BSA 425 University of Phoenix Customer Relationship Management Report

User Generated

Hfre9000

Computer Science

BSA 425

University of Phoenix

BSA

Description

Conducting research and creating a supporting research report serves two important purposes with respect to your project:

  1. It explains your technological choices in terms of business benefits and risks. This explanation is crucial for executive approval.
  2. It either reinforces or improves your plan--but only if you apply the results of your research to a new draft of your plan. In the industry, project managers develop their plans iteratively and change them as they conduct more research and identify better or cheaper alternatives. This iterative approach is especially relevant to IT projects because new technologies are developed and forced to retire at a very quick pace.

For this assignment, you will conduct research and create a supporting research report. Then, based on your research, you will identify and explain the rationale for three improvements to the project plan you submitted last week.

Download the Supporting Research Report template.

Conduct additional research on your project's industry, recommended technology vendors, and the categories presented in the Supporting Research Report. You may want to include the Gartner Group and Forrester Research in your list of organizations to research.

Complete the Supporting Research Report template in full (all sections complete).

Create a second draft of your project plan. Highlight in yellow the three changes you made to the second draft based on the in-depth research you conducted this week, and explain why you made the changes.

Combine the Supporting Research Report, along with the updated Second Draft of your Project Plan, into one Microsoft

Word© document.

Submit both your Supporting Research Report and second draft document as a single document. I do not want separate documents for the assignment.

Unformatted Attachment Preview

Project Plan Draft BSA/425 v1 Page 1 of 12 University of Phoenix Material Project Plan Draft Instructions: Fill out each of the sections below with information relevant to your project. Be sure to include the company name associated with your project. ENTER YOUR COMPANY NAME Customer Relationship Management (CRM) Project Plan Draft Network Technology Recommendations Network Technology Selection Criteria Selection Criteria Name Selection Criteria Description Selection Criteria Value (Weighting In Points) RELIABILITY A reliable network is essential to run a business. 80/100 SIMPLICITY The simple technological user interface allows the user to move around the technology easily 76/100 POWER EFFICIENCY A power-efficient technological network reduces power consumption and, in return saving business expenditure. 70/100 COST Every business has the opportunity to way different options and consider the best price. The budgetary constraints of an organization allow them to cost analysis, various providers. 90/100 Network Technology Recommendation Recommended Network Technologies Description Benefits Aggregate Selection Criteria Score LAN (Local Area Network) The network is used to connect groups using low voltage devices such as switches over short distances. The network devices are therefore able to share resources across the network. It is secure flexible, and portable. 70/100 PAN (Personal Area Network) The smallest most basic type of network is made of wireless modem, phone, or printer. It is a network found within a small office or residence. It is portable, restrictive, and personalized. 90/100 MAN (Metropolitan Area Network) They are the connection of networks MAN Operates on a wireless basis or cable. The over a large area, especially in towns. area covered by MAN is larger and more useful It's maintained and managed by a small as it serves more people. or large company Copyright © 2018 by University of Phoenix. All rights reserved. 50/100 Project Plan Draft BSA/425 v1 Page 2 of 12 WLAN (Wireless Uses a wireless network to connect local area devices within a significant locality like a network) town part. Coverage is more extensive, does not need cables to connect, and is usable in numerous technological devices. 40/100 Network Technology Vendor Selection Criteria Selection Criteria Name Selection Criteria Description Selection Criteria Value (Weighting In Points) Price The price of any commodity is essential. The cost of a network vary significantly by the needs of the organization, 50/100 Quality of product The type of product being bought for networking services needs to be of high quality to serve the client for a more extended period. 70/100 Customer service The customer is always the most critical aspect of a business. Customer service determines whether the customer will require your services next or not. References The more references a network gets, the better it is at delivering its intended purpose. Lesser texts mean the least prominence 90/100 40/100 Network Technology Recommended Vendors Vendor Name Cisco Vendor Strengths Vendor Weaknesses Have a variety of Their products are other working expensive, too networks over a many errors in the low network area long period. and high power usage. Products / Services Provided To Project Aggregate Selection Criteria Score Network for operating connections within our organization. 60/100 Microsoft Provide Their products Give enough network and applications for use in the applications become outdated office computers compatible with fast, and clients other network need a new one for technologies, better features. and has been a big player in the technology world. 85/100 IBM A significant Expensive and IBM offers high-quality networking services with fast player in the tech exaggerated and effective connectivity. industry provides network services quality the with a products for sophisticated user specialized interface for users. purposes 75/100 Oracle High-quality Expensive and Categorical network service provider for both Copyright © 2018 by University of Phoenix. All rights reserved. 60/100 Project Plan Draft BSA/425 v1 Page 3 of 12 products overrated design hardware and software Network Technology Deployment Challenges Deployment Challenge Deployment Challenge Description Poor network Poor network leads to failure of a trial during network service testing. The reduced system also means more time and power wastage during connection time. Security Easy to attack networks affect the security of the user data. Therefore, security is more critical as an organization or individual data can cause extreme harm. Configuration Network The length of the network configuration is determined by network quality and network of the service provider. The longer the configuration time leads to time and power wastage. Cost The higher the cost of a network, the more reliable it is to an organization. The expenses are determined by the level of quality and expertise used in designing the network technology. Technology Adoption Methods Method Name Method Description Involving workers Involving workers in adopting a new technology prepares them for change and helps them through the transition stage. It points out the importance of the change for both individual and organization's sake. Choosing the right products Every organization should be well informed about their needs concerning technological networking. A product choice should emanate from thorough research. Sharing success stories The successful transition of previously implemented networks acts as a reference point. The company can use these success stories to adopt new technologies considering a past success story. Selling the benefits The benefits of a network are what will make the customers prefer it over other systems. Therefore, our organization should focus on networking technology that has benefits aligned to its objectives. Cost/Benefit Considerations Benefits Costs Considerations Quality of networking service and products $500 The highest quality fetches more clients and, in return, pays of investment capital. Cost of networking service and products $350 The initial purchasing cost of a network is based on previous sales and recommendations for competitors and rival products within the same organization. Power consumption of networking services and products $200 The higher the rate of power consumption by networking services products, the more limited their products are and the organization's cost. Life span/ durability, quality and service length of networking technology $4500 The higher the life span of a product, the more useful and expensive it is to an organization. Copyright © 2018 by University of Phoenix. All rights reserved. Project Plan Draft BSA/425 v1 Page 4 of 12 Database System Recommendation Database System Selection Criteria Selection Criteria Name Selection Criteria Description Selection Criteria Value (Weighting In Points) Efficiency A database system needs to be efficient in data presentation and storage. The more prominent database, the more efficient 90/100 Usability Usability is linked to the user interface simple to use and carry out roles. If a database base is easily usable, then it qualifies to be adopted in our organization. 90/100 Data security and Data protection and security are the most fundamental aspects of a database. Data must be protection protected and secured from external and internal attacks. 80/100 Data model and consistency The company producing the database software ought to be consistent with its designs over time. The data model design for storage should be easy for the user to use with little difficulties. 70/100 Database System Recommendation Recommended Database System Microsoft access MySQL Description Benefits Criteria Score A product of Microsoft incorporated in its Word application package. It has the most straightforward databases for any organization and is free, open-source software. They are open-source, free software. Easy to learn and use. Have numerous functions that are useful for an organization with little data. myA product with highly sophisticated It can accommodate large data sets. Classifies commands for use. They are used to the data into useful information easy to develop queries to extract information from understand large databases. Microsoft SQL The most popular database design Compatible with other Microsoft products with server worldwide which employs structured query large database designs for any organization with language. Used in database management enough spaces for storage. for many organizations and sectors Informix Aggregate Selection An IBM software dealing with educational institutions but recently ventured into corporate databases. Very well designed for user benefits, easy to use, and designed to be adopted by any firm with any amount of data. 40/100 50/100 60/100 55/100 Database System Vendor Selection Criteria Selection Criteria Name Selection Criteria Description Selection Criteria Value (Weighting In Points) Copyright © 2018 by University of Phoenix. All rights reserved. Project Plan Draft BSA/425 v1 Page 5 of 12 Price The price of purchasing a database compared to hiring and available features for open source software 70/100 Quality The quality of any products determines its life span and pricing 50/100 Power consumption Databases are heavy applications that store and scan through a lot of information. They require a lot of energy to operate. 60/100 Evolution and flexibility. The ability to change is a very crucial aspect of any database. The more flexible a database is designed, the longer the life span and credibility. 80/100 Database System Recommended Vendors Vendor Name Microsoft IBM Vendor Strengths Offer a variety of They are open database source and prone systems with to attack due to the high-quality easy user precision interface. Offers solutions for data warehouse appliances SAP Oracle Vendor Weaknesses The company develops ebusiness and enterprise management software. Products / Services Provided To Project Aggregate Selection Criteria Score Microsoft Access and Microsoft SQL Server. 90/100 Data management the IBM Pure Data System for Analytics, the IBM solutions are Pure Data System for Operational Analytics, the IBM expensive and DB2 Analytics Accelerator, and the IBM Smart costly to maintain. Analytics System The value of services given by SAP is cheap and below average. Rich user profile, Products and combine first, services are costly. and third-party sources improve customer experience 68/100 SAP’s master data management software. 50/100 Oracle data management platform, 70/100 Database System Deployment Challenges Deployment Challenge Deployment Challenge Description Scalability All software has capability and resource limitation usage. A future-oriented organization understands the aspects that distinguish scalability from cataloging components to hardware and software configuration Copyright © 2018 by University of Phoenix. All rights reserved. Project Plan Draft BSA/425 v1 Page 6 of 12 Increasing data volumes The amount of data being generated within any organization is mind-blowing. Databases with limited functionality and incapable of handling massive data sets are struggling. Data security A company can suffer huge losses, reputation, and goodwill in case of a security breach. Without adequate protection, databases are enormous targets for attackers because they contain essential and classified information for both companies and clients. Decentralized data management Decentralization is a good thing; it improves data security but possesses a challenge in terms of distribution. The decentralization methods are also many, and it becomes hard to decide which is appropriate. Technology Adoption Methods Method Name Method Description Taking a step at a time Adoption is a process, and it requires precision to undertake it successfully. Step by step, planning the best way to ensure that technology and database management software is adopted effectively and efficiently. Build team excitement The employees of an organization work towards the better good of the organization. When proposing change, getting them excited to try new things allows a smooth transition. Capitalization on the benefits Choosing the right database technology The organization needs to choose a database technology that aligns with its vision, mission, goals, and objects—ensuring the ease to use for all parties involved. Highlighting progress and celebrating victories Change brings a challenge in any firm; constant encouragement and consistent are required to motivate technological implementation. Cost/Benefit Considerations Benefits Costs Considerations Reduction of the amount spend managing data $250 The data is arranged in appropriate formats specific to the organization's products, partners, and explicitly categorized. Enable analysis of data in a variety of ways $100 Data analysis in databases is simple and straightforward due to the ability of databases to classify, organize, and categorize data into groups. Improvement of the quality and consistency of information $400 The quality of data in databases is automated. All the data collected from is arranged consistently, allowing proper formatting of data and improving its excellence. Help improve customer service through customer profiles $350 Customer profile and their purchasing history is a crucial area when dealing with customer services. It enables the firm to identify the customer preferences and needs allowing them to serve the customer better. Software Application Recommendations Software Application Selection Criteria Selection Criteria Name Selection Criteria Description Selection Criteria Value (Weighting In Points) Market Understanding a business alongside its IT needs 70/100 Copyright © 2018 by University of Phoenix. All rights reserved. Project Plan Draft BSA/425 v1 Page 7 of 12 knowledge isn't sufficient. For complete effectiveness, knowledge about the software market is essential to allow a shortlist of vendors. Methodology Is the framework designed to propel the organizational goals? Clearly defined methodologies give the firm a perfect roadmap to success and selection of their partners and software applications. 80/100 Communication Communicating the organizational changes and adoptions to all the stakeholders and employees is vital. It gives everyone a role to ensure a smooth transition through challenges and adoption processes. 60/100 Business and industry expertise Business and industrial expertise are not sufficient indicators of needs in IT enterprise. IT enterprise projects call for more than skills in marketing. Specialized knowledge is required to put the organization on the global market. 90/100 Software Application Recommendation Recommended Software Application Description Aggregate Selection Benefits Criteria Score Microsoft suite of products Microsoft suite of products entails office, word, excel, access, PowerPoint, the outlook, among others. Critical applications in the daily running of any organization Microsoft suite of products is essential in writing, record keeping, developing presentations, creating visuals, and analysis of information. 70/100 Internet browsers Internet browsers, e.g., Firefox and chrome They allow the firm to research market trends and study competitor strategies. Internet browsers are also useful monitoring company website, 80/100 Mobile software Mobile software are applications that Companies can be controlled remotely from any manage business remotely like Pandora location. It increases efficiency and music application, Skype for real-time effectiveness online communication and slack for team collaboration 90/100 Software Application Vendor Selection Criteria Selection Criteria Name Selection Criteria Description Selection Criteria Value (Weighting In Points) Management capabilities How effective is the vendor in the management of their application software? The value of software is based on how manageable it is to operate within the organizational life cycle's required platforms. 70/100 Copyright © 2018 by University of Phoenix. All rights reserved. Project Plan Draft BSA/425 v1 Page 8 of 12 Knowledge of the Market knowledge essential to understanding the market software vendor to chose when procuring software. It also assists in eliminating the vendors with bad reputations and whose products and services are with doubt. Communication 60/100 During the system life cycle, communication is essential, considering changes always arise. The connection enables the effective management of these changes. 90/100 Software Application Recommended Vendors Vendor Name Microsoft IBM Oracle SAP Vendor Strengths Vendor Weaknesses Highly beneficial as it offers Easily affected by all necessary applications virus or cyber in one suite. Microsoft attack suites are readily available. IBM provides high-quality application software. Their applications are changeoriented with the ability to upgrade to the newest version Apps are expensive and require regular maintenance and upgrades. Products / Services Provided To Project Aggregate Selection Criteria Score Office, word, excel, access, PowerPoint, outlook 80/100 Salesforce They are well developed Not they are Hotspot, enterprise one, oracle warehouse and designed. Easy to use widely known and builder user interface. used. They are expensive to buy. Robust tools for helping companies manage financial, logistics, human resources, and customer service. • They are widely used and hence easily attacked by malware and virus. Require expertise to operate. SAP S/4HANA, SAP CRM (Customer Relationship Management), SAP ERP (Enterprise Resource Planning), SAP PLM (Product Lifecycle Management), SAP SCM (Supply Chain Management), SAP SRM (Supplier Relationship Management) Software Application Deployment Challenges Deployment Challenge Deployment Challenge Description Lack of software testing Lack of software testing creates loopholes that hackers can use to attack organizational data. Lack of measurement makes the software unstable during the performance of actual duties within a firm Poor scheduling of The poor scheduling of software development processes leads to the development of poor quality software development software within a longer time frame. processes Copyright © 2018 by University of Phoenix. All rights reserved. Project Plan Draft BSA/425 v1 Page 9 of 12 Inadequate communication Inadequate communication among the team members qualifies software to be poorly designed and low-quality, which puts the firms' data at risk from attack. Security The security of data is paramount to any software deployment. Without adequate protection, it is impossible to achieve the firm’s goals of success. Software Adoption Methods Method Name Method Description Managing change The ability to manage change is very crucial in the adoption of any software. Many people are rigid to change User involvement The user of the software is the consumer of the product. Therefore, careful design of the user interface with the involvement of the user is essential. It enables the user to own the product and have an easy time learning its usage. Foundation building Every software application is essential, and its foundation must be laid on a specific service to make it more reliable. Software with more than one function is not stable. Their foundation is not based on one functionality which puts it at risk of attack as the user applies its different functionalities Communication plan Communication is the most effective strategy in the adoption of software.it allows the team players to accept the change and manage it easily effectively Cost/Benefit Considerations Benefits Costs Considerations Improve employee productivity $500 Reduction of manual work, which increases productivity with saved time. Lower IT costs $250 Applications enable access to a variety of IT services online, which help improve business performance at lower IT costs. Real-time visibility $300 Application software enables organizations to establish real-time visibility that allows quick, accurate decision making for businesses Improve customer experience $450 It will enable customers to view their data anywhere, get services quickly, and effectively avoid inventory synchronization issues. Cloud Services Recommendations Cloud Services Selection Criteria Selection Criteria Name Selection Criteria Description Selection Criteria Value (Weighting In Points) Architecture The architecture behind cloud servers is the essential criteria for accessing the effectiveness of a cloud provider. 80/100 Security The reason for any cloud service is storage and securing data; hence, security is a non-negotiable aspect to any loud service provider. 99/100 Copyright © 2018 by University of Phoenix. All rights reserved. Project Plan Draft BSA/425 v1 Page 10 of 12 The cloud service should be designed to fit both user and provider manageability. The user can access and manage their data as they want. Manageability 70/100 Cost and service The cost of a cloud provider should be associated levels with the quality of services they can offer. 75/100 Cloud Services Recommendation Recommended Cloud Services Description Aggregate Selection Benefits Criteria Score Microsoft 365 It is a product of Microsoft functioning similar to Microsoft suite applications. It is a subscription-based service. Microsoft offers linkage and compatibility quickly with other Microsoft products. 70/100 Slack An American cloud service designed for internal team collaboration slack Enhances teamwork through its tools and services. 80/100 Nerds support cloud It’s powered by a computing firm in Miami that offers cloud services. Nerd support cloud assist medium and small business with IT services Specialized in small and medium enterprise IT services. Uses cloud services to substitute activity IT. nerd offers hardware and software improvement and maintenance. 80/100 Google cloud Service cloud platform offered by Google and runs on the same infrastructure as other Google services. It is easily accessible. It allows users to store their data in real-time. Ensures all user data is secure and protected at all times. 70/100 Cloud Services Vendor Selection Criteria Selection Criteria Name Selection Criteria Description Selection Criteria Value (Weighting In Points) Data security A vendor interested in securing clients' data is the appropriate cloud service provider. Without security for data, a cloud service provider does not meet the recommended practice. 70/100 Reliability and performance The more reliable and effectively performing a cloud provider is, the more secure and efficient they are in their service delivery. 80/100 Technologies and service roadmap Technologies allow the customer to access the cloud provider's ability to evolve with the technological world. The service road map ensures the cloud providers have laid plans for continued innovation and growth in the future. 90/100 Certification and standards These two aspects are very crucial when listing potential suppliers of cloud services. They ensure that loud providers remain within the set regulations and standards when developing their products and dealing with clients. 50/100 Copyright © 2018 by University of Phoenix. All rights reserved. Project Plan Draft BSA/425 v1 Page 11 of 12 Cloud Services Recommended Vendors Vendor Name Vendor Strengths Vendor Weaknesses Products / Services Provided To Project Aggregate Selection Criteria Score Microsoft Have a wide They are open range of products source while that are others are interconnected. subscriptionTheir products based. They are have quality and quickly attacked by efficiency malware and guarantees. viruses. Microsoft 365 70/100 Google It's readily It requires a available on monthly standard Google subscription and is applications. only available Ensures all the online. Require Services are robust network within an connectivity. intertwined system Google cloud 90/100 IBM Very well High-quality asset designed and fee with very developed user advanced features. interface. Higher sophisticated architecture which reduces chances of an attack on data IBM cloud 80/100 Adobe creative cloud 50/100 ADOBE SYSTEM Adobe's creative cloud allows for visualization features. It is available both offline and online. It is expensive to buy and manage. Adobe Requires monthly subscription fees. Cloud Services Deployment Challenges Deployment Challenge Deployment Challenge Description Governance and Control Government regulations and policies are essential indicators of a cloud vendor services legitimacy. The government control on operations of cloud-based services limits the cloud providers from exploiting their clients. Performance And Incorporation With Existing Infrastructure Performance and incorporation with existing infrastructure is a challenge highly experience by loud providers. Developing their infrastructure is outrageously expensive. These forces them to design a product compatible with existing infrastructure and can perform well within that Copyright © 2018 by University of Phoenix. All rights reserved. Project Plan Draft BSA/425 v1 Page 12 of 12 environment. DATA Security AND PRIVACY Data security and privacy possess a challenge in full deployment, considering the cloud service provides protection. They hire third-party security and privacy providers who understand the infrastructure of the cloud applications which possess a higher challenge Service Quality The quality of service for cloud providers is based on the deployment becomes a challenging design and architecture. Players were offering similar services at lower prices than the market ventures. Creating a rapport may take years without a return on investment. Cloud Service Adoption Methods Method Name Method Description Communication Communication builds the foundation of any service. Adoption is only smooth and effective if there is efficient communication between the cloud providers and the clients and the client's employees. Invest in hybrid cloud Hybrid cloud services are increasingly becoming more relevant than current cloud services. They can adapt to change and evolve as the technology world evolves, making them suitable than conventional methods which are not adaptive to changes. We are considering cloud migration services. Cloud providers for smooth transitions clearly outline cloud migration services. Cloud providers ensure service migration is available when setting up their designs to accommodate future changes. Essential features to consider during cloud service deployment and adoption. Start with the necessary business data. A cloud service provider enables the storage of data in secure and private platforms. The adoption of these services should be beginning with the underlying business data to ensure a smooth transition. Cost/Benefit Considerations Benefits Costs Considerations Allow business flexibility $300 Flexibility allows the business to practice more virtual, meaning it can be operated remotely compared to another system that is only accessed through a local area network. Reduced IT costs $600 Moving to cloud-based computing reduces the cost of IT used in the management and maintenance of IT systems. Energy consumption also reduces. Automated updates $400 cloud service fee is inclusive of updates within your cloud allow our company to use the latest technology. Scalability $450 Scaling upwards or downwards is determined by the needs of a firm. Cloud computing services allow a firm to operate and store their data with highly flexible features suitable to their needs. Copyright © 2018 by University of Phoenix. All rights reserved. Project Plan Draft BSA/425 v1 Page 1 of 7 University of Phoenix Material Project Plan Draft Instructions: Fill out each of the sections below with information relevant to your project. Be sure to include the company name associated with your project. ENTER YOUR COMPANY NAME Project Plan Draft Network Technology Recommendations Network Technology Selection Criteria Selection Criteria Name Selection Criteria Description Selection Criteria Value (Weighting In Points) Network Technology Recommendation Recommended Network Technologies Description Benefits Aggregate Selection Criteria Score Network Technology Vendor Selection Criteria Selection Criteria Name Selection Criteria Description Selection Criteria Value (Weighting In Points) Copyright © 2018 by University of Phoenix. All rights reserved. Project Plan Draft BSA/425 v1 Page 2 of 7 Network Technology Recommended Vendors Vendor Name Vendor Strengths Products / Services Provided To Project Vendor Weaknesses Aggregate Selection Criteria Score Network Technology Deployment Challenges Deployment Challenge Deployment Challenge Description Technology Adoption Methods Method Name Method Description Cost/Benefit Considerations Benefits Costs Considerations Database System Recommendation Database System Selection Criteria Selection Criteria Name Selection Criteria Description Selection Criteria Value (Weighting In Points) Copyright © 2018 by University of Phoenix. All rights reserved. Project Plan Draft BSA/425 v1 Page 3 of 7 Database System Recommendation Recommended Database System Description Benefits Aggregate Selection Criteria Score Database System Vendor Selection Criteria Selection Criteria Name Selection Criteria Description Selection Criteria Value (Weighting In Points) Database System Recommended Vendors Vendor Name Vendor Strengths Vendor Weaknesses Products / Services Provided To Project Database System Deployment Challenges Deployment Challenge Deployment Challenge Description Copyright © 2018 by University of Phoenix. All rights reserved. Aggregate Selection Criteria Score Project Plan Draft BSA/425 v1 Page 4 of 7 Technology Adoption Methods Method Name Method Description Cost/Benefit Considerations Benefits Costs Considerations Software Application Recommendations Software Application Selection Criteria Selection Criteria Name Selection Criteria Description Selection Criteria Value (Weighting In Points) Software Application Recommendation Recommended Software Application Description Benefits Aggregate Selection Criteria Score Copyright © 2018 by University of Phoenix. All rights reserved. Project Plan Draft BSA/425 v1 Page 5 of 7 Software Application Vendor Selection Criteria Selection Criteria Description Selection Criteria Name Selection Criteria Value (Weighting In Points) Software Application Recommended Vendors Vendor Name Vendor Strengths Products / Services Provided To Project Vendor Weaknesses Software Application Deployment Challenges Deployment Challenge Deployment Challenge Description Technology Adoption Methods Method Name Method Description Cost/Benefit Considerations Benefits Costs Considerations Copyright © 2018 by University of Phoenix. All rights reserved. Aggregate Selection Criteria Score Project Plan Draft BSA/425 v1 Page 6 of 7 Cloud Services Recommendations Cloud Services Selection Criteria Selection Criteria Name Selection Criteria Description Selection Criteria Value (Weighting In Points) Cloud Services Recommendation Recommended Cloud Services Description Benefits Aggregate Selection Criteria Score Cloud Services Vendor Selection Criteria Selection Criteria Name Selection Criteria Description Selection Criteria Value (Weighting In Points) Cloud Services Recommended Vendors Vendor Name Vendor Strengths Vendor Weaknesses Products / Services Provided To Project Copyright © 2018 by University of Phoenix. All rights reserved. Aggregate Selection Criteria Score Project Plan Draft BSA/425 v1 Page 7 of 7 Cloud Services Deployment Challenges Deployment Challenge Deployment Challenge Description Technology Adoption Methods Method Name Method Description Cost/Benefit Considerations Benefits Costs Considerations Copyright © 2018 by University of Phoenix. All rights reserved.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hello🙋 I've attached the final copy of your report alongside its outline down below. Please check it out then get back to me in case you'll need any revision, I'll be happy to assist.Thank you!

Supporting Research Report
BSA/425 v1
Page 1 of 15

University of Phoenix Material
Supporting Research Report
Instructions: Fill out each of the sections below with information relevant to your project. Be sure to include the name and
purpose of your project.
Supporting Research Report for Customer relationship management (CRM)
This project seeks to provide a holistic analysis of the technological industry and various services within the
sector. Further, it recommends on the trends, finance and risks likely to affect operations in the industry. The
different companies are recommended according to their score in service and product delivery.

EXECUTIVE SUMMARY
In the technology industry, there is a large pool of services and product providers who seek to gain a substantial market
share. However, the quality and pricing are major factors that affect the value of the products and services. Consumer
aims to acquire the best services that will solve their needs appropriately. Therefore, it is imperative to formulate an
analysis of the various services within the technological industry. It will help determine the best provider with
considerations on multiple factors that affect the efficiency and effectiveness of the services and products. Since
specialized tools serve to solve problems and provide solutions, they should operate to the maximum capacity with no
impeded lose in value.
INDUSTRY BACKGROUND
The technology industry comprises of the digital world whereby users, consumers and providers engage actively.
Companies in this industry supply manufactured products such as computer and computer-related products, electronic
devise and internet services. Since its invention in the early 1904’s technology has led to a revolution and transition in
activities and operations. It has led to the globalization of the world hence enhancing interrelations. Large industries
command the industry and the entire market space. They comprise of both small and large-capitalization companies such
as Dell, Apple, Samsung and Microsoft. Different companies existing in the industry offer relatively branded products that
are different in design, yet they serve almost similar purposes.
TECHNOLOGY TRENDS
The technology industry is highly dynamic due to new inventions and innovations that seek to make the products more
efficient and effective. The large companies frequently employ acquisition techniques will others for mergers to dominate
and gain a percentage share in the entire market. It implies that the market is highly competitive since every venture
seeks to tap in into lucrative business operations. Data collection and analytics is arguably the newest trend in the sector.
It has led to the emergence of various technologies, such as machine learning and data analytics.
PROJECT APPROACH
The project consists of an analysis of the broader technology industry. It seeks to provide information on the different
subsectors in the technology industry. The selection criteria for the best and recommended companies in each subsector
is the main objective of the project. Therefore, the project shows the various technological choices in terms of business
benefits and risks.
SELECTED VENDORS
Copyright © 2018 by University of Phoenix. All rights reserved.

Supporting Research Report
BSA/425 v1
Page 2 of 15
The selected vendors in the industry are cisco, Microsoft, IBM and Oracle. These companies provide the best network
technology services and products.
In the database system provision, the selected vendors are Microsoft, IBM, SAP and oracle. In the software application,
the recommended vendors are Microsoft, IBM, Oracle and SAP. I
n cloud services, Microsoft, Google and IBM rank the highest in selection criteria.
ALTERNATIVE APPROACH
The competition in the technology industry is very high due to an appealing consumer base. In this case, the alternative
approach considers the companies that will provide the desired service in real-time and future. However, since most
organization give a more comprehensive array of services and products, they are selected based on market recognition.
Factors such as consumer satisfaction and revenue the company generates inform the selection criteria. It is unrealistic to
provide poor service and gain a large clientele base for particular products.
IMPACT ANALYSIS
The success of the companies in the technology industry depends on innovation due to the dynamic changes. In this
case, an organization can easily collapse when it fails to adapt to the evolutional market space. Therefore, selection of
companies in this industry relies on data of financial stability as well as innovative expertise. As per the previous trends, it
is evident which company is the on the forefront of implementing changes in their system. More so, the management
should focus on restructuring their strategies, operations and product development processes to gain value.
COST-BENEFIT ANALYSIS
Cost benefits analysis is a technique to review the functions of the organization. It requires that the benefits exceed the
cost which the company will incur after the implementation of various strategies. In the technology industry, business
flexibility is a compulsory requirement to practice more virtual operations. Managing operations in the industry are
somewhat cumbersome, especially during the purchase of products. Hence, the management can control its pending
when they understand the cost-benefits strategies. Since innovation is a significant concern, the companies require to
implement automated updates in their systems to ensure they are updated. Further, every firm should have a plan to
scale its operations and production upwards. In this case, they ought to understand the cost-benefits ratio for various
strategies.
FINANCIAL ANALYSIS
Main factors that lenders business entities into financial distress include debt obligations, lack of adequate raw materials
and lack of funds for continuity of operations. Another factor continues loss structure which makes it hard to recover to
usual operations. In the technology sector, stability is a crucial ingredient for enhancing business operations and
recognition by investors. Large market capitalization companies have massive control over the market space and various
trends that favours them. In this case, the entities with the best asset valuation have a priority in the selection criteria.

RISK ANALYSIS
The occurrence of huge losses is a critical factor that can force the entity out of operations. More so, technological
products and services are relatively expensive and scarce; hence their massive valuation and pricing. In this case,
organizations should hedge against future changes and trends that can result to the irrelevance of the asset in storage.
More so, hedging techniques can prevent the company from incurring total losses in future due to business operations.
Other, risk factors in the technology industry include security threat and information loss. With increased cybersecurity
Copyright © 2018 by University of Phoenix. All rights reserved.

Supporting Research Report
BSA/425 v1
Page 3 of 15
sensitization and strategies, companies are regaining control of the risks. Various inventions such as block-chain
technology can ensure prote...


Anonymous
I use Studypool every time I need help studying, and it never disappoints.

Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Related Tags