Nobody downloaded yet

Computing - Assignment Example

Comments (0) Cite this document
Summary
Many tools are available to monitor and control large IT projects. They are project selection and reselection, project scheduling, estimating, and budgeting, planning, project team management and selection, stakeholder management, management support, procurement management, learning and knowledge management, and risk management.
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.6% of users find it useful
Computing
Read TextPreview

Extract of sample
"Computing"

Download file to see previous pages 1-22) use it as an independent variable. Project selection is the procedure of approving or rejecting projects. Project benefits are weighted against criteria to obtain the approval to use corporate resources (Cai et al., p. 6).
Project scheduling, estimating, and budgeting is another tool in the monitoring and control of large IT projects. Scheduling is laying out in advance the time and place of work and the resources required. The status of work is monitored and controlled by comparing to the schedule laid out. Estimating is quantifying the resources needed to finish the project. It could be done by a process called knowledge management. Budgeting is usually prepared by the finance department before the start of the project to plan the costs of the project (Cai et al., p. 6-7). Scheduling, estimating, and budgeting are especially important in large IT projects that are more complex (Cai et al., p. 10). Indeed, Prasad (p. 125) found evidence that inaccurate estimates and lack of control by comparing the budget to the actual predicts budgets overruns.
A study conducted by Yetton et al. (2000) found that planning is yet another effective tool in the monitoring and control of large IT projects for UK and New Zealand businesses and governments. Poor planning will result in inefficiencies in development and overrunning of budgets (Yetton et al., 2000). An example is the Transfer and Automated Registration of Uncertified Stock (TAURUS) undertaken by the London Stock Exchange in the early 1980s to automate stock trading (Willcocks and Griffiths (p. 219-221). Money was splurged into the project even before the operating architecture had been planned (Willcocks and Griffiths, p. 220). There were no clear goals and procedures were not followed, leading to delays. Cai et al. (p. 9) suggested incorporating scheduling into contractual agreements with suppliers so as to facilitate better planning. Richl (p. 328) proposed that the systems development life cycle should be the framework used for planning. The systems development life cycle approach consists of six stages including the system study stage, system analysis stage, detailed design stage, system implementation stage, system conversion and cut-over stage, and post implementation audit stage.
Project team management and selection is also an effective tool to monitor and control large IT projects (Cai et al., p. 11). Yetton et al. (2000), in their study of system development performance of UK and New Zealand businesses and governments, found support for their hypotheses that project team conflict and budget variances are positively related. They also found that project staff instability and budget variances are positively related. They attributed the reasons to delays and learning costs of new employees. Similar results hold for the USA business sector. Jiang and Klein (2000) found significant relationships between intensity of conflict and project efficiency. Besides managing team conflicts and instability, team expertise and clarity of roles among team members are also found to be related to project efficiency by Jiang and Klein (2000). The proxies for project efficiency in Jiang and Klein (2000)'s study are "ability to meet project goals", "amount of work produced", "quality of work produced", "adherence to schedules", "efficiency of operations", "speed of operations", and "adherence to budgets". These parameters could be used to monitor ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computing Assignment Example | Topics and Well Written Essays - 1500 words”, n.d.)
Computing Assignment Example | Topics and Well Written Essays - 1500 words. Retrieved from https://studentshare.org/technology/1509411-computing
(Computing Assignment Example | Topics and Well Written Essays - 1500 Words)
Computing Assignment Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/technology/1509411-computing.
“Computing Assignment Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/technology/1509411-computing.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
CHECK THESE SAMPLES - THEY ALSO FIT YOUR TOPIC
Cloud Computing
... Task Cloud Computing This is a type of technology that involves making use of the machinery found on the Internet and centralized remote servers for the purposes of maintaining several types of applications and data. It facilitates businesses and customers to utilize applications without their installation in accessing their files on any computer that has connectivity to the Internet. It enhances the computing processes by utilizing centralized forms of storage, memory and bandwidths (Velte, Velte & Elsenpeter, 2009). The best examples of the usage of cloud computing in business are shown in the services offered by companies such as Gmail, Yahoo and Hotmail. These applications do not require installation in the computers found... in a...
9 Pages(2250 words)Assignment
Cloud computing
...? Topic:  “CLOUD COMPUTING" Submitted Submitted by: Submitted on: 11 May The increasing usability of the internet and the advancements in information and communications technology, a newly formed virtual infrastructure of cloud computing has emerged. This concept not only enhances the usability of the internet but also implements a new internet based system to replace the current hardware dependent infrastructure of storing data. Carrying out research regarding emerging and existing cloud based architecture and the challenges and future of the structure’s implications is the focus of the report. ACKNOWLEDGEMENT Immense credit for the study conducted on cloud computing basics and infrastructure goes to my Most Respectable teacher... ...
4 Pages(1000 words)Thesis
Cloud Computing
...?Cloud Computing Introduction Cloud computing is a process that employs the use of both software and hardware computing resources which are deliveredover such networks as the Internet as a service. The name “cloud” is derived from a symbol that is like a cloud in shape and is used as an abstraction for the complex infrastructure encapsulated in the system diagrams. “As [the] business adapts to changing government and industry regulations, evaluates new business partnerships, and anticipates competitive threats, IT needs to help the business find new ways to respond” (Hurwitz et al., 2009, p. 339), and cloud computing helps the business achieve that. Cloud...
10 Pages(2500 words)Research Paper
Cloud Computing
...? AWS Case Study: Ericsson AWS Case Study: Ericsson Cloud computing has emerged as the best alternative for both small and medium sized firms as well as big companies in their implementation of Information Technology strategies. This emerging trend in the contemporary world gives companies both attractive technological and financial benefits as well as giving them a competitive edge in the highly competitive environment. Cloud computing involves sharing of computer resources, both software and hardware, among many users along connected computers over a network, mostly the internet (Armbrust et al, 2010). Various concepts employed in cloud computing include software-as-a-service (SAAS), infrastructure-as-a-service (IAAS), Platform... ...
3 Pages(750 words)Case Study
Grid Computing
...Grid Computing Grid computing is a form of peer-to-peer computing which allows the organizations and enterprises to take advantage of distributed processing. The special software used reclaims unused computing cycles on desktop computers and harness them into a "virtual supercomputer" (Laundon and Laundon 192). The problem processed is broken down into many small pieces which are processed independently on many separate machines in the network. Grid computing enables organizations to share computing and information resources across department and organizational boundaries in a secure, highly efficient manner (Global Grid...
2 Pages(500 words)Essay
Computing
... ComputingComputability Theory The field of computer science deals with the idea of computability theory which looks at mathematical and logical problems by examining their solvability. In essence it examines if a problem can be positively handled by a logic machine or not. In even simpler terms, computability theory works at the very limits of computing power so while we can expect computers today to be very powerful and complex machines; there are certain limits to the problems they can solve. In certain situations, computability theory suggests that specialized computers might be...
9 Pages(2500 words)Essay
Cloud computing
...Introduction Companies of large size have the financial as well as functional resources to own and operate their own data centers; however, smaller companies do not have the capabilities to do the same. This has given rise to a concept where companies make use of applications and data hosted on a hardware platform owned by another organization. This concept is referred to as cloud computing. In the simplest of terms, cloud computing can be described as providing hardware, systems, software, and applications as services over the internet (Gilam, 2010). The services are dynamically scalable. A cloud can either be public cloud (it is made available to public on a pay-as-you-use manner) or a private cloud...
5 Pages(1250 words)Research Paper
Computing
...; employed for voice communication as well as TV, correspondingly. Fiber optics based communication and transmission medium engages installing the entire new fiber optic cables, complete set of little fibers of glass, consequently DSL is possible to be the existing choice for the majority informal Internet clients intended for a number of periods (Hintzr, 2010; Nash, 2000; Shelly et al., 2005). 6.3- Equipment and Installation Together DSL, communication and transmission medium normally utilize a modem or else router to interface through computers as well as additional Internet devices. DSL as well necessitates that voice devices in the home areas be ended by diverse filters to stop their dawdling the fastest DSL...
12 Pages(3000 words)Essay
Computing
...The LZ encoding was developed in 1984 and has been identified as simple to implement due to its compatibility with hardware. Its purpose is to compress large English language documents. The encoding has been used in PDF files and allows the reduction of the size of a document. The compiler can be said to be a program used in the translation of computer language (Layton, 2007). It simplifies the original language of information into another language, normally easy to understand. An example of a compiler is the JAVA software. Applications software is a class of software used to perform a specified function. An office suite is an application used for editing written documents. Another example is a media player whose...
2 Pages(500 words)Coursework
Cloud Computing
...Cloud Computing Table of Contents Cloud Computing Executive Summary 3 Assets of value 3 Goals and Values 4 Threats5 Vulnerabilities 7 Impacts 8 Initial Risks 10 Recommendations 11 Contingency 13 References 14 Executive Summary This paper examines the subject of cloud storage as a means for the US government to store data under various security designations such as SBU or CUI. It discusses the nature or security under each of the designations and the focuses on the potential underlying vulnerabilities that could threaten the integrity confidentiality, availability and authenticity of the data in cloud storage. These threats are typically classified as people, process and technology representing internal human resource weakness... or...
14 Pages(3500 words)Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Assignment on topic Computing for FREE!
logo footer
Contact us:
+16312120006
Contact Us Now
FREE Mobile Apps:
  • StudentShare App Store
  • StudentShare Google play
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • Miscellaneous
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us