Distribution: Restricted to Sponsor and Project Team The SeeLock module of Compute.Access is a project that has the objective of reducing the possibility of unrestricted access to offices. The basic idea is to use the barcode on staff and students’ identification cards along with face recognition techniques to determine if an individual that intends to enter an office is authorized. The motivation behind the project includes reducing recurrent costs, as well as increasing functionality. Purchasing an existing option off the market would expose the university to a cost of approximately $100 million over a period of 10 years. As a result, the Principal has decided to approve a project to develop a prototype with a preliminary estimated budget of $5 million. The additional required functionality allows cross referencing a picture of an individual aiming to enter an area with the ID presented, as well as allowing an authorized person to indicate whether there is duress. If a duress signal (to be determined) is detected, control of the door is passed directly to a security unit, along with a video feed of the door area. It is assumed that the items listed in appendix A can be outsourced. On demand reports of user accesses should be available. The prototype is to be installed at the main Computing office however full documentation of the procedures used to create the product is expected to allow easy replication to other locations. It is important that the system be completed and tested at a point in time when traffic is low, and as such the system needs to be completed by December 2023 to allow testing in the first week of January 2024. Appendix A. Purchase Magnetic Lock. (Duration 5 days; Cost $100,000) Purchase Camera and Network Storage Device. (Duration 2 days, Cost $150,000) Install a Network Connection. (Duration 5 days, Cost $40,000) High Level deliverables are Hardware, Software and Procedures Work packages for Hardware Magnetic Lock Camera Barcode Scanner Door ID card Network Work packages for Software Duress Signal Video Feed Face Recognition Software Work packages for Procedures Documentation Audit Log User Manual Question 1: 1(a) Review the resulting work breakdown structure and create an Activities List. 1(b) Determine predecessor and successor relationships and estimate durations on each activity in the list, and then present the updated activities list.
CHARTER BEGINS..... (this is not a graded assignment)
Version 1.0
Distribution: Restricted to Sponsor and Project Team
The SeeLock module of Compute.Access is a project that has the objective of reducing the possibility of unrestricted access to offices. The basic idea is to use the barcode on staff and students’ identification cards along with face recognition techniques to determine if an individual that intends to enter an office is authorized. The motivation behind the project includes reducing recurrent costs, as well as increasing functionality. Purchasing an existing option off the market would expose the university to a cost of approximately $100 million over a period of 10 years. As a result, the Principal has decided to approve a project to develop a prototype with a preliminary estimated budget of $5 million. The additional required functionality allows cross referencing a picture of an individual aiming to enter an area with the ID presented, as well as allowing an authorized person to indicate whether there is duress. If a duress signal (to be determined) is detected, control of the door is passed directly to a security unit, along with a video feed of the door area. It is assumed that the items listed in appendix A can be outsourced. On demand reports of user accesses should be available.
The prototype is to be installed at the main Computing office however full documentation of the procedures used to create the product is expected to allow easy replication to other locations. It is important that the system be completed and tested at a point in time when traffic is low, and as such the system needs to be completed by December 2023 to allow testing in the first week of January 2024.
Appendix A.
Purchase Magnetic Lock. (Duration 5 days; Cost $100,000)
Purchase Camera and Network Storage Device. (Duration 2 days, Cost $150,000)
Install a Network Connection. (Duration 5 days, Cost $40,000)
High Level deliverables are Hardware, Software and Procedures
Work packages for Hardware
- Magnetic Lock
- Camera
- Barcode Scanner
- Door
- ID card
- Network
Work packages for Software
- Duress Signal
- Video Feed
- Face Recognition Software
Work packages for Procedures
- Documentation
- Audit Log
- User Manual
Question 1:
1(a) Review the resulting work breakdown structure and create an Activities List.
1(b) Determine predecessor and successor relationships and estimate durations on each activity in the list, and then present the updated activities list.
Project management is initiating, planning, executing, controlling, and closing the work of a team to achieve specific goals and meet specific success criteria at a specified time.
Step by step
Solved in 5 steps with 5 images