We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Nobody downloaded yet

Computing - Assignment Example

Comments (0)
Many tools are available to monitor and control large IT projects. They are project selection and reselection, project scheduling, estimating, and budgeting, planning, project team management and selection, stakeholder management, management support, procurement management, learning and knowledge management, and risk management.
Download full paper
Read TextPreview

Extract of sample

Download file to see previous pages... 1-22) use it as an independent variable. Project selection is the procedure of approving or rejecting projects. Project benefits are weighted against criteria to obtain the approval to use corporate resources (Cai et al., p. 6).
Project scheduling, estimating, and budgeting is another tool in the monitoring and control of large IT projects. Scheduling is laying out in advance the time and place of work and the resources required. The status of work is monitored and controlled by comparing to the schedule laid out. Estimating is quantifying the resources needed to finish the project. It could be done by a process called knowledge management. Budgeting is usually prepared by the finance department before the start of the project to plan the costs of the project (Cai et al., p. 6-7). Scheduling, estimating, and budgeting are especially important in large IT projects that are more complex (Cai et al., p. 10). Indeed, Prasad (p. 125) found evidence that inaccurate estimates and lack of control by comparing the budget to the actual predicts budgets overruns.
A study conducted by Yetton et al. (2000) found that planning is yet another effective tool in the monitoring and control of large IT projects for UK and New Zealand businesses and governments. Poor planning will result in inefficiencies in development and overrunning of budgets (Yetton et al., 2000). An example is the Transfer and Automated Registration of Uncertified Stock (TAURUS) undertaken by the London Stock Exchange in the early 1980s to automate stock trading (Willcocks and Griffiths (p. 219-221). Money was splurged into the project even before the operating architecture had been planned (Willcocks and Griffiths, p. 220). There were no clear goals and procedures were not followed, leading to delays. Cai et al. (p. 9) suggested incorporating scheduling into contractual agreements with suppliers so as to facilitate better planning. Richl (p. 328) proposed that the systems development life cycle should be the framework used for planning. The systems development life cycle approach consists of six stages including the system study stage, system analysis stage, detailed design stage, system implementation stage, system conversion and cut-over stage, and post implementation audit stage.
Project team management and selection is also an effective tool to monitor and control large IT projects (Cai et al., p. 11). Yetton et al. (2000), in their study of system development performance of UK and New Zealand businesses and governments, found support for their hypotheses that project team conflict and budget variances are positively related. They also found that project staff instability and budget variances are positively related. They attributed the reasons to delays and learning costs of new employees. Similar results hold for the USA business sector. Jiang and Klein (2000) found significant relationships between intensity of conflict and project efficiency. Besides managing team conflicts and instability, team expertise and clarity of roles among team members are also found to be related to project efficiency by Jiang and Klein (2000). The proxies for project efficiency in Jiang and Klein (2000)'s study are "ability to meet project goals", "amount of work produced", "quality of work produced", "adherence to schedules", "efficiency of operations", "speed of operations", and "adherence to budgets". These parameters could be used to monitor ...Download file to see next pagesRead More
Comments (0)
Click to create a comment
Malware Forensic Computing
This report is a discussion about malware used by cyber criminals to do cyber attacks, and respective computer forensics investigation. An introduction has been given which gives a better understanding of the topic. Common cyber crimes and types of malware are discussed.
10 Pages(2500 words)Assignment
Cloud Computing
The paper tells that it facilitates businesses and customers to utilize applications without their installation in accessing their files on any computer that has connectivity to the Internet. The best examples of the usage of cloud computing in business are shown in the services offered by companies such as Gmail, Yahoo and Hotmail.
9 Pages(2250 words)Assignment
Trends in Cloud Computing
Cloud computing According to Saboowala et al. (2013) cloud computing deals with information technology infrastructure such as data centers and remote servers, it is a style of computing in which dynamically scalable and often virtualized resources are offered via the World Wide Web.
4 Pages(1000 words)Assignment
Desktop Computing
The first few components in the list of recommendations for a typical graphic and 3D developer like Jean Jones is to get the fastest processor, corresponding mother board and the best graphics card that she can afford. It helps to work large and complicated memory hungry scenes.
4 Pages(1000 words)Assignment
Computing Assignment
Availability and usage of the SE, TSE and IE is the key issue in completing the task in time. The available time and the human resources must be used efficiently to make the upgrade success in all aspects. While planning for the installation replacing the standalone systems the change of technology, making staff familiar to it, taking precautionary measures to keep the installation bug and problem free and the cost efficiency were to be taken into consideration.
9 Pages(2250 words)Assignment
It simplifies the original language of information into another language, normally easy to understand. An example of a compiler is the JAVA software. Applications software is a
2 Pages(500 words)Coursework
Cloud Computing
Unlike the traditional networks or data centers, cloud computing has elasticity to cope with the ever growing current demands and the rapid information being created
2 Pages(500 words)Assignment
Cloud computing
ng costs associated with applications, hardware, licenses, personnel, real estate, maintenance, power and other expenditures.” In view of the fact that cloud computing is based on the idea of “doing more with less” value proposition with higher return on investment hence
2 Pages(500 words)Assignment
Social computing
Any form of technologies that entail implicit or explicit computer mediated interactions and communications among people is considered as social computing. Dasgupta (2010) stated that in a shallow sense social computing involves creating social
12 Pages(3000 words)Assignment
History & impact of computing
It also features the art of structuring, processing and managing the different information, making scientific research using and on computers as well as coming up with computer systems that behave intelligently. The field of computing is extremely
5 Pages(1250 words)Assignment
Let us find you another Assignment on topic Computing for FREE!
Contact us:
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us