DAT 515 Adriana Carroll Milestone Five

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

645

Subject

Business

Date

Feb 20, 2024

Type

docx

Pages

4

Uploaded by MateGerbil2595

Report
MILESTONE FIVE1 Adriana Carroll DAT-515 Southern New Hampshire University January 28 th , 2024 Milestone Five
2 The purpose of this document is to highlight and explain the key points of implementation for the Oracle and SQL Server for the company, Third Star Financial Services. The steps covered throughout this document will include topics of asset assessment, objective definition, network/data mapping, building a data governance policy, project execution, training program, and future considerations. To start, it is vital to evaluate the current infrastructure and create a detailed list of all current assets and issues with these assets so they may be addressed. Details of each system and their current role within the company and its network system will allow the company to identify what assets should be replaced/repaired so that the planned system can be implemented to compensate for these issues. Using a detailed asset assessment will allow the company to identify major areas of concern to build a priority list as the project progresses. Next, objectives have to be identified before the major progress of the project can begin. This includes identifying the project plan's goals so that it can be met in a timely manner and issues can be addressed accordingly. For example, if the IT department is lacking in systems or employees, a goal of the project could be to increase resources to the IT department or configuration goals to make the department’s job lighter/more supported. Next, the network and data must be mapped as the design is finalized. This logical mapping of the network will let the company determine final costs and timelines and identify areas where the data is not traveling as expected. For example, if data is getting lost traveling from one company to another, then the logical mapping of the data will allow Third Star to track where it gets lost and investigate issues in that area. During this time, it is important to ensure that all budget concerns are addressed with consideration to security and availability.
3 Next, building a data governance policy is to ensure that data and data requirements are clearly defined and made clear to each employee within the company. Defining all relevant data terminology will ensure that there is no confusion when handling data. Speaking of handling data, it is important to ensure that all data handling policies are also clearly defined within the document including any special roles and responsibilities. This will ensure that everyone involved in the handling of data understands their position and responsibilities associated with those positions. Once this policy is completed, ensure proper training and understanding for each employee. Next, execution of the project plan. Build a detailed execution plan for each stage within the project including timelines, deadlines, and room for errors. Ensure that the company allocates time for key moments within the project such as data migration to the new server and major downtime. If possible, ensure that the company can maintain base operations to mitigate the downtime. Clearly communicate these expectations and timelines; remaining as transparent as possible with both the employees affected and the customer base. Once execution is completed, ensure a proper training pipeline for the employees is implemented. This includes a training program to provided extended training throughout the year to ensure that recent technology is not overlooked or forgotten, and that each employee is properly aware of any new processes or policies. This will allow the company to have a smooth transition to the new system and the employees will be empowered to understand their role within the company. Finally, it is vital to ensure that the company is constantly looking forward to any improvements or processes that can implemented to ensure the company and its new network are compliant with any requirements, expanding as needed, and security is properly maintained. The
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4 data managed by the company is the first concern and major security updates are constantly being released. Building a schedule to accommodate these updates should be the priority for future considerations. Audits should be conducted regularly to ensure compliance with federal and state requirements and to check the integrity/quality of the data being managed. All these considerations should be written into policy and upheld.