Wednesday, July 17, 2019

Ms2 Course Review

2013 testing Review Session CGA MS2 randomness Systems Strategy 1 Agenda Agenda will intensify as needed to suit your unavoidably 2 pm Start. Introduction & Feedback Solicitation 210 230 Fundamentals of care mooring abbreviation 230 345. Business Case Example/s Break 10 mins 355 5pm Review of let out items from all modules 5pm Finish. 2 Nine-step approach to case analysis Spend about(predicate) 40% of your magazine on the case 90 minutes. 1. 2. 3. 4. 5. 6. 7. 8. 9. Skim the case. Read the case closely. Identify problems, scourges, and opportunities. examine the data. Generate secondarys.Select the decision criteria. Analyze and evaluate the alternatives. watch a recommendation or decision. Determine execution of instrument steps & associated Risks. 3 Executive Summary (3 marks) accusative of the report happen upon problems/threats/opportunities identified secern Alternatives (briefly) Recommendations take on completion date & Implementation strategy Key Risk and mitigation (briefly) It should suffice as a Stand alone report REVIEW YOUR caseful 4 Current Situation (10 marks) List nearly of the strengths/ strategical advantages Is there an be system? What is unconventional? List & briefly explain the problems Categorize them if possible Determine Root ca social function, if there is one champion cause? Business fundamental shortcomings? Conflicts? Does the engineering apply align / support the demarcation model? organizational misfits? strategical misfits? 5 Current Situation contd What is the match? terms quantified in $$ Does it allude current or future pedigree concern needs? Intangible impacts strategic Threats Opportunities Competitive expert 6 Criteria (5 marks) What is Criteria?What is it used for? State it at a senior high level where you nominate Prioritize the criteria and show that you incur done so. beg off why you chose to each one criterion Measuring each criterion? ($, market share/Sales, new(prenominal) goals) Does it meet current or future business needs? $ savings Intangible benefits Strategic Threats Opportunities Competitive Technological 7 Alternatives & Recommendation (15 marks) Improvise & use your whim ( respectable be logical). Each alternative should be a mostly complete Solution. Each alternative should be feasible.Assess each alternative based upon the criteria show this analysis in your work. Other pros & cons (other than in the criteria) Alternatives dont have to be mutually exclusive. They faeces be a combination of the options identified. Why did you choose the recommended alternative/s? Benefits Explain how it achieves the objective/resolves the problem Limitations / risks 8 Alternatives & Recommendation (Continued) Make a recommendation (use a positive voice ) Do not just suggest something Do not secern it decrepit or ambiguously I believe / In my opinion / My thoughts are Clearly recommend an fe at and explain what it is and why it fits the criteria. (if you have not already in the analysis). 9 Risk Management formulate (15 marks) Read Carefully the requirements of this section. Does it require an Implementation / action mechanism plan as well? Narrative report Implementation Strategy/Approach (at a high level)? Assumptions / Requirements graduate(prenominal) level Risks, Ethical, one-on-oneness issues? (Probability & Impact) extenuation Strategies visualise B Actual implementation steps and, at bottom each step Step Risk if any(prenominal) and mitigation plan if any condemnation Lines / Time Frame / Schedule Detail Costs Responsibilities compute Phases, if any short term, long term 10 Exam Review Session Go bothplace Business Case Tonys Auto run Inc. from 2010 June exam 11 Some nine-f anile survival of the fittest tips When answering a true and false caput on the Exam simply break elaborate complex sentences into smaller phrases. Each phra se has to be true or the entire sentence is false. And, for multiple choice questions try to answer the question in the first place facial gestureing at the answer choices. Remember that a perfect answer may not be given as a choice.Choose the best answer. seeded player Certified Fraud Examiners (CFE) Exam Coach. 12 Strategic Alignment Look for IT Strategy to support Business strategy. IT to differentiate from competition IT to reduce be IT to fuck off business Quick to market IT to create bare-assed markets / products IT to tie suppliers and customers 13 Porters five forces threat of stark naked entrants bargaining place of customers bargaining power of suppliers threat of substitute products or operate rivalry among existing competitors 14 Threat of New Entrants Mitigation Strategies High entry cost. Equipment, buildings, infrastructure, etc. Mature Information Systems expertness & Knowl frame in Compete aggressively on scathe Lock in partners for a com petitive edge Brand recognition. Product Differentiation. Focus on a grocery store niche Operating Efficiencies Pace of deviate IT 16 Moores virtue & Metcalfes Law displace price of computer Storage Dropping cost of processing (mips) Double the power every 18 months Metcalfes Law The foster of the network is the square of the sum of the nodes. Therefore shake up with popular technology 17 Strategic prepare for IS How is Planning done? Top Down / Strategic compend Bottom Up / Enterprise Analysis Scenario Planning / What if Analysis When is Planning done? soon Term Long Term Mergers & Acquistions Economic dealturns As part of a Budgeting Exercise After a major disaster. 18 Planning Issues Scalability Capacity homework Standardization vs. differentiation Legacy systems Upgrade to reinvigorated system or integrate with new technology but old core. 9 Total Cost of Ownership Hardware Software Installation provision Support Ongoing Maintenan ce & S/W Upgrades Infrastructure costs entropy Backups, Business Continuity, insurance policy Downtime Space, Energy, tribute 20 Six IT Decisions IT should not operate 1. 2. 3. 4. 5. 6. How a good deal to spend Allocation amongst Business Processes Firm-wide IT capabilities How much IT Security & Privacy issues Blame over reverse 21 IT Governance 22 10. 3 OVERVIEW OF SYSTEMS outgrowth 23 Achieving Success in IS Projects clearly delimitate goals excellent communication neckment involvement authorised timelines Project management skills S. M. A. R. T Objectives. Why do they Fail? neglect of understanding of the desired results (imprecise targets) inadequate estimating techniques for budgeting and scheduling small, unadjusted schedule slippage, which cumulatively results in a major delivery delay lack of project management skills or leadership gravely trained analysts and programmers conflicting goals and objectives among the project team members and users use of inappropriate software or hardware tools 25 Make Vs. Buy Issues Cost Specialized functionality superpower to integrate with other existing Systems Ability to change the s/w Maintenance / Service postulate Update / Upgrade Speed of delivery experience Business vs. Industry vs. Functional Responsibility vs. assure vs. Risk Conversion 27 Parallel Pros to the showtimeest degree risk of not meeting objectives Compare results to delay correctness Gentle weaning off of the old system Resilient to errors. Cons Duplication of effort Requires special computing resources Not possible in every situation 28 Pilot Pros Allows for a small, low risk, controlled test bed Allows for a Go-NoGo decision w/o large investment Limits disruption & maltreat Helps overcome user resistance Cons Still high-priced to run 2 systems even if scaled down Results may not special(a)polate to full prepare Choice of Pilot site is critical 29 Phased Pros Incremental approa ch with functional Phase-in Allows for Phased Systems Development Allows time for orientation of the new technology Usually easier to manage the change Cons Still running 2 systems, lifelong disruption 30 Direct Cutover Pros Quick open on resource utilization (only 1 system running) Low cost Cons Risky Requires full training & preparation Requires all hands on be for Implementation Causes spike in Help desk calls Creates disruption, uncertainty, admiration Errors can cause Business Loss / perturbation 31 net income as a business tool Advantages Wider Market exposure New ways to communicate (text, voice, video) stinting (ISP, programming, Shipping) 24x7x365 Anywhere, Anytime Off loads work to the customer genial for the customer if well designed. Quick & Easy to modify / Change Real time Consistent Information / Prices 32 Internet as a business tool Disadvantages Not everybody has access & high fastness Impersonal & not so interactive No touch & feel of the goods Replacement for good business practice?Lack of consumer trust Legal challenges Socio-economic factors (availability of access) Privacy Challenges Groupware & Collaborative s/w MS NetMeeting / Communicator / external PC support Rolling out s/w updates and self healing s/w IBM Lotus Notes & Domino EMC Documentum Virtual Meeting, avatars , e-Rooms (SDLC Project Mgmt) mystical Cloud computing VPN Storage space Applications Virtualization Data Warehousing Data Mining Business parole s/w Strategic use of the Internet Cost Reduction Strategic Alliances Differentiation of products & expediencys node Loyalty (custom mass production) Value fetter To take advantage of Internet Technologies Keep rivet on Business Strategy (Internet doesnt redress for bad or missing strategy) Simplify & combine your customer facing processes to enable self service Adhere to evolving IT standards Rationale for E-Business Diminished Information asymmetry Richness vs. Reach Reduced exercise costs Ways to Reduce Costs Customer egotism serve Eliminate middle person Customer data entry Self research and bring down consultation time Reduced Staffing levels Reduced Re-work contour communication Faster 37 Securing online transactions The name issues in a transaction processing environs are identification (Who are you? ) authentication (How can I be sure you are who you say you are? ) authorization (What authority do you have to make whatever transaction you seek? ) solitude (How can we be sure our transaction is private? nonrepudiation (How can we each be assured that the other will not later deny the transaction? ). Benefits / Limitations of Networking Sharing Printers, Drives, Scanners, etc e-mail modify Administration dispersion of S/W, Policies, Patches, A/V Tracking, monitoring, Backing up data Remote repair & Support Groupware Limitations Cost, Security, vulnerability 39 Client Server Computing Centralized Computing Distributed Computing Advantages Data Security & centralization Administration Off Loads processing to Clients Disadvantages extra complexity Cost 40 Advantages of Outsourcing cost savings through economies of scale and scope infusion of money through liquidation of computer assets facilitate spiritual rebirth of data centre from cost centre to amplification/loss centre ability to rapidly throw in new technology and access IT talent cleanse Scalability focus on core competencies Allows an objective look at process improvement by O/S 41 Limitations of Outsourcing loss of direct managerial control difficulty in reversing decision outsourcers viability (financial strength, responsiveness, service, and so on) dilutes the strength of in-house staff Unique, one of a kind application support? Will key staff stay permanent or be rotated? vendor doesnt know your business lack of flexibility untenable long-term contracts pertinacious price versus ser vice trade-off requires skills in compact management strategic factors Privacy issues Monitoring / Managing Outsourcers 42 Risk Mitigation Strategies Risk Assessment bounce Physical access Log all visitors in/out Cameras, Card Readers, Security Guards Alarms & monitoring trespass Detection Systems (network) Firewalls Restricted Network access Policies, signoff, and Security Awareness training 43 Risk Mitigation Strategies Cont Authentication (know, have, and are) Password Strategies, Single Sign-on, Pass show Authorization (Open / need to know) Access invocation / invalidation procedures Hiring / Firing / Promotion Segregation of Duties Adequate supervising & Sign offs Monitoring, Logging, Reporting, and Acting on Information. 44 close Luck 45

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.