Search for notes by fellow students, in your own course and all over the country.

Browse our notes for titles which look like what you need, you can preview any of the notes via a sample of the contents. After you're happy these are the notes you're after simply pop them into your shopping cart.

My Basket

You have nothing in your shopping cart yet.

Title: CIS 590 Strayer University Final Paper
Description: These notes show how to do the final project and will give the viewer an idea of what is expected on the final delivery

Document Preview

Extracts from the notes are below, to see the PDF you'll receive please use the links above


Project Deliverable 6
Running head: PROJECT DELIVERABLE 6 : FINAL PROJECT PLAN

Project Deliverable 6: Final Project Plan
Strayer
Directed Research Project
CIS 590
June 3, 2014

1

Project Deliverable 6

2

Project Deliverable 6: Final Project Plan
Background
The Meeganism Company is an Internet-Based company founded in 2005 with gross
revenue of $35 million dollars per year
...
The new company would be called the Defense Design Global Corporation
(DDGC)
...
Meeganism currently uses operational systems and a relational database but as
result of the merger the newly formed company is expected to expand into data warehousing
...
The CEO also wanted to explore the idea of using cloud based technologies and
virtualization but after the recent breech with the Target Corporation is very hesitant
...


Table of Contents

Project Deliverable 6
1
...
1 Scope and Control Measures ………………………………………
...
2 Goals and Objectives ………………………………………………
...
3 Estimated Cost Analysis ……………………………………………
...
4 Project Plan Solution Competitive Advantage ……………………
...
5 Solution Providers and Cost analysis …………
...
5
...
Cost analysis…………………
...
Chapter Two: Project Deliverables (Project Plan and Business Requirements)
2
...
2 Current State of the Company …
...
3 Type of Business the company is engaged in ………………………
...
4 Speculation on Outsourcing and Offshoring opportunities ………
...
4
...
Outsourcing ……………………………………
...
4
...
Offshoring ……………………………………………
...
5 Description of current information systems ……………………
...
5
...
Operating Systems, Databases and Data warehousing … 24
2
...
1
...
Operating Systems …………………
...
5
...
2
...
25
2
...
2 Cloud Technology and Virtualization ………
...
5
...
27
2
...
7 Constraints and Assumptions…………………………………………31
2
...
32

3

Project Deliverable 6
2
...
33
2
...
34
2
...
36
2
...
1 Outsourcing ………………………………………………
...
11
...
37
2
...
Chapter Three: Project Deliverables (Database and Data Warehouse Design)
3
...
1
...
40
3
...
2 Performing new types of Analysis …………………………40
3
...
3 Cost Reduction Accessing Historical Data ………………
...
1
...
1
...
2 Database Schema ………………………………………………………42
3
...
44
3
...
46
3
...
Chapter Four: Cloud Technology and Virtualization
4
...
49
4
...
51
4
...
52

4

Project Deliverable 6 5
4
...
54
4
...
Chapter Five: Network Infrastructure and Security
5
...
2 Logical and Topographical Layout of a planned network ………… 60
5
...
1 Current Network Layout …………………………………
...
2
...
60
5
...
3 Planned Network Layout…………………………………
...
2
...
61
5
...
62
5
...
63
5
...
64
5
...
1 Policy ………………………………………………………
...
5
...
5
...
66
5
...
4 Information Security Definitions ………………………… 67
5
...
5 Information Security Responsibilities …………………… 67
5
...
6 Information Classification ………………………………
...
5
...
Chapter Six: Summary and Conclusion …………………………………… 80
Definition of Terms ………………………………………………………………84
References ………………………………………………………………………
...
1 Scope and Control Measures
The official name of this project is called “Big Combo” because of the combination of
the two companies into one
...
This will also include the purchase of new equipment
and infrastructure so that band width and daily operations will not be a factor
...
With a data warehouse managers and executives will no longer
need to make business decisions based on ones gut or limited data
...
1)
...
Cloud based
computing is a great way to run business but there are hazards along the way that
a company needs to be aware of when implementing this type of technology
...
This will need to be as transparent possible in order not to disrupt
business flow
...
Expanding from 25 employees to 65

Project Deliverable 6
is going to be no easy task but it can be a whole lot simpler when the data is

7

organized across the company
...
After the
new system is implemented training will need to be provided as well as stress testing so to test its
reliability
...
It is necessary for the change management process in order to control scope so that
the project does not suffer from scope creep
...
Changes to scope will be documented using an electronic change control
form
...
Any
changes affecting a solution provider would need to be reviewed with that solution provider who
would then agree any type of necessary contract revisions or payments
...
Further a Work
Break Down Structure or (WBS) will be created so that the project team can think through all
levels of the project and identify the major tasks that need to be performed for the project to be
completed on time
...
Getting feedback from the end-users
during the project will provide a way to improve the process and assure that the customer is
happy
...
2 Goals and Objectives
The overall goal and objective of this project will be to merge both Meeganisn and
Veritas into a mother company called the Defense Design Global Corporation
...
This would include
setting up physical space so to take advantage of work environments and
collaborations within groups
...
Giving the people who need the information access to the
information
...




A definitive exploration of cloud based technology and how it might help in
everyday business operation with the consideration to security of company data
and systems
...


1
...
The cost factors the average new
computer systems and mobile devices for both the staff of Meeganism and Veritas
...
The computer will be leased so to cut cost and to stay current with
the latest technology offerings by refreshing the systems every 3 years
...


Project Deliverable 6
It was mentioned that integration of different technologies should include input from

10

different solution providers so to incorporate industry best practices in connection with the
development of technological solutions for the project
...
The budget allocated for
solution providers is $50,000
...
This includes the Project Manager, Business
Analyst, Warehouse Staff, System Administrators, Developers, Testers, Analysts, Network
Engineers, and Database Administrators
...
salary
...
Individual salaries were divided by 2080 (Which is the total when you multiply 40
hours per week by 52 weeks per year) to get the hourly rate of the Staff
...
This was the biggest cost center and a budget of $364,000 is set aside for Project Staff
...
The network
includes the implementation of new routers and firewalls to accommodate traffic between its
staff and customers
...
Budgeting for
network on this project is set at $65,000
...
Since office space rent is based on per square footage and the companies are
taking three floors in the building $75,000 will be budgeted for Additional Office space needs
...
This is until the computer system information is pulled
off the systems, stored and then wiped and the documents are older than their 6 years life cycle
...

Money set aside to research the option of cloud technology through the solution providers
by setting up a pilot study has been requested by the CEO
...

It was determined that $75,000 would be set aside to carry out the pilot program
...
Cloud Providers charge
per gigabyte per month
...

Amazon Redshift includes important features that will put the IaaS on an equal playing field with
industry leaders
...
The cost estimate for the Cloud Computing
Storage portion of Big Combo is $2700 for 6 months
...
14
$25
...
83
$33
...
85
$44
...
85
$36
...
54
$36
...
29
$42
...
16
$42
...
41
$43
...
46

$77,105
...
08
$1,278
...
46
$8,969
...
08
$26,548
...
00
$14,615
...
62
$3,545
...
69
$56,267
...
84
$23,408
...
23
$3,076
...
85


$83,952
...
6981





Cost Centers For Big Combo
Cost Center

Annual Cost

Computer Systems (70)

$ 45,500
...
00

Salaries For Project Staff

$ 363,562
...
00

Additional Office lease

$ 75,000
...
00

Project Research

$ 75,000
...
00

Total

12

$ 681,762
...
4 Project Plan Solution Competitive Advantage
Frequently one can find small companies taking care of business the way it has been done
it in the past without stopping to see if there is a better, more efficient way to do things now
...
Instead one should sometimes ask “Why is the competition selling more than our
company if the methods are not broke?” well, that company did not wait for the companies
something to break down
...


The project plan solution will provide a competitive advantage for DDGC by increasing

Project Deliverable 6
revenue, increasing productivity and reduce operating cost and help secure the privacy of the

14

company’s customers and employees
...
What’s the company’s fastest growing
market segment? In what region? How Fast? Is it a long term trend or a blip on the screen?
With the data warehouse these questions will be at the tips of the companies’ employee’s fingers
...
Some of the areas that the data
warehouse could be setup to help with could be:

● To determine order to shipment or deployment time trends
...

● To analyze staff hiring and training effectiveness based on salary and turnover
...

● To analyze customers according to profitability
...
So far through the pilot program DDGC has
realized that cloud computing and virtualization has increased the speed to market and new
services for buyers and consumers, as well as vendors and system integrators
...

● The cloud increases the speed it takes to obtain services through access on demand
...
This means no middle men
...

● DDGC realized the potential for faster cash flow from the cloud service pay as one
goes verses through capital expenditure investments
...
This is because backing up a fully virtualized
infrastructure by making copies of VM files is far easier than trying to do the same
with disparate hardware servers
...


In the end the competitive advantages of the information technology with in the project
plan will catapult DDGC to even new heights that will produce increased revenue for years to
come
...
5 Solution Providers and Cost Analysis
DDGC sent out a Request for Proposal (RFP) outlining the interests of the company to
five different companies and has narrowed the field down to three companies who have shown
that they have the necessary requirements of fulfilling the needs of the project
...

● The necessary client software to support and obtain information that is needed on
demand by DDGC when requested from it’s the solution provider
...

● A 24 x 7 x 365 support staff that is readily available in the case of any issues or
events that might transpire
...

● The assurance of Secure Data
...
999% availability of system and
network resources
...


The companies that DDGC has picked have proven track records as solution providers in
the world of IT
...
Amazon Redshift (AWS) – Known for providing fast query performance by
using columnar storage
...
One can easily add or remove
nodes from the cluster as the performance and capacity needs change
...


Project Deliverable 6 17
2
...
Getting started with BigQuery requires no additional capital
expenditures to buy
...
9% uptime (Google Developers
[GD], n
...
, p
...

3
...
It
was built in Auto Scale so it enables a company to dynamically scale up or down
to meet needs (Microsoft, 2014, ¶ 4)
...
Windows Azure Active Directory is a complete identity and access
management cloud solution
...


1
...
1 Cost Analysis – On Demand / Reserved

Project Deliverable 6

18

(Hosseini, 2014, p
...
On demand lets the company pays as they go, which enable them to
conduct low cost experiments and point of care (POC) or to spin up and tear down environments
for development or test purposes
...
A typical customer will switch to Reserved Instance after
running experiments and POC’s to validate production configuration
...


Project Deliverable 6

20

Chapter 2 Project Deliverables
2
...
Veritas is
a multinational company that will be merging with Meeganism Software Company to form the
Defense Design Global Corporation
...
The Defense Design Global Corporation will provide software and
infrastructure that would benefit the two companies
...
The technology and designs need to keep pace with the ever changing techniques and
applications of Information Technology, so that a continuation in growth can be achieved by
reducing operational cost and increasing revenue streams
...
2 Current State of the Company
Currently Meeganism Software is an IT company with twenty five employees
...
Meeganism Software Company is looking forward in
merging with the Veritas Company because it will provide the Meeganism Software Company
an international presence as well as visibility
...

Currently the Meeganism Software Company has two Master degree level and three
Bachelor degree level programmers that have years of experience working with various

Project Deliverable 6 21
languages and in-house technology
...
The solution will be either hosted, on-site or a
hybrid of both
...

All Hardware and Software related items will be redesigned to be transparent in order to
maintain business continuity
...
The Defense Design Global
Corporation will integrate different technologies from different solution providers and then
incorporate industry best practices in connection with the development of technological systems
...
The CEO read a report that he received from one of his LinkedIn colleagues which
stated how the Cloud Passage Company organized an exercise to demonstrate how simple it is to
run the live server exploitation of cloud environments that are poorly configured and
compromise the technology within 4 hours (Paganini, 2014, ¶ 3)
...




Merge the two companies and expand from 1 to 3 floors
...




Project Deliverable 6
Redesign software and hardware to meet the new organizations needs using a

22

hosted, on-site or hybrid solution
...




Explore cloud technologies and how it might provide service to the new
corporation securely
...


2
...
Currently the main focus of the Meeganism Software
Company and Veritas companies is to combine systems so that the systems are easy to use after
the merger so that business continuity remains in place with no interruptions
...
Within the IT
departments of both companies, Network Logical and Network Physical will be tasked by the
Project manager to carry out and expansion of the network
...
The Wan will support sales, marketing,
and accounting internally, as well as the customers externally
...

The new system will also focus on its customer base to ensure what they are used to seeing and
using pretty much stays the same
...
1)
...

2
...
4
...
Outsourcing
Outsourcing is contracting out an entire business function, a project or certain activities to
an external provider
...
If the company considers truly being competitive in any
market by cutting down overhead costs, providing efficient productivity and profitability, having
quality service at cheaper rates, maximizing uptime, staying ahead of the competition and a
having sense of security then outsourcing will be required by Defense Design Global
Corporation
...
With this in mind it is crucial that a company choose
the right outsourcing partners
...
4
...
Offshoring
Offshoring refers to getting work done in a different country usually to leverage cost
advantage
...
Software development is now a
global process
...
S
...
India alone exported over $5
billion dollars in 2000, over 65% of this went to the United States
...
But offshoring is often criticized for transferring jobs to other countries
...


2
...
While the relational database was a necessity at one point and time, bigger more
advance technology has replaced them in the form of Data Warehousing
...
A Data Warehouse must be designed in order for
the Defense Design Global Corporation to have a competitive advantage
...
5
...
Operating Systems, Databases and Data warehousing
2
...
1
...
This is so that data is processed
efficiently and so that the integrity of the transactional data is maintained
...
Designers of Operational systems follow a set of rules when designing databases with
integrity called the Codd rules
...
Codd in order to keep
database software vendors honest
...
Codd defined five rules of normalization
and fully normalized database design often resulted in information from business transactions
being stored in dozens of hundreds of tables
...
The
databases have very fast insert/update performance because small amounts of data in the tables
are affected each time a transaction is processed
...

2
...
1
...

Warehouses can contain a wide variety of data that presents a coherent picture of business at a
single point
...

Defense Design Global Corporation would like to make use of Data Warehousing
...

Data Warehousing has many advantages as it relates to business
...
Data Warehouses can deliver advanced business intelligence
...
Data Warehousing as it relates to business

Project Deliverable 6 26
intelligence can be applied to the business process which includes business segmentation,
inventory management, financial management and sales
...
Data Warehouses save time in the short and long term
...

This leads to rapid informed decision making that were made from pulling the
information from multiple sources
...

3
...
Data from various
departments are placed into a standard format that can be easily read
...

4
...
This helps in making
future predictions
...
In a study by the International Data Corporation it
mentioned that the Average 3 year ROI was 401% with an average payback of 2
...
1)
...
5
...

Positioning applications and services from a cloud can give a company operational benefits
without the capital expenses of maintaining on premise environments
...


27

Defense Design Global Corporation wishes to use Cloud Technology to solve issues with
combination of both companies’ huge repositories of data so to keep resource planning and
infrastructure growth costs low
...
Acumatica
requires no client software to run so it can be maintained inexpensively and centrally managed
...
Information that employees have
access to is tailored to their needs and reports are distributed as a need to know basis
...

Veritas uses NetSuite cloud Software for their Accounting, CRM and Ecommerce
...

The Defense Design Global Corporation decided to consolidate NetSuite into Acumatica
because of recent news from many trade journals
...
Customers that switch to Acumatica can choose to deploy the
application on premise or as a SaaS, and pay an upfront license or annual subscription (Johnson,
2011, p
...

2
...
3 Network Infrastructure and Security
The Network for the Defense Design Global Corporation needs to have a robust as well
as expandable network
...
A separate wireless network will be
provided for vendor as well as customer access to the web
...
The wall jacks connect to a switch in a network
closet
...
The devices owned by the Defense Design Global
Corporation are all assets tagged for tracking and manageability purposes
...
The Logical
Design naming convention Key – Division (D) Country (C) Site (S) Usage Type (U) Numbering
Scheme (XXX)
...

The switches are segmented out between floors through VLAN’s and report to a central
router that is in the data center
...
The secured
data center is located on the bottom floor in a controlled environment with raised floors and fire
system
...
In order to gain access into the Defense Global Corporation network, traffic needs to
pass through a Check Point Firewall
...

CPF-1 is software that is installed on a separate operating system, which provides the protocol
stack, file system, process scheduling and other features needed by the product
...
CPF-1 automatically blocks and then logs any oversized
packets or packets that appear to be part of a SYN flood
...

2
...

The “Big Combo” project will include the development of the following:
● Re-engineering of the data warehousing storage system will provide more space
so that the data of both companies can be stored
...
Since a record is, technically, something that a
company needs to keep around for a set period of time, either for regulatory, legal or business
reasons only important data will be considered for conversion beyond five years
...


30

Testing will include only stress tests of the new database warehouse, stress testing of the newly
formed companies network, and testing from a third party group to ensure that the network
cannot be compromised
...
Training will be for staff and employees will be as a per needed basis and will include
maintenance as well as routine usage
...

The Business Process Reengineering (BPR) model focuses more on work process rather
than on employee specific issues
...
For organizations operating under
overly large parameters, BPR can prove to be an efficient tool and solution to downsizing cost
...
Organization around the desired results and not the tasks
...
Identification of all processes in an organization and prioritizing them in order to
redesign urgency
...
Integrate information processing work into the real work that produces
information
...
Treat geographically dispersed resources as though they were centralized
...
Link parallel activities in the workflow instead of just integrating the results
...
Put the decision point where the work is performed, and build control into the
process
...
Capture information once and at the source
...
It is necessary for the change management process in order to
control scope so that the project does not suffer from scope creep
...
Minor changes within scope will need to be approved
by the project manager
...

Changes to scope and contract revisions would need the approval of the Change Control Board
...
7 Constraints and Assumptions
The following constraints have been identified:
● Both Companies had different ways to keep track of historical records
...

● There are different routing protocols and methods used on both companies
networks
...

● The project has a limited time frame to complete the project
...

● The new system will need to support at least 65 employees
...


Project Deliverable 6 32
● Failure to identify changes to project deliverables within the time specific in the
project timeline could result in project delays
...

● The project sponsor will encourage support and “buy-in” of project goals and
objectives
...

● Data moves and upgrades will have minimal effect on business continuity
...

● Dedicated Staff will cross train one another
...
8 Risks
The following Risks have been identified as possibly affecting the project during
its progression:
● Within the next 6 months the two individual internet based companies will be
located within the same building
...
The risk level is high and is a certainty
...
The Risk level is high and is a
certainty
...
The risk level is high and is a certainty
...

● The risk of implementing cloud technology incorrectly leading to a breach of
information
...


33

● Often team members will be persuaded to make a change without using the
approved procedure where it seems necessary but minor
...
9 Integration with other Systems
Meeganism is an internet based company with gross revenues of more than $35
million dollars per year
...
The combination of the two companies will form one company called the Defense
Design Corporation
...
The information within the data
warehouse, the analytics interface, the cloud technology and the infrastructure security
will be integrated with one another (Lewis, 2007, p
...
It is the responsibility of the
business unit to inform IT of other business initiatives that impact the project
...

● Expansion of the database and data ware housing
...

● Research of a possible cloud based system and virtualization with the proper
security protocols in place
...


Project Deliverable 6
Development of a Human Resources Management System (HRMS)
...
10 Personnel Requirements
Below is an assessment of Human Capital needed and Skill Set:
1
...
3)
...
Project Manager – The Role of the Project Manager is to make sure the project is completed
from beginning to end
...
This person needs to be able to work well under pressure and are comfortable with
change and complexity in dynamic environments
...

3
...
This person needs to be a problem solver and have the skills
necessary to look at data and other relevant information in order to determine where the losses
are within a company
...
Developer – These people need to be creative when it comes to computer programs
...
This may involve developing the underlying systems that run the devices or
controls the network
...
Functional Lead – These people should be highly structured in order to manage business

35

inquiries
...
Their role will be to
facilitate the relationship between the solution providers and the company
...
Information Support Specialist – The role of Information Support specialist is to provide
help and advice to people and organizations using computer software or equipment
...

7
...

The skill set of these engineers include knowledge of network operating software, security
software, cloud software and virtualization
...
Systems Analyst – A Systems Analyst should be very familiar with the company’s current
systems, procedures and design information systems solutions to help the organization operate
more efficiently and effectively
...

9
...

10
...

They should have a complete understanding of how to manage computer systems and deliver IT
projects
...

11
...
The responsibility includes making sure the computer works as

Project Deliverable 6
designed; creating and completing detailed test plans which define the tests that will be

36

performed on the computer system before it is put into production
...
Testing Lead – This role is to effectively lead the testing team
...

13
...
Duties can include inventories, logistics and housing of product
...
Database Administrator – In this role a person is responsible for setting up databases
according to the company’s needs and making them run more efficiently, fine tuning, upgrading
and testing modifications as needed
...
11 Outsourcing and Offshoring Speculation for the project
2
...
1 Outsourcing
Outsourcing refers to an organization contracting work to a 3rd party
...
This type of activity is one that the company does better
than any other company and the reason why people do business with them
...
It makes more sense and is more efficient to outsource
...

● Labor Flexibility – Companies can easily ramp up or cut ranks as needed
...

It is easier to answer questions in regards to Cost Management or Project Management but it is
not so easy to estimate the ROI or to do it precisely (Jedd, 2004, p
...
Also when one considers
outsourcing one must first determine if the particular effort lies within the companies own core
competency
...

One of the benefits that makes Outsourcing attractive to the Defense Design Global
Corporation is that consultants help ensure that best practices are followed which goes along
with the expectations of the CEO to integrate different technologies from different solution
providers and incorporating best practices in connection with the development of technological
systems
...

The decision would be to use some outsourcing but not outsourcing the project in its entirety due
to the risk that could be involved with the compromise of sensitive company information
...
11
...

● Cost – Wages are usually lower in other countries so tasks can be completed
cheaper than if they might have been done state side
...

● Skills – There is usually a better availability of skilled resources in other
countries
...
This comes in the form of political skepticism
because both workers and politicians feel that it is a catalyst for the stealing of jobs
...

At this time the Defense Design Global Corporation is not interested in Off-Shoring work
on this project
...

Some of the factors that were taken into consideration were:


A decrease in communication due to time zones



A decreased visibility into project status



A dynamic and ever changing project priorities



The cultural differences between customer and vendor countries

In a nut shell offshoring work changes the rules for managing security and privacy of
data as well as protection from intellectual property
...
12 Cost Projections for Staffing and Infrastructure

Project Deliverable 6

39

3
...
1 The need for relational databases and data warehousing
The concept of a data warehouse for decision support traces back to about 1990 and the
works of Bill Inmon, Ralph Kimball, Barry Devlin and Paul Murphy
...
1)
...
Relational database are
designed for query and analysis as compared to transactional processing
...
A
relational database is also well structured and a resourceful method of organizing, managing, and
reporting data
...
This allows for integrating data from multiple sources, performing
new types of analysis, cost reduction accessing historical data and access to executive

Project Deliverable 6 40
information
...
The need for data warehousing arises as the business becomes more complex and
starts to generate and gather a large amount of data which is cumbersome to manage in
traditional ways
...
1
...
By merging data from multiple sources onto one
platform, organization can retain the functional capabilities of the original sources while
broadening the business value of data by enabling other functional units of the organization to
use it
...

3
...
2 Performing new types of Analysis
It is not a surprise that data warehouse help one make decisions faster
...
This provides simplification of the data model by flattening it
so that it makes the data faster and simple to understand as well as compose queries
...

The data warehouse also allows one to do a multi-level trend analysis
...
Most reporting, data analysis and visualization tools take advantage of the underlying data
model to provide powerful capabilities such as drill down, roll-up, drill-across and various ways
of slicing and dicing data (Maheshwari, n
...
, p
...

3
...
3 Cost Reduction Accessing Historical Data
An organization can reduce the infrastructure cost of data warehousing by identifying
inactive data and off-loading the data onto inexpensive clusters
...

Since the Defense Global Corporation has mandated to keep several years’ worth of data, a data
warehouse enables users too quickly and easily access data on an ongoing basis
...

3
...
4 Executive Information System (EIS)
This information is used by executives to access and manage the data they require to
make informed business decisions
...
The data warehouse operates in
the EIS most effectively
...
1
...
The data quality forms the accuracy, timelines, meaningfulness and the
integrity of the data
...

The data acquisition and cleansing process should be carefully designed for the data
warehouse so that the cleansing process produces accurate data processing
...
Meta Data is
important and should be designed to share among different components in the Data Warehouse
...
1)
...

3
...
For the entries one would make a table and

Project Deliverable 6 43
relationship that be defined depending on the type of association between then
...
Page – Each page URL is unique in itself so it will be designated as the primary key
...
Visit – Each page will have one or more visits, notice that primary key will also act as a
foreign key
...
Client – Since a client name cannot be a unique identifier one needs to generate an ID field
that will act as a primary key
...

4
...

5
...

6
...

The Primary Key of Status Code also acts as a foreign key in respective tables
...
TimePeriod – Allows for detailed information on visits
...


Project Deliverable 6

Tables of the Database Schema

44

Project Deliverable 6

45

3
...
An entity is a piece of a data an object or concept
about which data is stored
...
The client forms the service receiver of the company
...

One page can have many visits
...
A status code can have many visits
...
One registered user
can have more than one visit which causes the data to be recorded and stored in Time Period
...
Registered user is given payment
for their feedbacks
...
4 Data Flow Diagram (DFD)

46

Project Deliverable 6 47
The Data Flow Diagram (DFD) is a graphical representation of the flow of data
through an information system
...
The DFD lets you visualize how the system operates, what the
system accomplishes and how it will be implemented, when it is refined with further inspection
...
5 Illustration of Data Flow

48

Project Deliverable 6

49

4
...
1 The Need for Cloud Technology and Virtualization
Life before cloud computing and virtualization was very complicated and expensive;
Computing depended traditional business application
...
A whole team was needed to
install, configure, test, run secure and update them
...

With cloud technology if a company’s IT department is not capable of moving fast
enough, any other department now can go online, find a software-as-a- service application and
provision that application themselves relatively easily
...

Cloud computing is described as a stack because of the broad range of services built on
top of one another under the name “Cloud”
...
With SAAS a provider can license and
application to a customer through a subscription such as a “Pay-as-you-Go” model or a no
charge when there is a chance to generate revenue through streams other than the user such as
from advertisements
...

PaaS is an outgrowth of SaaS and is a way to rent hardware, operating systems, storage and
network capacity over the network
...
Rather than
purchasing servers, software, datacenter space or network equipment, one can buy them fully
outsourced
...
A device such as a computer that is
dedicated to an end user or allocated to running specialized software is just too expensive
...
Virtualization and Cloud computing
provides a greater standard as it pertains to security, availability and data protection
...
This is because data can be
stored off site across many redundant locations and backed up
...
This
is what cloud technology offers
...
2 Assessment of expected cost savings in hardware infrastructure
The need for costly hardware and an in-house Technical department is virtually
eliminated when a company adopts Cloud Technology and Virtualization
...
IaaS allows the customer to rent network equipment as to owning it, thus reducing
the cost associated with a data center
...
Managed IT service fees are similar to
or less than the operating costs of an onsite data center solution
...

Cloud Technology and Virtualization can have a drastic change on how business pays for
its technology and handles associates risks by reducing the cost related to the future purchases of
hardware
...

Cloud Technology and Virtualization also provides quicker and more cost effective
disaster recovery and damage mitigation
...

Cloud Technology and Virtualization supports business growth and innovation by
providing a much needed agility to react to business changes which frees up more resources to be
invested in innovation related projects
...
Operating expenses can be lowered with
cloud computing compared to in-house information systems
...
3 Reductions of human capital that can be realized from implementing Cloud and
Virtualization Technology
Human Capital Management (HCM) is an approach to employee staffing that perceives
people as assets (human capital) whose current value can be measured and whose future value
can be enhanced through investment
...
Depending on the competency of the cloud computing provider, most
companies will receive support and expertise that far exceeds what they could possibly afford to
recruit on their own (Joyent, 2012, ¶ 7)
...
Virtualization technologies like a reusable template changes the server management
model, reducing the number of separate images each administrator needs to manage, allowing
them to manage an order of magnitude more systems
...
4)
...
EMA compared management of a
physical environment compared to management of a virtual VM environment
...
4)
...
4 Illustration of how Cloud and Virtualization Technology could align with the
company’s business processes
Internet data Center (IDC) has become a strategic initiative for Cloud service providers to
attract users
...
33)
...


Internet Data Center Cloud

Project Deliverable 6

55

4
...
Cloud technology and Virtualization can help by providing improved Data Reliability
as well as Data Security and Reliability
...

Virtualization increases server efficiency by not only saving on energy and cooling costs
but also allowing the business to cut down on their capital expenses by having fewer servers and
not having a need to replace aging ones
...
Backing up a fully virtualized infrastructure by making
copies of VM file images is a far easier process then trying to do the same with desperate
hardware
...
The most common source of failure in
the data center is more than likely, failure of server hardware
...

Since the company will be developing software, virtualization gives the business the
opportunity to lower costs by eliminating the need to fork out money for additional hardware
...

Virtualization makes it easy to test out new software updates or security patches prior to
the deployment to systems
...
The
advantage to this is that since all processing is done on the server, client devices are typically
thin clients that serve as an end node to connect input / output devices such as keyboard, mouse,
display and audio connections nothing more
...
Security in the cloud benefits from one installation for several users rather than
the need to install an application on every end device (Britt, 2008, ¶ 3)
...
The cloud layer can also filter internet access to prevent
network user from downloading unapproved content
...




The ability to inform staff of the latest security threats and strategies used by
hackers
...




Project Deliverable 6
Routing of all network request such as email and server access through a

57

centralized, protected connection that stays up to date with the latest security
protocols, blocking any threats before they get to the network
...
All companies can benefit from efficient operations along with improved reliability
and security
...
The cloud will continue to evolve as the foundation for the future
Internet where we will be interconnected in a web of content and services
...
1 Possible Network Infrastructure Vulnerabilities
In these times where more and more companies are relying on the internet to
conduct business it is crucial to make sure that the company has a sound network infrastructure
...
Downtime
results in a loss of revenue that can be calculated down to the second
...
What they found was that more than $26
...
Network Infrastructure needs to have availability and an uptime of
99
...
56 minutes for planned maintenance
...


Project Deliverable 6
A network infrastructure refers to the hardware and software resources of an entire

58

network that enable network connectivity, communication, operation and management of an
enterprise network
...
There are
two main classifications to network infrastructure
...

The logical infrastructure component of a network consists of the software that is required to
enable connectivity between devices as well as providing network security
...

SHODAN (Sentient Hyper-Optimized Data Access Network) is a search engine that lets
a person find specific types of computers (Routers, Switches, Servers) on the internet using a
variety of filters
...
Cybersecurity researchers have even
located command and control systems for nuclear power plants and particle accelerating
cyclotron by using SHODAN (Goldman, 2013, ¶ 4)
...
Constant vigilance needs
to be at the forefront in regards to network infrastructure security
...
A hacker will take advantage of every vulnerability angle or loophole so that they
can exploit, and many times profit from a network with the information obtained
...


Project Deliverable 6
A configuration weakness is where a device, program or application might not be

59

configured correctly so that it fails and can easily be bypassed by a hacker
...
An example of how easy it is to find and
exploit a device can be found on the web site RouterPassword
...
This lists many popular
router makes with their default passwords
...

A technological weakness or vulnerability was summed up earlier in this paper, every
device has a weakness or limit that if reached could start to malfunction
...
Legacy equipment’s is a good example to illustrate weakness and vulnerability of
network equipment
...
Many companies keep this technology around in order to
cut costs in the short run, but in the long run they risk having data stolen
...
New threats are combining into blended attacks that
simultaneously exploit a variety of vulnerabilities
...
Without updated equipment and the
visibility newer equipment can provide an administrator can spend too much time and effort
trying to keep up
...
This
is a phrase that should resonate through companies because it is a very strong argument for a
strong security policy
...
Security weaknesses occur
when there is no clear or written security policy
...
2 Logical and Topographical Layout of a planned network
5
...
1 Current Network Layout:

5
...
2 Current Logical Layout:

Project Deliverable 6
5
...
3 Planned Network Layout:

Planned Logical Layout:

61

Project Deliverable 6

62

5
...
The CEO of the new company was leery of cloud and
virtualization offerings because of Security issues especially in light of some trade journals that
he read in regards to breaches with in other companies and how hackers were able to steal
records and sell them on the black market
...
There are four
main servers that store information which are the File Server, Web Server, Mail Server and the
Database Server
...


Project Deliverable 6 63
In the Planned Network Layout section for Defense Design, there is a scaled back to the
infrastructure used to support business by making use of the three cloud services which are IaaS,
PaaS, SaaS
...
The
cost will be offset by the savings in the cost, depreciation of new equipment and the amount of
power consumed and staffing if a full blown server room was in place
...

Defense Design will use the SaaS model as a way to regulate software distribution within
the company
...
The company will pay as they go for
software that they use per seat
...

Defense Design will be able to develop, test, host, maintain and share in-house software
that they created by using PaaS
...
PaaS also allows
for development of team collaboration by providing project planning and communication tools
...

Secured VPN access will be provided to mobile employees of the company so that they
can access the database, web, file, application and mail server while they are remote
...


Project Deliverable 6 64
Physically the planned network layout has two PIX ASA 5500 firewalls one to monitor
incoming and outgoing traffic to the internet and one to monitor incoming and outgoing traffic to
the Cloud service provider
...
The router that will handle both the
Internal and External traffic will be the Cisco ISR 4451-AX
...

5
...
Internally at headquarters there are two PIX firewalls to
monitor incoming traffic from the web and one from the Cloud Provider
...

Network Administration will be monitoring the firewalls constantly
...
Cisco developed the proprietary distance-vector Interior Gateway Routing Protocol
to meet the needs of customers requiring a robust scalable routing protocol (Oppenheimer, 2011,
p
...
The reason the Defense Design Corporation decided EIGRP is because of its scalability
and load balancing capabilities
...

In this case the Cloud servers will be stored off site at the Cloud Providers Locations
...
The cloud provider’s vested
interest is in maintaining data integrity and business continuity for the Defense Design
Corporation
...

5
...
Governmental agencies, as an example discuss security policy in terms of national security
and interaction with foreign states
...
An information security policy provides rules for protection of the
information assets of an organization (Whitman & Mattord, p
...
The Security policy for the
Defense Design Corporation will begin on the next page
...
5
...
It is the policy of the Defense Design Corporation that information, as defined
hereinafter in all its forms which include written, spoken, reordered electronically or
printed is protected from accidental or intentional unauthorized modification, destruction
or disclosure throughout its life cycle
...

B
...
All activities identified by the
policies and procedures must also be documented
...
All documentation must be

Project Deliverable 6 66
periodically reviewed for appropriateness and currency, a period of time to be determined
by each entity within the Defense Design Corporation
...
At each entity and/or departmental level, additional policies, standards and procedures
will be developed detailing the implementation of this policy and set of standards, and
addressing any additional information system functionality in such entity and / or
department
...
All systems
implemented after the effective date of these policies are expected to comply with the
provisions of this policy
...


5
...
2 SCOPE
A
...

B
...

C
...

5
...
3 RISK MANAGEMENT
A
...
The analysis will examine types of threats,

Project Deliverable 6
internal or external, manmade or natural, electronic or non-electronic that affects the

67

ability maintain business continuity
...
Finally, the analysis will also provide an evaluation of the
information assets and the technology associated with its collection, storage,
dissemination and protection
...
The
frequency of the risk analysis will be determined
...
Based on the assessment, measures will be implemented that reduce the impact of the
threats by reducing the amount and scope of the vulnerabilities
...
5
...

Confidentiality: Data or information is not made available or disclosed to an
unauthorized person or process
...

Involved Persons: Every worker at the Defense Design Corporation, no matter their
status
...

Risk: The probability of loss of confidentiality, integrity, or availability of information
resources
...
5
...
Information Security Officer: The information security officer (ISO) for each entity
has the responsibility for working with user management, owners, custodians and end
users to develop and implement security policies, procedures, and controls, subject to the
approval of the Defense Design Corporation
...
Making sure security policies, procedures, and standards are in place and adhered to
...
Providing basic security support for all systems and users
...
Advising owners in the identification and classification of computer resources
...
Advising systems development and application owners in the implementation of
security controls for information on systems, from the point of system design, through
testing and production implementation
...
Performing Security Audits
...
Providing on-going employee security education
...
Performing security audits
...
Reporting regularly to the Defense Design Corporations Oversight Committee on
entity’s status with regard to information security
...
Information Owner: The owner of a collection of information which is usually the
manager responsible for the creation of that information or the primary user of that
information
...
The owner may delegate ownership responsibilities to another individual
by completing the Defense Design’s information delegation form
...
Knowing the information for which he or she is responsible
...
Determining a data retention period for the information, relying on advice from the
Legal Department
...
Enduring appropriate procedures are in effect to protect the integrity, confidentiality,
and availability of the information created with in the unit
...
Authorizing access and assigning custodianship
...
Identifying the controls and communicating the control requirements to the custodian
and users of the information
...
Reporting promptly to the ISO the loss or misuse of the Defense Design Corporation’s
information
...
Initiating corrective actions when problems are identified
...
Prompting employee education and awareness by utilizing programs approved by the
ISO, where appropriate
...
Following existing approval processes within the respective organizational unit for the
selection, budgeting, purchase and implementation of any computer system or software to
manage information
...
Custodian: The custodian of information is generally responsible for the processing
and storage of the information
...
The responsibilities may include:
1
...


Project Deliverable 6

70

2
...

3
...

4
...

5
...

6
...
Prompting employee education and awareness by utilizing programs approved by the
ISO, where appropriate
...
Reporting promptly to the ISO the loss or misuse of the Defense Design Corporation’s
information
...
Identifying and responding to security incidents and initiating appropriate actions
when identified
...
User Management: Defense Design Corporation’s management who supervise user
as defined below
...
Reviewing and approving all requests for their employee’s access authorizations
...
Initiating security change requests to keep employees security record current with
their positions and job functions
...
Promptly informing appropriate parties of employee terminations and transfers, in
accordance with local entity termination procedures
...
Revoking physical access to terminated employees which can include confiscating
keys and changing combination locks
...
Providing employees with the opportunity for training needed to properly use the
computer system
...
Reporting promptly to the ISO the loss or misuse of the Defense Design Corporation’s
information
...
Initiating corrective actions when problems are identified
...
Following the existing approval process within their respective organization for the
selection, budgeting, purchasing and implementation of any computer system or software
to manage information
...
End User (User): The user is any person who has been authorized to read, enter or
update information
...
Access information only in support of their authorized job responsibilities
...
Comply with Information Security Policies and Standards and with all controls
established by the owner and custodian
...
Keep personal authentication devices confidential
...
Report promptly to the ISO the loss or misuse of the Defense Design Corporation’s
information
...
Initiate corrective actions when problems are identified
...
5
...
Regardless of classification the integrity and accuracy of all classifications
of information must be protected
...
Information must be

72

classified accordance to the most sensitive detail it includes
...
The following
levels are to be used when classifying information:
A
...
Confidential Information is very important and highly sensitive material
...

Examples of Confidential Information may include: personnel information, key
financial information, proprietary information of commercial research, sponsors, system
access passwords and information file encryption keys
...
Unauthorized disclosure of this information to people without a business need for
access may violate laws and regulations or may cause significant problems for the
Defense Design Corporation, if customers or its business partners
...

B
...
Internal Information is intended for unrestricted use within the Defense Design
Corporation, and in some cases within affiliate organizations such as Defense Design
Corporation’s business partners
...

Examples of Internal Information may include: personnel directories, internal policies
and procedures, most internal electronic messages
...
Unauthorized disclosure of this information to outsiders may not be appropriate due to
legal or contractual provisions
...
Public Information
1
...

2
...


5
...
7 COMPUTER AND INFORMATION CONTROL
All involved systems and information are assets of the Defense Design Corporation and
are expected to be protected from misuse, unauthorized manipulation, and destruction
...

A
...

B
...

C
...
) that ensures all electronic files are scanned for viruses
...

D
...
This is to ensure appropriate levels
of access by internal workers; a variety of security measures will be instituted as
recommended by the Information Security Officer and approved by the Defense Design
Corporation
...
Authorization: Access will be granted on a “need to know” basis and must be
authorized by the immediate supervisor and application owner with the assistance of the
ISO
...
Context based access - Access control based on the context of a transaction
...

b
...
Each user is assigned to one or more predefined roles, each of which
has been assigned the various privileges needed to perform that role
...
User based access: A security mechanism used to grant users of a system access
based upon the identity of the user
...
identification/Authentication: Unique user identification (user id) and authentication is
required for all systems that maintain or access Confidential and Internal Information
...

a
...
Strictly Controlled Passwords
a2
...
Tokens in conjunction with PIN
b
...

c
...

d
...

3
...
Below are some methods to ensure Data Integrity:
a
...
Transaction Audit
c
...
Encryption of data at Cloud Provider
e
...
Transmission Security: Technical security mechanisms must be put in place to
guard against unauthorized access to data that is transmitted over a communications
network, including wireless networks
...
Integrity Controls
b
...
Remote Access: Access into the Defense Design Corporation’s network from the
outside will be granted using the Defense Design Corporation’s approved devices and
pathways on an individual user and application basis
...
Confidential and Internal Information that is stored or accessed
remotely must maintain the same level of protections as information stored and accessed
within the Defense Design Corporation’s network
...
Physical Access: Access to areas in which information processing is carried out must
be restricted to only appropriately authorized individuals
...
The area in and around the computer facility must afford protection against
fire, water damage, and-other environmental hazards such as power outages and
extreme , temperature situations
...
Any workstation computers containing Confidential and Internal Information
must be in a secure area to prevent theft, destruction or access by unauthorized
individuals
...
Facility access controls must be implemented to limit physical access to
electronic information systems and the facilities in which they are housed, while
ensuring that properly authorized access is allowed
...
Contingency Operations – Documented procedures that allow facility
access in support of restoration of lost data under the disaster recovery
plan and emergency mode operations plan in the event of an emergency
...
Facility Security Plan - Documented policies and procedures to
safeguard the facility and the equipment from unauthorized physical
access, tampering, and theft
...
Access Control and Validation – Documented procedures to control
and validate a person’s access to facilities based on their role or function,
including visitor control, and control of access to software programs for
testing
...
Maintenance records - Documented policies and procedures to
document repairs and modifications to the physical components of the
facility which are related to security
...
Emergency Access:
a
...

E
...
Each entity must develop
and implement policies and procedures that govern the receipt and removal of hardware
and electronic media that contain Confidential and Internal Information into and out of
the facility, and the movement of these items within the facility
...
Information Disposal / Media Reuse of:
a
...
Magnetic media (Disk Drives)
c
...
Accountability: Each entity must maintain a record of the movement’s
hardware and electronic media and any person responsible therefore
...
Data backup and Storage: When needed, create a retrievable, exact copy of
electronic Confidential and Internal Information before movement of equipment
...
Other Media Controls:
1
...
) must be protected from theft and unauthorized access
...
Further, external media containing Confidential Information must
never be left, in unattended in unsecured areas
...
Confidential Information must never be stored on mobile computing devices
(laptops, smart phones, tablet PC’s, etc
...
Power-on Password
b
...
Encrypted stored data or other acceptable measures approved by the
ISO
3
...

H
...
Electronic Mass Data Transfers: Downloading and uploading Confidential
and Internal Information between systems must be strictly controlled
...

Applicable Business Associate Agreements must be in place when transferring
Confidential or Internal information to external entities
...
Other Electronic Data Transfers and Printing: Confidential and Internal
Information must be stored in a manner inaccessible to unauthorized individuals
...

I
...
Further, procedures must be implemented to regularly review
records of information system activity, such as audit logs, access reports, and security
incident tracking reports
...

J
...
This includes the use of

Project Deliverable 6 80
cellular telephones in public areas
...

Caution should be used when conducting conversations in semi-private rooms, waiting
rooms, corridors, elevators, stairwells, cafeterias, restaurants or on public transportation
...
Contingency Plan: Controls must ensure that the Defense Design Corporation can
recover from any damage to computer equipment or files within a reasonable period of
time
...
This
will address the following:
1
...
A data backup plan must be documented and routinely updated to create
and maintain, for a specific period of time, retrievable exact copies of
information
...
Data backup must be stored in an off-site location and protected from
physical damage
...
Backup data must be afforded the same level of protection as the
original data
...
Disaster Recovery Plan: A disaster recovery plan must be developed and
documented which contains a process enabling the entity to restore any loss of
data in the event of fire, vandalism natural disaster, or system failure
...
Emergency Mode operation Plan: A plan must be developed and

81

documented which contains a process enabling the entity to maintain business
continuity in the event of fire, vandalism, natural disaster, or system failure
...
Applications and Data Criticality Analysis: The criticality of specific
applications and data in support of other contingency plan components must be
assessed and documented
...

One of the companies called Meeganism grosses 35 million dollars per year and the other
company Veritas is a multinational company of equal size
...
Big Combo is the project
name that will be used to identify the project that will:
● Expand the size of the current environment from 1 to 3 floors and
maximize productivity and put the floor space into good use within 6
months
...

● Expand the current systems to use Data Warehousing
● Determine if a hosted, on-site or hybrid solution model will fit the way
that The Defense Design Global Corporation does business
...
This is in the hopes that the
incorporation of best practices will be used to combine networks and
update existing needs
...

The expansion from one to three floors will require some consideration in regard
to hardware to link the two additional floors
...
A Human Relationship Management System
will be put into place to keep track of staff that is already occupying the building in the
Meeganism Company and for the additional people that Veritas will be bringing on
board
...
Redshift from
AWS is a petabyte scale data warehouse that is designed for analytic workloads which
connects to standard SQL-based clients and business intelligence
...
Most common administrative tasks associated with provisioning,
configuring, monitoring and backing up, and securing a data warehouse are automated
(Rouse, 2013, p
...
In an article dated March 26th 2014 Amazon announced a new round
of price cuts for a number of services on its cloud platform which included RDS cloud
databases (Lardinois, 2014, p
...
For the first terabyte of data, Amazon S3 will only
charge $
...
024 for reduced redundancy storage
...

For this reason the Defense Design Global Corporation has decided to use Amazon’s
service to host their Data Warehouse
...
It will also free up more room for future human capital expansion, and in
the case of data recovery protects them against any catastrophic events that might happen
at their site
...
Security is a major concern when it comes to the Cloud and
Virtualization
...
The Defense Design Corporation CEO was concerned about
events that have recently happened for a good reason
...
Here are four security
vendors and the way that they protect Cloud Computing and Virtualization:
1
...
Malware detection, DLP enforcement, and activity
monitoring tools complement a wide variety of encryption and
tokenization options including AES 256-bit encryption
...


2
...
Halon addresses the challenges of
securing virtualized and cloud environments by providing virtual and
software versions of its email security platform, load balancer, and

Project Deliverable 6
security router for deployment in VMWare, KVM, Xen and Hyper-V

84

environments as well as others (Chao, 2014, ¶ 5)
...


Securlert: Based out of Santa Clara with offices in Israel, Securlert
addresses protection using its elastic sandbox
...
Many customers use this to enhance their onsite premises security infrastructure, such as Network Access Control
(NAC), Firewalls and SIEM devices for enhanced responsive attacks
(Chao, 2014, ¶ 8)
...


Bromium: Based out of Cupertino, the company’s V-sentry product
takes the principles of virtualization and applies them at the micro level to
make machines, in theory, unassailable
...
This allows anything to
happen without affecting the machine (Chao, 2014, ¶ 10)
...
The
Defense Design Corporation looks favorably on efforts of these companies and looks forward to
becoming a total cloud based company in the near future
...
Below is the definition of terms that will help one understand the verbiage of the
project
...

Big Combo – This is the name of the project to combine the Information Technology
systems of the Meeganism Software Company with the Veritas Company
...

Business Continuity – This is the activity performed by an organization to ensure that
critical business functions will be available to customers and other entities that must have those
functions
...

Database Warehouse – A collection of Data designed to support management decision
making
...

Human Resource Management System (HRMS) – This is a software application that
combines many human resource functions including benefits administration, payroll, recruiting,
training and performance analysis and review into one package
...


Project Deliverable 6

86

References
Barry, D
...
Common Warehouse Metamodel (CWM)
...
Retrieved
from http://www
...
com/articles/webservices/common_warehouse_meta-model_cwm
...
(2013)
...
Wired
...
wired
...
(2012)
...
Voices on Project Management
...
pmi
...
html
Britt, P
...
Cloud Security vs
...
WebRoot
...
webroot
...
R
...
What Are the Differences Between Cloud Computing and Virtualization?
...
Retrieved from http://ezinearticles
...
(2014)
...
Enterprise
Networking Planet
...
enterprisenetworkingplanet
...
html
Engineer, W
...
(2010)
...
Hubpages
...
hubpages
...
Reducing Operating Expenses (OpEx)
with Virtualization and Virtual System Management [White paper]
...
vmware
...
pdf
Ertel, D
...
Best Practices for Effective Scope Management
...
Retrieved from
http://spendmatters
...
(2013)
...
CNNMoney
...
cnn
...
d
...
Retrieved March 18, 2014, from https://developers
...
com/bigquery/sla
Harris, C
...
IT Downtime Costs $26
...
InformationWeek
...
informationweek
...
(2014)
...

RightScale Cloud Management
...
rightscale
...
(2004)
...
PM, 1 - 2
...
pmsolutions
...
pdf

Project Deliverable 6 88
Johnson, D
...
Companies Switch from NetSuite to Acumatica for Cloud ERP
...

Retrieved from http://www
...
com/article/2011/04/20/idUS174150+20-Apr2011+BW20110420
Joyent (2012)
...
Retrieved from
Joyent Web Site: http://www
...
com/content/06-developers/01-resources/23-mythsand-realities-of-cloud-computing/myths-realities-cloud-computing
...
(2001)
...
SearchSQLServer
...
techtarget
...
(2014)
...
Tech Crunch
...
com/2014/03/26/in-response-to-google-amazon-announces-massiveprice-cuts-for-s3-ec2-and-rds/
Lewis, J
...
The Project Manager’s Desk Reference (3 ed
...

Mah, P
...
Six Reasons Small Businesses Need Virtualization
...
Retrieved from
http://www
...
com/article/697804/Six_Reasons_Small_Businesses_Need_Virtualization
?page=3&taxonomyId=3112
Maheshwari, R
...
d
...
Retrieved February 3, 2014, from
http://www
...
com/upload/31082006072229
...
(2014)
...
Retrieved from
http://www
...
com/en-us/solutions/

Project Deliverable 6 89
Miles, L
...
Keeping customers first in merger integration
...
bain
...
aspx
Oppenheimer, P
...
Top-Down Network Design (3rd ed
...

Paganini, P
...
Hackers have compromised a misconfigured cloud server in less than 4hh
...
Retrieved from
http://securityaffairs
...
html
Pariseau, B
...
Google IaaS to add reserved instances, autoscaling to take on AWS
...
Retrieved from
http://searchcloudcomputing
...
com/news/2240215706/Google-IaaS-to-addreserved-instances-autoscaling-to-take-on-AWS
Power, D
...
What are advantages and disadvantages of data warehouses?
...
Retrieved from
http://dssresources
...
php?action=artikel&id=180
PowerDesigner 16
...
1) [Computer manual]
...
Available from Sybase:
http://infocenter
...
com/help/index
...
sybase
...
dc38088
...
html
Rosencrance, L
...
Top Five Benefits of a Data Warehouse
...
Retrieved from
http://spotfire
...
com/blog/?p=7597
Rouse, M
...
Amazon Redshift
...
com
...
techtarget
...
(2014)
...

SearchCloudComputing
...
techtarget
...
A
...
3 Employees You Need To Fire
...
Inc
...
inc
...
html
Whitman, M
...
, & Mattord, H
...
(2010)
...
Boston,
MA: Cengage
...
(2008)
...
Retrieved from
http://books
...
com/books?id=jLNGCPs6rr4C&pg=PA37&lpg=PA37&dq=Consolid
ated+IDC+fabric&source=bl&ots=iypMmnJRP6&sig=_x7k3lu43_l47vSL0HRGUXDcs
Qs&hl=en&sa=X&ei=gYv9UryAMpKCyAH47oDADA&ved=0CCsQ6AEwAQ#v=onep
age&q=Consolidated%20IDC%20fabric&f=false


Title: CIS 590 Strayer University Final Paper
Description: These notes show how to do the final project and will give the viewer an idea of what is expected on the final delivery