Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Please read below case study, examine pictures of WBS, Timeline, budget provide answers to the task. Human resources & recruitment, Individual & family services BEing

Please read below case study, examine pictures of WBS, Timeline, budget provide answers to the task.

Human resources & recruitment, Individual & family services

BEing U Coaching, led by Martina, is a professional career and entrepreneurial coaching service centered around empowering individuals through personalized 1-1 and group coaching experiences. Embracing a reciprocal commitment model, Martina guides career change and entrepreneurial clients through a journey of self-discovery and transformation: empowering them to make clear and life-affirming career and self-employment decisions. Her process emphasizes alignment of mind, heart, and physical habits and allyship in supporting diverse, inclusive, and equitable work and workplaces.

project MAIN GOAL

The main goal of this project is to streamline BEing U Coaching's digital ecosystem by transitioning from Microsoft 365 to Google Workspace, organizing and aligning multiple email accounts and domains, aligning multiple apps associated with business operations (Calendly, Wave, Slack, Zendesk etc.), and mobile/laptop data flow, optimizing cybersecurity measures, resolving data duplication issues, and improving overall system efficiencies. The aim is to create a more efficient, secure, and well-organized IT infrastructure that supports the coaching hrms operations across multiple organizations.

TASKS TO COMPLETE TO ACHIEVE THE PROJECT GOAL

1. Migration from Msso to Google Workspace: students can nelo pian and execute the migration process from Microsort 36. to Google Workspace. This involves transferring emails, files, and other data while ensuring a smooth transition without significant disruptions to the coaching firm's operations. (includes mobile/laptop cloud and hardware data storage

2. Email and Account Management: They can assist in aligning multiple emails, domains, account-related emails, and apps, and possibly consolidating or organizing them for better efficiency and clarity. Reducing redundancy to maximize efficient workflow is key.

3. Cybersecurity Assessment: Students can evaluate the necessity of security software like Norton, assess the existing security measures, and recommend suitable cybersecurity solutions to protect the coaching firm's digital ecosystem

4. Data Cleanup and Organization: Addressing duplication issues in cloud storage, hard drives, and other data repositories.

Iney can nelo identiry and resolve duplicate dara to streamiine and organize the digital intrastructure errectivelv

5. Efficiency Improvement: Analyzing the workflows and processes across multiple organizations the coach works with, the

students can suggest and implement strategies to ennance system emciencies, possibly leveraging tools or technologies To improved collaboration and productivity.

6. Training and Documentation: Provide training to the owner on the newly implemented Google Workspace, cybersecurity best practices, and efficient data management techniques. Additionally, creating documentation or guides for future.

What to Do (Task)

Manage project team

The work must get done. Ensure that it does.

  • List actions your team will perform. How will you track and evaluate the team?
  • What happens if a task does not get done? How will you know it does or doesn't get done?
  • Is there a particular work schedule for the team? Communications Management

In one page or more provide actions you are taking to communicate to stakeholders

  • Identify key stakeholder groups, then...
  • Describe exactly what you intend to communicate to each of those stakeholders?
  • How will you communicate those messages?
  • When. Is there a particular time of the project to send that communication?

Risk Management

  • Identify at least three risks that could have potentially have negative outcomes for the project. Explain those risks and how to deal with them.
  • Use the Risk Response strategy as shown here

Classification: General

Avoid

eliminate cause of risk

Mitigate

reduce probability or impact of risk

THREATS

Accept

contingency plans.

image text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribed
| Migration v v | 1.1 Hardware Evaluation I 1.2 Software Evaluation I 1.3 Soft Migration l l } 1.1.1 Review Samsung 1.2.1 MS 365 and 1.3.1 Samsung Galaxy Data Galaxy Phones Workspace Assestment Transfer | 1.1.2 Evaluate External | 1.2.2 Security Software | 1.3.2 Plan MS 365 to Devices Review Google Workspace Migration 1.1.3 Examine Brother 1.2.3 Password Printer and WiFi Management Review v 1.3.3 Plan Microsoft Teams to Google Meet Transition . 1.1.4 Verify Back up Book Figure 1: Migration | Security 2.1 Network Security 2.2 Application Security 2.3 Social Media Clean up 2.4 Personal Email Security Review 2.1.1 WiFi Security 2.2.1 Skype and other 2.3.1 Assess and Clean 2.4.1 Secure PErsonal Enhancement Apps Security Chek Social Media Footprint Email Security 2.2.2 Marketing and Sales App Review 3.1 Cloud Storage Optimization . 3.1.1 Asses MS 365 Business, Google Workspace, BEing U, Tfoundation Storage and Data Clean up 3.2 Duplicate Data Clean 3.3 Organize External Up Devices v v 3.2.1 Address Duplication 3.1.1 Regularly Back Up in Cloud Storage External Drive - 3.2.2 Review and Update Bookmarked Information Figure 3: Storage and Data clean up | Training and Closure v | 5.1 User Training | 5.1.1 Google Workspace Training 5.1.2 Security Best Practices | + | 5.2 Documentation | 5.3 Finalization and Review 5.2.1 Document Processes 5.3.1 Final System Check and Configurations 5.2.2 Documentation 5.3.2 Project Review Review Meeting l 5.3.3 Lessons Learned in Project 1 Migration 11 2 Security 21 Week1 Week2 Week3 Weekd4d Week5 Week6 Week7 Week8 Weekd Hardware Evaluation Review Samsung Galaxy 111 Phone 1.1.2 Evaluate External Devices Examine Brother WiFi and 1.1.3 Printer 1.1.4 Verify back-up Book Software Evaluation MS 365 and Workspace 1.2.1 Assestment 1.2.2 Security Software Review Password Management 1.2.3 Review Soft Migration Samsung Galaxy Data 131 Transfer Plan MS365 to Google 1.3.2 Workspace Migration Plan Microsft Teams to 1.3.3 Google Meet Transition Week1l Week2 Week3 Weekd Week5 Week6 Week7 Week8 Week9 Network Security 211 WiFi Security Enchancement - Application Security and Review Skype and Other Apps 221 Security Check Marketing and Sales App 222 Review Social Media Clean UP Asses and Clean Social 231 Media Footprint Secure Personal Email 241 Security Week 1 Week 2 Week3 Week4 Week5 Week6 Week7 Weeks Week9 3 Storage and Data Clean Up 3.1 Cloud Storage Optimization Asses MS 365 Business, Google Workspace, Being U. 3.1.1 foundation 3.2 Duplicate Data Clean Up Address Duplication In Cloud 3.2.1 Storage 3.3 Organize External Devices Regularly Backup External E 3.1.1 Drive Week 1 Week 2 Week3 Week4 Week5 Week6 Week7 Weeks Week9 4 Training and Closure 5.1 User Training 5.1.1 Google Workspace Training 5.1.2 Security Best Practices 5.2 Documentation Document Processes and 5.2.1 Documentation 5.2.2 Documentation Review 5.3 Finalziation and Review 5.3.1 Final System Check 5.3.2 Project Review Meeting 5.3.3 Lesson Learned in ProjectMIGRATION SECURITY STORAGE & DATA CLEAN UP TRAINING & CLOSURE TASK ID TASK &SUB-TASK COST TASK ID TASK & SUB-TASK COST TASK ID TASK & SUB-TASK COST TASK ID TASK & SUB-TASK COST TASK 1.1 Hardware Evaluation $ 500.00 TASK TASK TASK SUB-TASK 2.1 Network Security $ 400.00 3.1 Cloud Storage Optimization $ 300.00 5.1 User Training 300.00 1.1.1 Review SG-Phones $ 100.00 1 12 Evaluate Ex Devices $ 200.00 SUB-TASK SUB-TASK SUB-TASK 1.13 Examine Bro Printer & WIFI 100.00 2.1.1 WiFi Security Enhancement 3.1.1 Asses MS 365 Biz, GWP, BU Foundation 5.1.1 Google Workplace Training 150.00 1.14 Verify Backup Books $ 100.00 5.1.2 Security Best Practice 150.00 TASK TASK TASK 2.2 Application & Security Review $ 300.00 3.2 Duplicate Data Clean UP $ 400.00 1.2 Software Evaluation $ 500.00 TASK SUB-TASK SUB-TASK SUB-TASK 5.2 Documentation $ 400.00 121 MS 365 and workspace Assemt $ 200.00 2.2.1 Skype & other Apps Security check $ 150.00 3.2.1 Address Duplication in Clous Storage $ 200.00 12.2 Security Software Review $ 150.00 2 2.2 Marketing &Sales App Review $ 150.00 3.2.2 Review & Update Bookmarked informatis $ 200.00 SUB-TASK 123 Password Mangement Reviews $ 150.00 5.2.1 Document Processes & Configuration $ 250.00 TASK TASK 5.2.2 Documentions of Review $ 150.00 TASK 2.3 Social Media Clean Up $ 300.00 3.3 Organize External Devices $ 300.00 1.3 Soft Migrations $ 1,000.00 TASK SUB-TASK SUB-TASK 5.3 Finalization and Review 300.00 SUB-TASK 2.3.1 Assess and clean social media Footprint Regularly BackUp External Drive SUB-TASK 13.1 SG Data Transfer $ 300.00 TASK 5.3.1 Final System check 150.00 13.2 Plan MS 365 to G-Workplace mig $ 350.00 2.4 Personal Email Security $ 200.00 5.3.2 Project Review Meeting 100.00 13.3 Plan MS Teams to GM Transition 350.00 5.3.3 Lessons Learned in Project $ 50.00 SUB-TASK 2.4.1 Secure Personal Email Security TOTAL $ 2,000.00 TOTAL $ 1,200.00 TOTAL $ 1,000.00 TOTAL $ 1,000.00ESTIMATED PROJECT BUDGET $5000-&8000 TASKS BUDGETS AND MISCALLENOUS TASKS COST Migration 2,000.00 Security 1,200.00 Storage & Data Clean Up 1,000.00 Training & Closure 1,000.00 Miscallenous 800.00 Grand Total 6,000.00

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Introduction To Information Systems Supporting And Transforming Business

Authors: R Kelly Rainer, R Kelly Rainer Jr, Brad Prince

6th Edition

1119107997, 9781119107996

More Books

Students also viewed these General Management questions

Question

1. What does this mean for me?

Answered: 1 week ago