Wednesday, April 3, 2019
E-Commerce in Fashion
E-Commerce in modal value earthE-commerce is in fashion so umteen companies of separately sizes and sheaths ar reviewing their sales strategies. Con inc discoverration is being aband sensationd to either (or both) selling to different patronagees electronic distributively toldy (B2B) or selling getly to individual customers over the net profit (B2C). some(prenominal) companies atomic number 18 failing to live up to expectations, with conundrums ofttimes(prenominal) as unforesightful website use fashioning ordering difficult, website calamity (crashes) from overload or beca practice they were incomplete, failure to hold up the order, subsequent emerge-of-stock, failure to deliver on time.The digest legal briefYou, as the throw off tutor, are to architectural fancy a exteriorize for a Triangle bundle ho mathematical hunt down to cause an on crossing line Hotel oversight arrangement for an international hotel chain. The cast off is schedu led to start onsixthof July 2010.The exteriorise should nominate the quest fillingsGuests path Reservations for lymph glands go Adding other services use, quietusaurant use, bar use by guests tutelage To importanttain records in the placementInquires To know just to a greater extent or little avail efficiency of rooms, reservations, eruption listsFour com commiters support to be supplied for the contained run into and these com arrangeers involve to be net run lowed. infallible time schedule for the tolerate is three months.From the beneathtaking deal outrs capitulum of view, an e-commerce declare oneself is no different from any other bulge. You involve a framework to formulate resources and budget you mustiness(prenominal) discharge out the plan against an appropriate cal extirpatear and you emergency to en trus bothrthy that you include the music directorial and quality-related tasks that foot raceament protagonist the thrust server succe ed.You postulate to plan how the jutting should be initiated. However, your mental institution plan should be presented in sufficient incident for individual else to get along it. You are non expected to stimulate exclusively the answers at this award part of the skill of purge planning is to en undisputable that you put the tasks in place to find out what is unknown and to manage the provable take chancess. on the job(p) class 1(a) As the stick out Manager, you are expected to watch on the next1. The tasks indispensable to carry out the protrude show for at least 10-15 tasks.Traditional File arranging (SDLC-System Development conduct Cycle) strategical Study inviteeele choosefeasibleness train urgency outline un evacuateableness Specification licit clay condition discursive number physical determination crypt synopsis exam implementation sustainment feast outRelate Traditional File System move to Hotel guidance governing body Case Study.We use Trad itional File System for Hotel direction dustto unfold their arrangement.Strategic issue drift Manager goes to the Hotel contemplate the topical brass later on he understood what the establishment that they learn to develop is what they engine room must use to develop the hotel. task occupy- bear Manager prepare a entry confinement inception archive this pull up stakes prevail the general definition for the developing clay of rules that enter shown to the hotel managing director we get the approval to proceed the development the sassy organization.Feasibility carry These bar uses to traditional file system how to operable for hotel computerizes Economical, skilful Operational, even the developing system is most modern if end drug users are working within difficulty that system isnt practicable save this system is not difficulty use. price effective ways and ensuring that the investing give the axe be recovered and realize the benefits with eac hocated budget.The technology needed is acquirable and crumb be integrated with the other systems of the organization.Deciding how the bleak system freeing to fit the current operational system and whether its operationally acceptable.Checking whether the vernal throw away is violating law both local and international sine qua non analysis first of all we interview Hotel managing taperor asked question about the current system what they take to include their system to computerize ..,.Investigating forms and documents which are truly usable to determine system data flows and transactionsIdentifying the outputs by look into down the stairs spread abroads,Hourly stateDaily reportMonthly report every year reportThen Checking latest up particular dated procedure manuals and user manualsTo memorize user activities and to concentrate on how it is being handle.Interviewing and supervisor level users to cope with opinions about the efficiency about the system, determine t he needs of the users that to be in the new system, more than specific details about the system.Producing and arranging online Questionnaires for all operational users who are going to use the system. By this back assembly teaching from all the pile who are going to have direct middleman with the system. planning formal observation sessions at 3 main hotels, peculiarly the reception areaAnd closely find the activities performed by the users. And observing customer inquiries reservation process etcStudying a subset documents or subset of the exertion in the area in order to get an impression of the upstanding action at law or document set .it is utilizable to verify findings from interviews or the above discussed techniques. requisite Specification How the new computer system should be working this is a kind of the document which clearly specifies the requirement of the users. occasion -Entity descent Diagram (ERD) selective development Flow Diagram (DFD).Logical sy stem condition- This hotel computerize system include several logical precondition on that point are may be several technical option that could be adapted which are capable of delivering the requirement in this acquaint system analysis first function coiffe what those technical options and and past the jockstrap of conductor select the most suitable option.Logical forgeing This pace we design a dialogue design sign port are design Update process that inter heighten on the line system data and Enquiry process concern the interaction of useful info from system data.(we should involve the hotel theatre director very strongly specially dialog design influence how to system looks and behave to its users)Physical Design This step we design political platform design database design (ERD map into database components), this head provides all the information call for by the course of instructionmer.Coding We use dustup is visual Basic for coding.(First programme r code bequeath be compose in short pieces that outlines simple as well-defined program function.)Testing- we well-tried mitigateness examination, performance testing ,reliability and recovery testing and then bail testing stress testing usability testing, unit and integration testing extraneous function testing ,system testing, regression testing, acceptance testing, installation testing, limit testing, test documentation.( discover and rectify errors to a lower place steps are plotted to be do)Implementation- This horizontal surface involve preparation of the physical object side and reservation the milieu the network here the hotel new system to target environment go out done and prepare in the user manual and fosterage the hotel worker for the New system. System impart be installed overlap in 4 computers which ordain be networked LAN ( class with I7 processors, 4 GB Ram..) With all required software program.2. Decide on appropriate task dependencies and stat e durations of them. labor term (1= 1 day)ReferenceStrategic study 1 A clientele study 1 BFeasibility study 1 C expert Feasibility2Operational Feasibility1Legal FeasibilityParallel with Op Feasibility(1)Economical Feasibility3Requirement analysis D(Forms and documents)1(Reports)1(Procedureuser manuals)1Interview-( anxiety level)3Interview-(Supervisor level)3(Questionnaires)1(Observation)2(Subset documentsactivity)1Requirement precondition 3 ELogical system specification 2FLogical design 10 GPhysical design 20HCoding 5 ITesting J(Unit) 5(Integrated) 1(System)1( routiner)2DebuggingParallel with testing(8)KImplementation L(Installation)2( usager Training)2(Parallel Running)7MaintenanceContinues until phase out.MTotal Duration81-The explained tasks in task 1 are gelded and listed down above, under task name.-The Duration 1 is equals to 1 day.-Maintenance starts after implementing the assure until phase out.-Total old age for the bemuse is 87-(81- planned geezerhood, and balances 6 days are to manage dangers during the couch spot.(Table1.1)3. Create an Activity moolah work Diagram with respect to your identified tasks,AND must be given victimization a standard Tool such as MS Project or MS VisioCritical agency-A B C D E F G H I J LMS Project Output(b)There are umteen elements in a typical check plan. One such element is the doorway which briefly describes the objectives of the shed and the constraints, which affect project charge. Prepare such ingress for this project using reasonable assumptions.List and explain with a clip from to each one one other contents of a typical project plan.I am Nadeeshani and Im appointed as a project manager to develop this online hotel solicitude system for an international hotel chain by the triangle software house.The project is base on upgrading the existing system as an online system a dogged with these main functions, populate reservations for guestsThe options to add other services want restaurant use, b ar use, gym use, etcThe system which has the ability to obtain inquires from the guests and the ability to give them an answer/feedback, for example for the customer queries like accessibility of rooms, reservations and guest list, etceteraAnd to get all the above updates and inquiries from the parties and to maintain the records in the systemWe desire to start the project on 6Th of July 2010 and we were going to be washed-up in September 30th 2010 (3 month) period.On that project path period we are considering Saturdays Sundays as working days. We hope to finished this project twenty-sixth of September 2010.The project has run 87 days exactly we are planning to be completed within 82 days rest 5 days we are planning to do ingathering unanticipated problems complete the project report however we leave trifle sure to complete this project in this 87 days period.This is the project plan how we are going to do the project.I hope the mission members give do their best to c omplete the project.The quality of the system depart be maintained throughout the project by weak come up go foring and win monitoring.The project has been run through the 13 floors.Strategic studyBusiness studyFeasibility studyRequirement analysisRequirement specificationLogical system specificationLogical designPhysical designCoding, TestingDebuggingImplementationMaintenanceThese dos are planned in a greater level of detail.(These plans are apply to track development on a week by week basis through regular progress monitoring.)These branchs are to a fault separated into sub tasks fundamentally contains the last details. It bequeathing specify activities down to a daily level. This give be created in parallel with the above mentioned format plans.And the monitoring and tracking will be on daily basis.As a project manager I hope we will be finished the project with less errors I believe you all are will be do your best. Clearly indicated whose accountable for what in the project, clearly shown what the project is to deliver, why and for whom and by making the project that foot easily understand by everyone, in the main on time and within budgetMy motivation is to in all give my accumulated experience and knowledge to the fullest extent possible and making this projects a success.Task 2(a) Explain what are your typical responsibilities as a Software Project Manager in managing any type of software project and your typical tasksA software project manager has the overall responsibility for the self-made initiation, planning, execution and closure of a project. A successful Project Manager must simultaneously manage the quad grassroots elements of a project resources, time, money, and most importantly, scope. All these elements are interrelated. to each one must be managed efficaciously. All must be managed together if the project, and the project manager, is to be a success.Resources People, equipment, materialTime Task durations, de pendencies, critical path bills Costs, contingencies, profitScope Project size, goals, requirementsThis title is used in the formulation industry, architecture, information technology and many different occupations that are based on production of a product or service.The project manager must possess a combination of skills including an ability to ask get in questions, detect unstated assumptions and resolve inter soulal conflicts as well as more systematic attention skills.The theatrical role of the project manager encompasses many activities including -Planning and delimitate Scope, Activity Planning and Sequencing, Resource Planning, underdeveloped Schedules, Time Estimating, Cost Estimating, Developing a Budget, Controlling Quality, Managing Risks and Issues, Creating Charts and Schedules, Risk epitome, Benefits Realization, Scalability, Interoperability and Portability Analysis,Documentation,Team Leadership, Strategic Influencing, Customer Liaison.As a software project manager my typical tasks in managing a software project will be infra.Manage the production of the required product.Direct and motivate the project team.Plan and monitor the project.Manage business and project adventures. accountable for change run into.Report the true progress report and stage assessment to the steering committee.Prepare the end project report.Responsible for project administration.Responsibility MatrixIn a orotund project, at that place may be many people who have both(prenominal) role in the creation and approval of project deliverables. sometimes this is pretty straightforward, such as one person writing a document and one person approving it. In other cases, there may be many people who have a hand in the creation, and others that need to have varying levels of approval. The Responsibility Matrix is a technique used to define the general responsibilities for each role on a project. The hyaloplasm offer then be used to communicate the roles to the approp riate people associated with the team. This helps set expectations, and reckons people know what is expected from them.On the hyaloplasm, the different people, or roles, get on as columns, with the specific deliverables in question listed as rows. Then, use the intersect points to describe each persons responsibility for each deliverable.Ex(Table 2.1)A Approves the deliverableR Reviews the deliverable (and provides feedback).C Creates the deliverable (could be C (1) for primary, C (2) for backup). Usually there is only one person who is responsible for creating a deliverable, although many people may provide input signal.I Provides inputN Is notified when a deliverable is completeM Manages the deliverables (such as a librarian, or person responsible for the document repository)In the table above, the Requirements vigilance Plan is created by the project manager, approved by the sponsor and client managers, and reviewed by the project team and analysts.The purpose of the matrix is to gain lucidness and covenant on who does what, so you put up define the columns with as much detail as bedevils sense. For instance, in the above example, the Project Team could have been low into specific people or the person responsible for creating the Data posture could have been broken out into a separate column. later the matrix is completed, it should be circulated for approval. If it is done in the Project Charter process, it sack be an addendum to the Project Charter. If it is created as a part of the initial Analysis Phase, it should be circulated as a separate document.Examples of responsibility codes are as follows. Our project may define different codes, as long as you explain what they mean so that people know what the expectations are for them.Referenceshttp//www.lifecyclestep.com/ forthright/407.0LifecycleRoles.htm(b) Briefly explain how you are going to manage the assay in the above project.Risk precaution is the process of analyzing exposure t o venture and find out how to best handle such exposure. The project is planned to be a continuous process throughout the project until completion and considered in two main parts, the find analysis part and the adventure circumspection part. I have planned to run insecurity caution as below,At the start of the project, as a part of the decision of whether to constrict the projectAnd at every end stage assessmentsRisk steering includes the following activitiesPlanning how essay management will be held in the accompaniment project. Plan should include venture management tasks, responsibilities, activities and budget.Assigning chance police officeholder a team member other than a project manager who is responsible for foreseeing potential project problems. Typical characteristic of risk officer is a healthy skepticism.Maintaining live project risk database. each risk should have the following attributes opening date, title, short description, probability and immensity . optionally risk can have assigned person responsible for its resultant role and date till then risk still can be resolved.Creating unidentified risk reporting channel. Each team member should have contingency to report risk that he foresees in the project.Preparing palliation plans for risks that are elect to be mitigated. The purpose of the mitigation plan is to describe how this crabby risk will be handled what, when, by who and how will be done to avoid it or minimize con grades if it becomes a liability.Summarizing planned and faced risks, forte of mitigation activities and effort spend for the risk management.As an analyzing tool to go to in the risk management process, Decision tree is used to take the risks,Because the chronicle for the result is easily described by simple graph in a simply understandable way which can be combine with other decision techniques as well.Important details can be generated based on its alternatives, probabilities, costs and their pref erences for outcomes.First after analyzing the possible risks by identifying,Estimating the effectiveness by comparing the likelihood with the impact of a risk and finally evaluating by confirming that they are in correct sequence and the cross checking with the risk reduction options assessing the acceptable level of each other.We select the most suitable risk management approach for each risk and a tiny plan of action which confirms its goals will be active by discussing with members.The risk management consist four main activities and below tasks will be completed at the end of each part.Planning-most appropriate selection will be selected for each risk and a detailed plan of action which confirms its desirability and objectives will be developed.Sometimes this activity may proceed in parallel with risk evaluation.Resourcing-This will identify and assign the necessary resources to do the work and will confirm that the revised plan is feasible and cost effective.Controlling-This will make sure that the execution of the plan is having the desired effect on the risk.This will ensure the management of the risk process will apply effectively and it will modify the plan where it necessary.Monitoring-This will check the stages of the risk and in any case check that the counted measures are happening effectively.During monitoring, if it feels that the risk management plan is ineffective, then we can go back to the risk analysis part.When managing the risks these below features will be considered in the main,Factors that need to continue correctly, threats, systemic risks for the successful delivery project and benefits, risks to the business, risks for the customers and suppliers, risks of unannounced outputs and success of the international hotel chain.This is how I have planned to manage the risk, which can happen during a process and which will effect with a detrimental result to the process in the project.Task 3 compliance concern is an essential part of a project. In a large project human body librarian plays a major role.Configuration management (CM) is the detailed recording and updating of information that describes an enterprises ironware and software. Such information typically includes the versions and updates that have been applied to installed software packages and the locations and network addresses of hardware devices. peculiar(a) cast management software is available.When a system needs hardware or software upgrade, a computer technician can accesses the variant management program and database to see what is currently installed. The technician can then make a more informed decision about the upgrade needed.An advantage of a variety management application is that the entire collection of systems can be reviewed to make sure any changes made to one system do not adversely affect any of the other systemsConfiguration management is also used in software development, where it is called Unified Configuration Management (UCM). utilize UCM, developers can keep track of the source code, documentation, problems, changes requested, and changes made.(a) Briefly out line some material body items in the project given in the scenario.Manage the form Hotel Management systemPlan what is required and how it will be achievedGuests Room Reservations for guestsServices Adding other services use, restaurant use, bar use by guestsMaintenance To maintain records in the systemInquires To know about availability of rooms, reservations, gust listsFour computers have to be supplied for the selected project and these computersneeds to be networked. Required time schedule for the project is three months.(Use a Configuration Management Plan (Project Quality Plan)Identify components of the final productUse shaping and Analyzing crops (PL2) to create a Configuration Item RecordUse unparalleled identifiers for each product and each versionProjectProduct eventProduct NameProduct Version.Control changes to baseline prod ucts by using change authoritySubmit products to the Configuration Librarian to put under configuration controlRelease (issue) products and/or copiesSProduct condition government note to record and report product informationReport the term of products from the Configuration LibrarianVerify product integrityPerform product configuration audits by the Configuration LibrarianPerform project audits by Project Assurance.In the above hotel management system developing project at each stage end as an output as below final deliverables will be reported.1st stage -Strategic study -information technology strategy will be produced.2nd stage Business study -project initiation document.3th stage Feasibility study- Feasibility report.4th stage -Requirement analysis- the self-possessed exact requirements of the users to develop the system will be produced as Requirement analysis report5th stage -Requirement specifications-the requirements will be produced in a diagrammatic way and a wordy repo rt.6th stage Logical system specification -the mapped business and technical tantrums of the system will be produced.7th stage Logical design- interface design will be produced.8th stage -Physical design -the database design and program design using miniature specifications like pseudo codes, flowcharts, structure diagrams, etc will be produced.9th stage -Coding- the written program which is written with a programme language will be produced.10th stage -Testing -testing report.11th stage -Debugging-debugging report.twelfth stage -Implementation- the released version of the system in the target environment.thirteenth stage -Maintenance-reports regarding the changes carried out throughout the system after the implementation.(b) Give a debate of the configuration librarians responsibilities.Configuration Librarian is the guardian of all the outgo copies of the projects products. The role will be also to look after change control on behalf of the project manager.Purpose Custodian and guardian of all overwhelm copies of the projects productsReceives, baselines and releases (issues) productsUpdates the product status and informs the Project ManagerMaintains the Issue Log.The major tasks of the configuration librarian are summarized as follows-To control the receipt, identification, storage and issues of all project productsTo provide information on the status of all productsTo number, record, enclose and swag change control documentsThe specific responsibilities of the configuration librarian are as follows- back up the project manager to prepare the configuration management planCreate libraries at other storage areas to hold products helper in the identification of productsCreate configuration item description records hold out the track copies of all project productsMaintain the change control recordsAssist in conducting configuration auditsLiaise with other configuration librarians where products required by the project are common to other systems(c) Bri efly outline what are the things that we must consider in change control of Project Management.In this hotel management system development, will develop several documents that include all the importance issues regarding to the development but sometime these document may need to be changed due to various reasons, when doing this changers it has to be done by desert procedures its called ChangeControl .The change control document is the formal way into this projects any query of a complaint or request, it can be raised by anyone associated with hotel project about anything such as-A new function circumstanceA frailer of a productIn meeting some aspect of the user requirementBecause of a possible misunderstandA problem with the planningA frailer of communicationThe change control mainly it has charge control document such as-Question document (when a question occurs about a change)It will be submitted to the configuration subroutine library and the configuration librarE-Commerce in FashionE-Commerce in FashionBackgroundE-commerce is in fashion so many companies of all sizes and types are reviewing their sales strategies. Consideration is being given to either (or both) selling to other businesses electronically (B2B) or selling directly to individual customers over the Internet (B2C).Many companies are failing to live up to expectations, with problems such as poor website design making ordering difficult, website failure (crashes) from overload or because they were incomplete, failure to confirm the order, subsequent out-of-stock, failure to deliver on time.The Project BriefYou, as the project manager, are to plan a project for a Triangle software house to develop an online Hotel Management system for an international hotel chain. The project is scheduled to start on6thof July 2010.The project should have the following optionsGuests Room Reservations for guestsServices Adding other services use, restaurant use, bar use by guestsMaintenance To maintain reco rds in the systemInquires To know about availability of rooms, reservations, gust listsFour computers have to be supplied for the selected project and these computers needs to be networked. Required time schedule for the project is three months.From the Project Managers point of view, an e-commerce project is no different from any other project. You need a framework to plan resources and budget you must set the plan against an appropriate calendar and you need to ensure that you include the managerial and quality-related tasks that will help the project manager succeed.You need to plan how the project should be initiated. However, your initiation plan should be presented in sufficient detail for someone else to manage it. You are not expected to have all the answers at this stage part of the skill of project planning is to ensure that you put the tasks in place to find out what is unknown and to manage the obvious risks.Task 1(a) As the Project Manager, you are expected to decide on the following1. The tasks required to carry out the project aim for at least 10-15 tasks.Traditional File System (SDLC-System Development Life Cycle)Strategic StudyBusiness studyFeasibility studyRequirement analysisRequirement SpecificationLogical system specificationLogical DesignPhysical DesignCodingTestingImplementationMaintenancePaste outRelate Traditional File System steps to Hotel management system Case Study.We use Traditional File System for Hotel management systemto develop their system.Strategic study Project Manager goes to the Hotel study the current system after he understood what the system that they need to develop is what they technology must use to develop the hotel.Business study- Project Manager prepare a document project initiation document this will give the general definition for the developing system that document shown to the hotel managing director we get the approval to proceed the development the new system.Feasibility study These step uses to tradi tional file system how to feasible for hotel computerizes Economical, Technical Operational, even the developing system is most modern if end users are working within difficulty that system isnt operational but this system is not difficulty use.Cost effective ways and ensuring that the investment can be recovered and realize the benefits with allocated budget.The technology needed is available and can be integrated with the other systems of the organization.Deciding how the new system going to fit the current operational system and whether its operationally acceptable.Checking whether the new project is violating law both local and internationalRequirement analysis Firstly we interview Hotel managing Director asked question about the current system what they want to include their system to computerize ..,.Investigating forms and documents which are very useful to determine system data flows and transactionsIdentifying the outputs by investigating below reports,Hourly reportDaily reportMonthly reportYearly reportThen Checking latest updated procedure manuals and user manualsTo study user activities and to concentrate on how it is being handle.Interviewing and supervisor level users to gather opinions about the efficiency about the system, determine the needs of the users that to be in the new system, more specific details about the system.Producing and arranging online Questionnaires for all operational users who are going to use the system. By this can gather information from all the people who are going to have direct contact with the system.Planning formal observation sessions at 3 main hotels, specially the reception areaAnd closely observing the activities performed by the users. And observing customer inquiries reservation process etcStudying a subset documents or subset of the activity in the area in order to get an impression of the whole activity or document set .it is useful to verify findings from interviews or the above discussed techniques.Requi rement Specification How the new computer system should be working this is a kind of the document which clearly specifies the requirement of the users. Use -Entity Relationship Diagram (ERD) Data Flow Diagram (DFD).Logical system specification- This hotel computerize system include several logical specification there are may be several technical option that could be adapted which are capable of delivering the requirement in this stage system analysis first design define what those technical options and then the help of manager select the most suitable option.Logical Design This step we design a dialog design initial interface are design Update process that change on the line system data and Enquiry process concern the interaction of useful information from system data.(we should involve the hotel manager very strongly specially dialog design influence how to system looks and behave to its users)Physical Design This step we design program design database design (ERD map into d atabase components), this stage provides all the information required by the programmer.Coding We use language is Visual Basic for coding.(First programmer code will be written in short pieces that outlines simple as well-defined program function.)Testing- we tested correctness testing, performance testing ,reliability and recovery testing then security testing stress testing usability testing, unit and integration testing external function testing ,system testing, regression testing, acceptance testing, installation testing, completion testing, test documentation.( discover and rectify errors below steps are planned to be done)Implementation- This stage involve preparation of the target side and making the environment the network here the hotel new system to target environment will done and prepare in the user manual and training the hotel worker for the New system. System will be installed shared in 4 computers which will be networked LAN (Configuration with I7 processors, 4 GB Ram..) With all required software.2. Decide on appropriate task dependencies and state durations of them.Task Duration (1= 1 day)ReferenceStrategic study 1 ABusiness study 1 BFeasibility study 1 CTechnical Feasibility2Operational Feasibility1Legal FeasibilityParallel with Op Feasibility(1)Economical Feasibility3Requirement analysis D(Forms and documents)1(Reports)1(Procedureuser manuals)1Interview-(Management level)3Interview-(Supervisor level)3(Questionnaires)1(Observation)2(Subset documentsactivity)1Requirement specification 3 ELogical system specification 2FLogical design 10 GPhysical design 20HCoding 5 ITesting J(Unit) 5(Integrated) 1(System)1(User)2DebuggingParallel with testing(8)KImplementation L(Installation)2(User Training)2(Parallel Running)7MaintenanceContinues until phase out.MTotal Duration81-The explained tasks in task 1 are shortened and listed down above, under task name.-The Duration 1 is equals to 1 day.-Maintenance starts after implementing the project until phas e out.-Total days for the project is 87-(81- planned days, and balances 6 days are to manage risks during the project period.(Table1.1)3. Create an Activity Net work Diagram with respect to your identified tasks,AND must be given using a standard Tool such as MS Project or MS VisioCritical path-A B C D E F G H I J LMS Project Output(b)There are many elements in a typical project plan. One such element is the Introduction which briefly describes the objectives of the project and the constraints, which affect project management. Prepare such introduction for this project using reasonable assumptions.List and explain with a sentence each other contents of a typical project plan.I am Nadeeshani and Im appointed as a project manager to develop this online hotel Management system for an international hotel chain by the triangle software house.The project is based on upgrading the existing system as an online system along with these main functions,Room reservations for guestsThe options to add other services like restaurant use, bar use, gym use, etcThe system which has the ability to obtain inquires from the guests and the ability to give them an answer/feedback, for example for the customer queries like availability of rooms, reservations and guest list, etc.And to get all the above updates and inquiries from the parties and to maintain the records in the systemWe hope to start the project on 6Th of July 2010 and we were going to be finished in September 30th 2010 (3 month) period.On that project running period we are considering Saturdays Sundays as working days. We hope to finished this project 26Th of September 2010.The project has run 87 days but we are planning to be completed within 82 days rest 5 days we are planning to do collecting unanticipated problems complete the project report however we will make sure to complete this project in this 87 days period.This is the project plan how we are going to do the project.I hope the committee members will do thei r best to complete the project.The quality of the system will be maintained throughout the project by regular progress checking and progress monitoring.The project has been run through the 13 stages.Strategic studyBusiness studyFeasibility studyRequirement analysisRequirement specificationLogical system specificationLogical designPhysical designCoding, TestingDebuggingImplementationMaintenanceThese stages are planned in a greater level of detail.(These plans are used to track progress on a week by week basis through regular progress monitoring.)These stages are also separated into sub tasks basically contains the lowest details. It will specify activities down to a daily level. This will be created in parallel with the above mentioned stage plans.And the monitoring and tracking will be on daily basis.As a project manager I hope we will be finished the project with less errors I believe you all are will be do your best. Clearly indicated whose responsible for what in the project, cl early shown what the project is to deliver, why and for whom and by making the project that can easily understand by everyone, mainly on time and within budgetMy motivation is to completely utilize my accumulated experience and knowledge to the fullest extent possible and making this projects a success.Task 2(a) Explain what are your typical responsibilities as a Software Project Manager in managing any type of software project and your typical tasksA software project manager has the overall responsibility for the successful initiation, planning, execution and closure of a project. A successful Project Manager must simultaneously manage the four basic elements of a project resources, time, money, and most importantly, scope. All these elements are interrelated. Each must be managed effectively. All must be managed together if the project, and the project manager, is to be a success.Resources People, equipment, materialTime Task durations, dependencies, critical pathMoney Costs, cont ingencies, profitScope Project size, goals, requirementsThis title is used in the construction industry, architecture, information technology and many different occupations that are based on production of a product or service.The project manager must possess a combination of skills including an ability to ask penetrating questions, detect unstated assumptions and resolve interpersonal conflicts as well as more systematic management skills.The role of the project manager encompasses many activities including -Planning and Defining Scope, Activity Planning and Sequencing, Resource Planning, Developing Schedules, Time Estimating, Cost Estimating, Developing a Budget, Controlling Quality, Managing Risks and Issues, Creating Charts and Schedules, Risk Analysis, Benefits Realization, Scalability, Interoperability and Portability Analysis,Documentation,Team Leadership, Strategic Influencing, Customer Liaison.As a software project manager my typical tasks in managing a software project will be below.Manage the production of the required product.Direct and motivate the project team.Plan and monitor the project.Manage business and project risks.Responsible for change control.Report the true progress report and stage assessment to the steering committee.Prepare the end project report.Responsible for project administration.Responsibility MatrixIn a large project, there may be many people who have some role in the creation and approval of project deliverables. Sometimes this is pretty straightforward, such as one person writing a document and one person approving it. In other cases, there may be many people who have a hand in the creation, and others that need to have varying levels of approval. The Responsibility Matrix is a technique used to define the general responsibilities for each role on a project. The matrix can then be used to communicate the roles to the appropriate people associated with the team. This helps set expectations, and ensures people know what is exp ected from them.On the matrix, the different people, or roles, appear as columns, with the specific deliverables in question listed as rows. Then, use the intersecting points to describe each persons responsibility for each deliverable.Ex(Table 2.1)A Approves the deliverableR Reviews the deliverable (and provides feedback).C Creates the deliverable (could be C (1) for primary, C (2) for backup). Usually there is only one person who is responsible for creating a deliverable, although many people may provide input.I Provides inputN Is notified when a deliverable is completeM Manages the deliverables (such as a librarian, or person responsible for the document repository)In the table above, the Requirements Management Plan is created by the project manager, approved by the sponsor and client managers, and reviewed by the project team and analysts.The purpose of the matrix is to gain clarity and agreement on who does what, so you can define the columns with as much detail as makes sense. For instance, in the above example, the Project Team could have been broken into specific people or the person responsible for creating the Data Model could have been broken out into a separate column. After the matrix is completed, it should be circulated for approval. If it is done in the Project Charter process, it can be an addendum to the Project Charter. If it is created as a part of the initial Analysis Phase, it should be circulated as a separate document.Examples of responsibility codes are as follows. Our project may define different codes, as long as you explain what they mean so that people know what the expectations are for them.Referenceshttp//www.lifecyclestep.com/open/407.0LifecycleRoles.htm(b) Briefly explain how you are going to manage the risk in the above project.Risk management is the process of analyzing exposure to risk and determining how to best handle such exposure. The project is planned to be a continuous process throughout the project until compl etion and considered in two main parts, the risk analysis part and the risk management part. I have planned to run risk management as below,At the start of the project, as a part of the decision of whether to undertake the projectAnd at every end stage assessmentsRisk management includes the following activitiesPlanning how risk management will be held in the particular project. Plan should include risk management tasks, responsibilities, activities and budget.Assigning risk officer a team member other than a project manager who is responsible for foreseeing potential project problems. Typical characteristic of risk officer is a healthy skepticism.Maintaining live project risk database. Each risk should have the following attributes opening date, title, short description, probability and importance. Optionally risk can have assigned person responsible for its resolution and date till then risk still can be resolved.Creating anonymous risk reporting channel. Each team member should have possibility to report risk that he foresees in the project.Preparing mitigation plans for risks that are chosen to be mitigated. The purpose of the mitigation plan is to describe how this particular risk will be handled what, when, by who and how will be done to avoid it or minimize consequences if it becomes a liability.Summarizing planned and faced risks, effectiveness of mitigation activities and effort spend for the risk management.As an analyzing tool to assist in the risk management process, Decision tree is used to analyze the risks,Because the explanation for the result is easily described by simple graph in a simply understandable way which can be combined with other decision techniques as well.Important details can be generated based on its alternatives, probabilities, costs and their preferences for outcomes.First after analyzing the possible risks by identifying,Estimating the effectiveness by comparing the likelihood with the impact of a risk and finally evaluatin g by confirming that they are in correct sequence and the cross checking with the risk reduction options assessing the acceptable level of each other.We select the most suitable risk management approach for each risk and a detailed plan of action which confirms its goals will be prepared by discussing with members.The risk management consist four main activities and below tasks will be completed at the end of each part.Planning-Most appropriate selection will be selected for each risk and a detailed plan of action which confirms its desirability and objectives will be developed.Sometimes this activity may proceed in parallel with risk evaluation.Resourcing-This will identify and assign the necessary resources to do the work and will confirm that the revised plan is feasible and cost effective.Controlling-This will make sure that the execution of the plan is having the desired effect on the risk.This will ensure the management of the risk process will apply effectively and it will mo dify the plan where it necessary.Monitoring-This will check the stages of the risk and also check that the counted measures are happening effectively.During monitoring, if it feels that the risk management plan is ineffective, then we can go back to the risk analysis part.When managing the risks these below features will be considered mainly,Factors that need to continue correctly, threats, systemic risks for the successful delivery project and benefits, risks to the business, risks for the customers and suppliers, risks of unexpected outputs and success of the international hotel chain.This is how I have planned to manage the risk, which can happen during a process and which will effect with a negative result to the process in the project.Task 3Configuration Management is an essential part of a project. In a large project Configuration librarian plays a major role.Configuration management (CM) is the detailed recording and updating of information that describes an enterprises hardw are and software. Such information typically includes the versions and updates that have been applied to installed software packages and the locations and network addresses of hardware devices. Special configuration management software is available.When a system needs hardware or software upgrade, a computer technician can accesses the configuration management program and database to see what is currently installed. The technician can then make a more informed decision about the upgrade needed.An advantage of a configuration management application is that the entire collection of systems can be reviewed to make sure any changes made to one system do not adversely affect any of the other systemsConfiguration management is also used in software development, where it is called Unified Configuration Management (UCM). Using UCM, developers can keep track of the source code, documentation, problems, changes requested, and changes made.(a) Briefly out line some configuration items in the p roject given in the scenario.Manage the configuration Hotel Management systemPlan what is required and how it will be achievedGuests Room Reservations for guestsServices Adding other services use, restaurant use, bar use by guestsMaintenance To maintain records in the systemInquires To know about availability of rooms, reservations, gust listsFour computers have to be supplied for the selected project and these computersneeds to be networked. Required time schedule for the project is three months.(Use a Configuration Management Plan (Project Quality Plan)Identify components of the final productUse Defining and Analyzing Products (PL2) to create a Configuration Item RecordUse unique identifiers for each product and each versionProjectProduct TypeProduct NameProduct Version.Control changes to baseline products by using change authoritySubmit products to the Configuration Librarian to put under configuration controlRelease (issue) products and/or copiesSProduct Status Account to record and report product informationReport the status of products from the Configuration LibrarianVerify product integrityPerform product configuration audits by the Configuration LibrarianPerform project audits by Project Assurance.In the above hotel management system developing project at each stage end as an output as below final deliverables will be reported.1st stage -Strategic study -information technology strategy will be produced.2nd stage Business study -project initiation document.3th stage Feasibility study- Feasibility report.4th stage -Requirement analysis- the gathered exact requirements of the users to develop the system will be produced as Requirement analysis report5th stage -Requirement specifications-the requirements will be produced in a diagrammatic way and a wordy report.6th stage Logical system specification -the mapped business and technical aspects of the system will be produced.7th stage Logical design- interface design will be produced.8th stage -Physical desig n -the database design and program design using miniature specifications like pseudo codes, flowcharts, structure diagrams, etc will be produced.9th stage -Coding- the written program which is written with a programming language will be produced.10th stage -Testing -testing report.11th stage -Debugging-debugging report.12th stage -Implementation- the released version of the system in the target environment.13th stage -Maintenance-reports regarding the changes carried out throughout the system after the implementation.(b) Give a statement of the configuration librarians responsibilities.Configuration Librarian is the guardian of all the master copies of the projects products. The role will be also to look after change control on behalf of the project manager.Purpose Custodian and guardian of all master copies of the projects productsReceives, baselines and releases (issues) productsUpdates the product status and informs the Project ManagerMaintains the Issue Log.The major tasks of the configuration librarian are summarized as follows-To control the receipt, identification, storage and issues of all project productsTo provide information on the status of all productsTo number, record, store and distribute change control documentsThe specific responsibilities of the configuration librarian are as follows-Assist the project manager to prepare the configuration management planCreate libraries at other storage areas to hold productsAssist in the identification of productsCreate configuration item description recordsHold the master copies of all project productsMaintain the change control recordsAssist in conducting configuration auditsLiaise with other configuration librarians where products required by the project are common to other systems(c) Briefly outline what are the things that we must consider in change control of Project Management.In this hotel management system development, will develop several documents that include all the importance issues regardin g to the development but sometime these document may need to be changed due to various reasons, when doing this changers it has to be done by stranded procedures its called ChangeControl .The change control document is the formal way into this projects any enquiry of a complaint or request, it can be raised by anyone associated with hotel project about anything such as-A new function occurrenceA frailer of a productIn meeting some aspect of the user requirementBecause of a possible misunderstandA problem with the planningA frailer of communicationThe change control mainly it has recharge control document such as-Question document (when a question occurs about a change)It will be submitted to the configuration library and the configuration librar
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.