StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Technology Assessment Plan - Research Proposal Example

Cite this document
Summary
This paper 'Technology Assessment Plan' discusses that the purpose of this technology plan is to evaluate the organization’s existing technology infrastructure and usage in order to make recommendations for future planning and direction…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.2% of users find it useful
Technology Assessment Plan
Read Text Preview

Extract of sample "Technology Assessment Plan"

? Technology Assessment Plan Introduction Purpose The purpose of this technology plan is to evaluate the organization’s existing technology infrastructure and usage in order to make recommendations for future planning and direction. 1.1 ToJa & FeNi Corporation ToJa & FeNi Corporation have existed for more than 2 decades and it requires improvement of technology details. ToJa & FeNi Corporation produce confectionery products basically chocolate of all kinds. The company is located at the market as trustful and dependable producer of high quality commodities for middle class customers at an affordable price. Nevertheless, the corporation has some internal challenges with information security and dynamic technology, thus the reason for enterprise technology plan proposal to assist manage the challenges adequately. 1.2 IT Management Structure The IT management structures comprises of for management posts with hierarchical functional delegation flow from top down ward. The management consist of Chief Executive Officer (CEO) as Todd Hoppens; Chief Information Officer(CIO) as Jared Campbell; Chief Technical Officer (CTO) as Felix Yanez; and finally IT VP as Nicholas Williams. Apart from the management team, there are implementation teams or IT experts that execute the technology plan. A reporting chart 1.3 Technology Plan Goals A technology roadmap is a plan that complement short-term and long-term objectives with precise technology solutions to assist meet those goals or objectives. It is a strategy that is applicable to a new product or procedure, or to an up-and-coming technology. Technology is very dynamic and ToJa & FeNi Corporation cannot remain on business if they do not capture new innovation of chocolate production. The objective of this plan is to recognize the IT Infrastructure requirements for the next 2 years for ToJa & FeNi Corporation by providing (Bolan, & Cullin, 2007): An inventory of current technology assets. IT Infrastructure documentation identifying future needs. A prioritized plan, including a budget, for addressing these needs. 1.4 Plan Review The technology plan is a responsibility of the ToJa & FeNi Corporation management and IT department. The CEO, CIO, CTO and IT VP are responsible for the plan execution. Technological review and update must be done as soon as a new technology emerges. So the company must always budget for technology upgrade. Innovation subsection must be created to assess technologies emergence and advise the management with proper recommendation. 2 Executive Summary The technology plan strategy of ToJa & FeNi Corporation involves: defining the accessible technology strategy; identifying the requirement; design, develop and purchase necessary technology; implement and train the staffs; and finally maintaining and continue learning. Technology plan is essential for the growth of the business. By focusing on its strengths, its major customers, and the fundamental values necessary, ToJa & FeNi Corporation will augment sales progressively in its first two years after technology implementation, while also sustaining the gross margin on sales, with a focus on cash management and working capital. This technology plan leads the way. It renovates the company’s vision and strategic focus: adding value to the target market share, and reinforcing connections with businesses in the local markets. It also provides the step-by-step plan for enhancing sales, production, gross margin, and profitability. Technology plan enhances the connection with relevant stakeholders through networking. Technology advances is the background and basis of any business progress thus the need for ToJa & FeNi Corporation to handle technology plan. The executive management must embrace the fact that technology is dynamic and need to be continues and planned for. Launched confectionary products are manufactured with the usage of the cut edge technologies. Modern high capability equipment, strict devotion to the production technologies, only high excellence raw materials ensures key strengths and high qualities of the ToJa & FeNi Corporation products. The company has been in existence for sometimes and has maintained the market share for the customers. In order to sustain this superiority, technology advancement plan is essential. 2.1 Statement of Needs Summary This section is essential since it highlight the point to point requirement for the company in quest for technology plan. ToJa & FeNi Corporation requirements for technology plan can be summarized as stated below: Future networking expansion requirements of the company Technology refresh program Business continuity plan Improve information security IT Asset Inventory 2.2 Recommendation Summary The statement of needs summary has provided the requirement summary that must be undertaken during the technology plan. Long-term requirements for ToJa & FeNi Corporation make it essential to analyze future networking plan to facilitate global business capacity. Technology changes necessitate review of the available technology and refresh programs accordingly. Disaster and accidents necessitate creation of awareness and influence the business continuity plan to enable the company function even after disruptions. Information security is handy to protect the company from unnecessary losses. Finally, innovation recommendation is a key technology strategy due to the quick nature of technology transformation. 2.2.1 Network expansion requirements Network expansion involves acquiring additional network apparatus to allow the company to be able to accommodate more work and also allow future expansion. In network expansion acquisition of new network garget with scalability is essential. Networks offer the connections and features that are needed now, while remaining flexible for expansion in the future. There are three regular reasons for expanding and advancing the network: More ports are needed More bandwidth is needed Peer-to-peer networking has become sophisticated ToJa & FeNi Corporation expansion plan would be enabled by expanding the existing capacity of network capability to a broader expansion capability. The extension would be to increase online business and mobile based services. 2.2.2 Technology refresh program Technology refresh program would entail the adoption of newer technology to manage changing needs or to alleviate the risk of obsolescence of current technology. The technology refresh is broadly applicable for the Corporation since it need substitute one-third to one-quarter of their Information Technology (IT) assets laptops, desktops, and other end-user computing gargets and servers each year on a rolling base (Argyros et al, 2007). As Information Technology transforms from a backend support unit to a strategic enabler, the function of technology refresh becomes significant and in current years, technology refresh has managed an expansion of its possibility, going beyond mere IT assets to all types of requirements that may form part of the IT setting. The technology refresh problem applicable here majors on the areas of IT such as software, hardware, facilities, processes and skill sets. Key drivers for technology refresh for ToJa & FeNi Corporation Company would be: Out-of-support technology Obsolete or aging technology Compliance Skill set shortage Cost Reduction Compliance Innovation Vendor Stability 2.2.3 Business Continuity Plan A Business Continuity Plan (BCP) is the least costly cover any company can obtain, especially for small corporations, as it costs almost nothing to produce. It details how workers will stay in touch and remain doing their jobs in the incident of a disaster or crisis, such as flames at the office. Regrettably, many corporations never take the time to create such a plan (Fulmer, & Rothstein, 2005). This is why it is a recommendation that ToJa & FeNi Corporation must implement to prepare uncertainty. BCPs are sometimes known as Disaster Recovery Plans (DRP) and the two shares much in common. However, a DRP should be based on recovering following a disaster whereas a BCP depicts how to carry on doing business until revitalization is accomplished. Key steps in BCP involve: Identify contingency equipment options Identify who can telecommute Document internal key personnel and backups Document critical equipment Document external contacts Identify critical documents Identify your contingency location 2.2.4 Improve information security ToJa & FeNi Corporation can take numerous steps toward building more safe networks and information systems. It is significant to start with a firm basis, which senior-level managers, Information Technology staff, and employees all through the organization appreciate and support. This may necessitate the recruitment of a chief privacy officer (CPO) or a chief security officer (CSO). Next, the management of the corporation must approach technology in a planned, systematic manner to assure that the technology it installs is protected (U.S, 2007). It is recommended to conduct vulnerability audits. The corporation must undertake the following to improve information security: Security execution throughout the infrastructure, not just on specific security devices Security and attack alleviation based on policy Secure administration and reporting Intrusion detection for critical resources and subnets Authentication and sanction of users and managers to vital network resources Support for up-and-coming networked applications 2.2.5 IT Asset Inventory One of the most significant steps in IT execution and IT security implementation understands the type of physical and virtual IT appliances a corporation owns and manages.  A good inventory gives information that is functional to daily system administration, business workplace asset tracking, and security occurrence response. To help in the procedure of creating IT asset records, the IT Security Office would initiate the management documents and templates for all departments with current inventories for the corporation (TAG Asset Management, 2005). 2.3 Projected Budget Summary The summary of projected budget for ToJa & FeNi Corporation is as follows: Sample Table 2.3 Total Budget for the Technology Assessment Plan (in thousands ($)) Recommendation Salary Software Hardware Other Costs Total Network expansion requirements   100 100 50 250 Technology refresh program   50 150 100 300 Business Continuity Plan 100 50 120 80 350 Improve information security 80 130 150 40 400 IT Asset Inventory   10 5 20 35 Total Estimated Cost 180 340 525 290 1335 3 IT Infrastructure - Current State Current infrastructure comprise of: Software procurement E-commerce application software Remote Access to Network Resources Virtual Marketing Opportunities Instructional Software Hardware, Facilities & Networking Equipment Components, Backup Tapes, Adabpters, Cables, Caching Appliance, Peripherals, UPS Backup Units, etc. Desktops (400) and laptops (200) Servers (6) Network Switches, Routers Digital Phone Operation, Maint, Upgrade, Communications Access TV/Video Upgrade Netsmart, Anti-Virus, Arc Serve, Novell, Firewall, Novell, Help Desk Internet Service Support and maintenance (RS, Skyward, SBC Digital Phone, Integration /Assessment Study of Network Environmental Scan for Successful Partnerships Administer the ETC evaluation to all employees 3.1 Current Information Systems ToJa & FeNi Corporation has existing ERP and other application software. Enterprise resource planning (ERP) is business management software that would permit ToJa & FeNi Corporation to utilize a system of integrated applications to administer the business. ERP software integrates all aspects of an operation, including product arrangement, development, production processes, sales and marketing. Decision Support application is adequate and managed by the management team (S?tuller et al, 2000). Database Management software to keep inventory and manage employees details is managed by IT department. Hierarchy of function is in place to facilitate reporting. HR management facilitates integration of employees’ details with company database to facilitate proper management of human resources. Customer Relationship Management, E-commerce, E-Business are application that assist to manage customers. 3.2 Current Information System Components Software procurement E-commerce application software Remote Access to Network Resources Virtual Marketing Opportunities Instructional Software Hardware, Facilities & Networking Equipment Components, Backup Tapes, Adabpters, Cables, Caching Appliance, Peripherals, UPS Backup Units, etc. Desktops (400) and laptops (200) Servers (6) Network Switches, Routers Digital Phone Operation, Maint, Upgrade, Communications Operation, Maint, Upgrade, Communications Access TV/Video Upgrade Netsmart, Anti-Virus, Arc Serve, Novell, Firewall, Novell, Help Desk Internet Service Support and maintenance (RS, Skyward, SBC Digital Phone, Integration /Assessment Study of Network Environmental Scan for Successful Partnerships Administer the ETC evaluation to all employees 3.2.1 User PC’s Available PC’s are 400 with the following specification: PC Specification Intel or AMD Processor Model No 2 GB SDRAM 160GB Hard Drive 48X Max CD/DVD Drive 19” Flat Screen Color Monitor Integrated Graphics Card Microsoft Windows XP Pro 3.2.2 Servers, Mainframes ToJa & FeNi Corporation uses IBM z10 2097 Enterprise Mainframe Server The IBM System z10 EC is a first-rate enterprise server intended to meet the business needs. The System z10 EC is instituted on the intrinsic strengths of the IBM System z display place and is designed to deliver fresh technologies and virtualization that give improvements in price and performance for key new workloads. 3.2.3 Database(s) ToJa & FeNi Corporation uses database system corp. products that are essential provides Call Center Technology products and outsourcing services. DSC developed CTI technology comprising an automatic phone response system applying IVR and ACD software. Phone systems can responds to calls employing both digital and analog phone lines. The company also uses Microsoft access to management database issues of the employees and inventory records. 3.2.4 Network Configuration Network configuration consists of stand alone platform to allow local networking. As pictured above the integration of internet would facilitate online services. Intranet and internet application would be handy due to the presence of connection of network components. 3.3 Information Security ToJa & FeNi Corporation can take numerous steps toward building more safe networks and information systems. It is significant to start with a firm basis, which senior-level managers, Information Technology staff, and employees all through the organization appreciate and support. This may necessitate the recruitment of a chief privacy officer (CPO) or a chief security officer (CSO). Next, the management of the corporation must approach technology in a planned, systematic manner to assure that the technology it installs is protected. It is recommended to conduct vulnerability audits. Consider policies, procedures, physical security, antivirus, external and internal threats, user rights/privileges, password security. 3.4 Business Continuity Plan The ToJa & FeNi Corporation BCD is currently in strategic place since contingency equipments are already in place. The Corporation has identified personnel to deal will telecommute during disasters (Fulmer, & Rothstein, 2005). Document internal key personnel and backups are already in place and operating. Document critical equipment and documented external contacts are well database with the company. Contingency location is already identified and budget for unfortunate occurrence of disaster is in place. Incase of vital system down time the corporation would relocate a few personnel to operate at the BCP sites. Data backup is carried out in as follows: Enterprise (Daily backup) Mid-level (weekly backup) Basic (Monthly Backup) Research Data (Less frequent, lower cost) Planned implementation 3.5 Technology Use Policy The ToJa & FeNi Corporation has to implement Enterprise Information Security Policy to ensure that corporation's technical resources are accurately protected, that the privacy and integrity of confidential information is enforced, that information resources are accessible when they are required and that users of these properties understand their responsibilities. Ethic code of conduct is implemented to retain customer, treating customer fairly and maintaining cordial working relationship with colleagues is emphasized. Network Security policy is implemented to guide the use of email and internet within the corporation so as to ensure that risks are avoided as much as possible. Encryption and other data protection methodologies are applied to ensure that data privacy is maintained. Installation of software on the system is carried by the IT officer who uses only certified versions of software to avoid malwares. Information access and distribution privileges are protected and given to only authorize personnel. 4 IT Infrastructure – Future Enhancements Technology advances and ToJa & FeNi Corporation embraces advances of IT infrastructure. The current system is adequate to operate and in future there is a budget for infrastructure upgrade. The technology innovation department is charged with responsibility of tapping new technologies and advising the corporation management for consideration. This is a process that is schedule for annual review. 4.1 Network expansion requirements The current network expansion program is not adequate enough to facilitate major scalability. The current deficiency of network expansion is limited due to space and facilities available. The expansion recommendation would necessitate the scalability of the network of the company through injection of adaptable components of network. There are three regular reasons for expanding and advancing the network: 200 ports are necessary to implement expansion. Increased bandwidth is support high data flow Peer-to-peer networking has become sophisticated 4.1.1 Hardware and software expansion 4.1.2 Network component expansion 4.1.3 Expert recruitment or out sourcing 4.1.4 Recommendation Expert Salary Software Hardware Other Costs Total ($) Network expansion requirements  150 100 100 50 400 Network component expansion 200 150 100 350 Expert recruitment or out sourcing 100 200 50 350 4.2 Technology refresh program Technology refresh program would entail the adoption of newer technology to manage changing needs or to alleviate the risk of obsolescence of current technology. The technology refresh is broadly applicable for the Corporation since it need substitute one-third to one-quarter of their Information Technology (IT) assets laptops, desktops, and other end-user computing gargets and servers each year on a rolling base. Out-of-support technology Obsolete or aging technology Compliance Skill set shortage Cost Reduction Compliance Innovation Vendor Stability 4.2.1 Technology integration 4.2.2 Compliance with technology regulation 4.2.3 Innovation program 4.2.4 Recommendation Salary Software Hardware Other Costs Total Innovation program  300 100 150 100 600 Technology integration 100 50 250 300 700 Compliance with technology regulation 50 100 200 50 400 4.3 Business Continuity Plan The ToJa & FeNi Corporation BCD is currently in strategic place since contingency equipments are already in place. The Corporation has identified personnel to deal will telecommute during disasters (Fulmer, & Rothstein, 2005). Document internal key personnel and backups are already in place and operating. Document critical equipment and documented external contacts are well database with the company. Contingency location is already identified and budget for unfortunate occurrence of disaster is in place. 4.3.1 Contingency Further Plans 4.3.2 Outsourcing Expertise to manage BCP 4.3.3 Backup Expansion 4.3.4 Recommendation Salary Software Hardware Other Costs Total Business Continuity Plan 100 200 500 150 950 Contingency Further Plans 100 100 50 250 Outsourcing Expertise to manage BCP 120 100 50 100 370 4.4 Improve information security ToJa & FeNi Corporation can take numerous steps toward building more safe networks and information systems. It is significant to start with a firm basis, which senior-level managers, Information Technology staff, and employees all through the organization appreciate and support. This may necessitate the recruitment of a chief privacy officer (CPO) or a chief security officer (CSO). 4.4.1 Network Security Policy 4.4.2 Information Security Policy 4.4.3 Security Auditing Principle policy 4.4.4 Recommendation Salary Software Hardware Other Costs Total Information Security Policy   100 100 50 250 Network Security Policy 100 50 120 80 350 Security Auditing Principle policy 80 130 150 40 400 4.5 IT Asset Inventory One of the most significant steps in IT execution and IT security implementation understands the type of physical and virtual IT appliances a corporation owns and manages.  A good inventory gives information that is functional to daily system administration, business workplace asset tracking, and security occurrence response. To help in the procedure of creating IT asset records, the IT Security Office would initiate the management documents and templates for all departments with current inventories for the corporation. 4.5.1 Advance database system 4.5.2 Outsourcing Expertise 4.5.3 Inventory management department 4.5.4 Recommendation Salary Software Hardware Other Costs Total Advance database system   100 100 50 250 Outsourcing Expertise   50 150 100 300 Inventory management department 100 50 120 80 350 IT Asset Inventory   10 5 20 35 References Argyros, G. L., Grossman, M., Rohatyn, F. G., Witkowsky, A., & Center for Strategic and International Studies (Washington, D.C.). (2007). The embassy of the future. Washington, D.C: CSIS Press. Bolan, K., & Cullin, R. (2007). Technology made simple: An improvement guide for small and medium libraries. Chicago: American Library Assoc. County Surveyors Society (Great Britain), & TAG Asset Management. (2005). Guidance document for highway infrastructure asset valuation. London: TSO. Fulmer, K. L., & Rothstein, P. J. (2005). Business continuity planning: A step-by-step guide with planning forms. Brookfield, Conn: Rothstein Associates. S?tuller, J., Pokorny?, J., Thalheim, B., & Masunaga, Y. (2000). Current Issues in Databases and Information Systems. Berlin: Springer. United States., & United States. (2007). Information security: Actions taken to improve Lockheed's special access document accountability : briefing report to the Chairman, Subcommittee on Oversight and Investigations, Committee on Energy and Commerce, House of Representatives. Washington, DC: The Office. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Technology Assessment Plan Research Paper Example | Topics and Well Written Essays - 3250 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1483221-technology-assessment-plan
(Technology Assessment Plan Research Paper Example | Topics and Well Written Essays - 3250 Words)
https://studentshare.org/information-technology/1483221-technology-assessment-plan.
“Technology Assessment Plan Research Paper Example | Topics and Well Written Essays - 3250 Words”, n.d. https://studentshare.org/information-technology/1483221-technology-assessment-plan.
  • Cited: 0 times

CHECK THESE SAMPLES OF Technology Assessment Plan

Medical Technology Assessment

nbsp;technology assessment in this instance therefore, will paint a real time picture of an organisations performance, its operations, workflow, and information processing.... nbsp; From this paper it is clear that technology assessment is the evaluation of emerging and existing technology trends to substantiate their existence in the world today.... technology assessment is viewed as interdisciplinary and capable of identifying and solving a wide range of technology based problems....
6 Pages (1500 words) Research Paper

Risk assessment 3

The main purpose of this report is to streamline the major risk factors and devising a mitigation plan for there resolution.... In this report I am going to present a detailed risk assessment and management strategy regarding the current situation of our company.... In this report I will present a risk assessment using quantitative method.... n this section I will present a detailed risk assessment using a quantitative method....
11 Pages (2750 words) Essay

Importance of Risk Assessment

Any assessment activity begins with the outlay of a plan and scope considering objectives, timing, input, output and responsibility requirements (Wenyuan 21).... It further ensures relevance of consequential risk assessment and management plan to important organizational objectives.... The paper “Importance of Risk assessment” will discuss risk assessment, which refers to the process of systematic identification, evaluation, and valuation of the levels of potential risks in a situation, their comparison against standards or benchmarks....
6 Pages (1500 words) Research Paper

TECHNOLOGY PLAN: NEEDS ASSESSMENT

Technology has also helped in their grading especially in the CTE courses in institutions that offer to the standards that are required, for instance Technology plan: Needs Assessment Briefly introduce and describe your school district or charter school.... TUDENT LEARNING NEEDSAfter reflecting on your current realities and the Arizona Long-Range Strategic Educational Technology plan, please include a bulleted list for any student learning items or issues that are neededThe wireless capacity at the School and Elementary is overwhelmed by the number of Student devices that we wish to connect....
2 Pages (500 words) Assignment

Assessing Different Assessment Strategies

This paper looks into different kinds of assessments used in the K12 setting and evaluates their advantages, disadvantages, and the roles they play in the overall evaluation plan, in day-to-day and weekly instructional decisions, and ineffective planning for future assessments … Assessments do not merely provide information as to how much a student has learned, they also provide venues to allow students to learn more.... Perhaps the only thing that is certain regarding different assessment strategies is the extent of diverse utility that comes along with the administration of each strategy  Assessments are a vital part of the education system and a crucial element in tracking students' progress inside the classroom....
8 Pages (2000 words) Research Paper

Technology Assessment Plan for ToJa & FeNi Corporation

This report "Technology Assessment Plan for ToJa & FeNi Corporation" evaluates the organization's existing technology infrastructure and usage in order to make recommendations for future planning and direction.... The corporation has some internal challenges with information security and dynamic technology, thus the reason for the enterprise technology plan proposal to assist manage the challenges adequately.... nbsp; The technology plan strategy of ToJa & FeNi Corporation involves: defining the accessible technology strategy; identifying the requirement; design, develop and purchase the necessary technology; implement and train the staff, and finally maintaining and continue learning....
12 Pages (3000 words) Report

Role of Technology Assessment to the Company

This paper is about the role of technology assessment to the company.... technology assessment has continued to evolve resulting to various changes in the company's information technology sector.... technology assessment helps in planning for the company.... technology assessment is considered a vital planning tool apart from making the policy makers informed.... The company utilizes the technology assessment tool as an approach to improving decision making process in the company as well as understanding the future of business environment (Freeman, 2000)....
6 Pages (1500 words) Literature review

Impact of Data Security on Enterprise Information Security Planning

Types of Risks Included in the assessment plan According to Allen (2013), risk assessment includes several threats to enterprise data security such as unauthorized access, loss of data in physical terms, transit data interception, and corruption of data as well as inappropriate handling of data by other hands.... olicies and ProceduresSTDFAOR (2014) chronicles that current organizational managers in modern organizations get a lot of worries while creating the risk assessment plan....
13 Pages (3250 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us