobile Ecosystems with the Open One

The author states that the current market share in the United States is on rising where most people are opting to use Open Mobile ecosystem, as they are flexible since they can be used anywhere.... The most developers that have lost in the United States market is the Blackberry.... nbsp;… A closed mobile ecosystem, on the other hand, is one that does not allow its users to have access to wireless networks using mobile devices....
1 Pages (250 words) Assignment

Computer Sciences and Information Technology - Scheduled Installment System

The paper "Computer Sciences and Information Technology - Scheduled Installment System " highlights that with all the functionalities and qualitative features of the two applications, it is evident that Microsoft Dynamic GP stands a better chance than the Scheduled to be selected by organizations.... s Scheduled Installment gives an ordinary system user interface with real time accessibility to all of the properties, Microsoft Dynamics GP gives each user a customized and personal interface, which is task-oriented and with pre-defined, customized roles and information look....
7 Pages (1750 words) Case Study

Reflection on Plasticized

The writer of the essay "Reflection on Plasticized" suggests that plastic will degrade automatically just like all other organic material that is used for packaging, while plastic never biodegrades.... Most of the world is unaware that plastic will not finish off on its own.... hellip; The research was a basic search of the ocean for plastic debris....
3 Pages (750 words) Essay

Planning Stage in Computer Sciences and Information Technology

The paper "Planning Stage in Computer Sciences and Information Technology" explains that before initiation of an IT project it is great to conduct research of the context of the project in terms of will encompass and time for its implementation and collecting data pertaining to project conducting....
14 Pages (3500 words) Research Proposal
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us