Premium Essay

Client

In:

Submitted By Ssssscarlett
Words 8038
Pages 33
Executive summary
This report will be applied in the case of measuring the actual use of project management which is International Fashion Show(IFS) 2015. The primary model was showed before the report and It will build a new model what more fit for the event in the end. The event can be described as a success, project management model to consider for event delivery. This report will be divided into 7 sections follow the model. In the end, it will explain recommendation for the IFS. In the report, mission statement, the risk management, other process and the evaluation will be changed. According to the change model, the event management can be improve than the previous.

Content Executive summary 3 1.Introduction 5 1.1 Project Management 6 2. Team building 6 2.1 Integration 8 3. Defining the event 8 3.1 Brief and Expectation 9 3.2 Core Value(Embok) 9 3.3 Mission Statement (EPARS) 10 4. Project Definition 11 4.1 Aims and Objectives 11 4.2 SMART analysis 12 4.3 Secondary research 13 4.4 Primary Research 15 5. Planning 16 5.1 Stakeholder Analysis 16 5.2 Scope of work 18 5.2.1 EPARS Scope Management 18 5.2.2 Scope of work(Project management cascade) 19 5.2.3 Maylor’s Four-phase Approach 20 5.3 Feasibilities 20 5.4 Strategic Planning 21 5.4.1 PESTLE 21 5.4.2 SWOT analysis 22 5.6 Work Breakdown Structure 23 5.6.1 What is the WBS? (EMBOK) 23 5.6.2 Domains 23 5.6.3 WBS vs. Domains 24 5.6.4 Administration 25 5.6.5 Design 25 5.6.6 Risk 26 5.6.7 Operations 28 5.7 Responsibility 29 5.8 Other Management Process 29 5.8.1 PDCA cycle(1950) 29 5.8.2 Kolb's Learning Cycle(1984) 30 5.8.3 EMBOK process 30 6. Evaluation 31 7.Conclusion 31 Reference 32 Appendix 37 Appendix 1 37

1.Introduction
The International Fashion Show(IFS) will be a held by the International Office at the Quayside at 18:00 on

Similar Documents

Free Essay

Client-Based or Client/Serer

...Client-based or client/serer Mashelle Scott IT/240 December 20, 2013 Jennifer Gonzales Client-based or client/serer After reading the scenario I choose a client/server model. Client/server networks employ one or more centralized servers that house critical information that is shared by everyone. Meaning, that it is comprised of a single central computer acting as a server that directs multiple other computers,(clients). They also provide centralized backup, which can be determined by the business. Also as a business expands a client server enables them to reach a shared database program no matter the distance. If there were to be an issue the company could recover the data and resume operations. With client/server model the servers are sometimes clustered in order to provide failover capability in the event hardware failure which avoids downtime and saves the company money. In any situation the decision to employ a client-based or client-server network depends on the business in question. If the company is a small business it may do well without a costly server, as long as there is someone appointed to ensure the backups are performed. As with a bigger business it might be more important to utilize a client-server network for the reason stated above. With a larger company it will be more important in order to provide the security and stability that a client/server network gives. For example, through encryption data can be available only to qualified individuals...

Words: 770 - Pages: 4

Premium Essay

Client Server

...CLIENT SERVER PROGRAMMING AND MULTIMEDIA Introduction Client/server describes the relationship between two computer programs in which one program, the client, makes a service request from another program, the server, which fulfills the request. Although the client/server idea can be used by programs within a single computer, it is a more important idea in a network. In a network, the client/server model provides a convenient way to interconnect programs that are distributed efficiently across different locations. Computer transactions using the client/server model are very common. For example, to check your bank account from your computer, a client program in your computer forwards your request to a server program at the bank. That program may in turn forward the request to its own client program that sends a request to a database server at another bank computer to retrieve your account balance. The balance is returned back to the bank data client, which in turn serves it back to the client in your personal computer, which displays the information for you. The client/server model has become one of the central ideas of network computing. Most business applications being written today use the client/server model. So does the Internet's main program, TCP/IP. In marketing, the term has been used to distinguish distributed computing by smaller dispersed computers from the "monolithic" centralized computing of mainframe computers. But this distinction has largely disappeared...

Words: 2053 - Pages: 9

Free Essay

Client/Servers

...qwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwer...

Words: 704 - Pages: 3

Free Essay

Udp Client Server

...UDP Client and Server The  UDP client and server are created with the help of DatagramSocket and Datagram packet classes. If the UDP protocol is used at transport, then the unit of data at the transport layer is called a datagram and and not a segment. In UDP, no connection is established. It is the responsibility of an application to encapsulate data in datagrams (using Datagram classes) before sending it. If TCP is used for sending data, then the data is written directly to the socket (client or server) and reaches there as a connection exists between them. The datagram sent by the application using UDP may or may not reach the UDP receiver. UDP client import java.io.*; import java.net.*; public class MyUDPClient {      public static void main(String[] args)      {          try         {               // InetAddress class is used to getting local address                InetAddress ia = InetAddress.getLocalHost();               //DatagramSocket class is used creating UDP socket               DatagramSocket ds=new DatagramSocket(1236,ia);               // this is message string passes to the server               String y="Hell srver i am client";               //converting this string in to byte array with help of getBytes() method                byte [] b=y.getBytes();               //creating DatagramPacket of byte array               DatagramPacket dp =new DatagramPacket(b,b.length,ia,8);               // send to the server socket               ds.send(dp);              ...

Words: 486 - Pages: 2

Free Essay

Client Paper

...Callie Client Paper BSHS/305 Dr. Elizabeth Brooke Morford November 2, 2004 Clients that who receive assistant from human service professionals can be an individual, family or even group or community. As humans we are all faced with problems but as individuals we handle them differently. Human service professionals are there to help clients navigate through those problems, by using skills and resources at their disposals. These problems range from once in a lifetime changing event like a car accident which causes physical and cognitive disabilities. Some individuals are plagued with addictions to substance like illicit and prescription drugs and alcohol. Families that receive services deal with some of the problems that were previously mention but the affects causes strain on the family unit. They also deal with conflicts amongst them because of personality differences. When it comes to problems in a group dynamic these problems can include cultural differences. Mental health issues is an issue that affects the individual, the family and group dynamics. Human Service Professionals are taught that the first step to helping a client is finding out what the problems are. There are four ways the professional can evaluate the client’s problems.   1) Developmental problems are defined as something that has happen over one’s life. 2) Situational problems are when the client has been put in a situation that has cause a problem in their life. Examples of situational problems...

Words: 1054 - Pages: 5

Premium Essay

Client Technology Tracking System Milestone2

...PROBLEMS, OPPORTUNITIES, OBJECTIVES AND CONSTRAINTS MATRIX |Project: Client Technology Tracking System |Project Manager: Peter Charles | |Created by: Anna Kelly |Last Updated by: Anna Kelly | |Date Created: 09/22/2011 |Date Last Updated: 09/22/2011 | |CAUSE AND EFFECT ANALYSIS |SYSTEM IMPROVEMENT OBJECTIVES | |Problem or Opportunity |Causes and Effects |System Objective |System Constraint | |The current system dose not accurately track |The papers placed in the three-ring binder are |A searchable database with configuration |Nixed the idea of having configuration and | |configuration information, leading to wasted time |disorganized so the information is never really |information is needed. |component information...

Words: 638 - Pages: 3

Free Essay

Ntc 245 Clients

...Client Concepts Gabriel Diaz NTC/245 May 4, 2015 Edward Brown Client Concepts There are many differences between fat and thin clients. Fat clients house their own operating systems and can run complex software and applications because of the hardware they are built with. Fat clients allow more customization options and allow users to work offline because they do not always need to be connected to the network. As put by (Gaskin, 2011), fat clients have “been the rule for the past 30 years and will remain important for high-powered data churning applications such as video production, software development and database churning.” However, thick clients do have their downsides. It seems in recent years thick clients have lost their popularity as the cost and aggravation of maintaining those increases. Thin clients have become increasingly popular in light of these problems. A think client is a computer that is connected to a network that cannot perform complex tasks like a thick client. By using the resources of a server, a thin client is relatively inexpensive in terms of hardware and software. “By further comparison, a fat client balances program dependence locally with a hard/connected drive and device resources, while a thin client balances program dependence with a network server’s hard/connected drive and device resources (Janssen, n.d.).” Thin clients have been made popular through tools most people use on a daily basis. Our smartphone are probably the thinnest clients...

Words: 546 - Pages: 3

Free Essay

Client Server Configuration

...Running Header: Unit 7 Assignment 1 Client Server Configuration Unit 7 Assignment 1 Client Server Configuration Robert D Williams ITT-Tech MR. Brockman NT1230 Client Server Networking Friday, February 10, 2012 The hardware side should be set up with raided hard disks preferable in as a raid 6. There should be at least two NICs for each server to ensure that connectivity is not lost. IT recommends that we have at least three hours of a backup power available. In order to cut costs IT would like to if more then one server is required to set up virtual servers. The server roles that we network administration recommends would include, active directory services for security to ensure that they only authorized persons are accessing the system and to help to make sure that if necessary encrypt the information so that if the system is breached the information stays secure. An active directory domain services so that IT can manage the system better. This would include user profiles and is a required to add other services that will be needed as well. An active directory domain rights service is recommend to help ensure that only the users that need certain information have access to it. This also enables us to limit what some users can do with the information such as look or modify the information in a file. An application server, so that all employees will have access to needed programs to get their jobs done. A dynamic host control protocol and a domain...

Words: 589 - Pages: 3

Premium Essay

Client Server Networking I

...------------------------------------------------- NT1230 ------------------------------------------------- Client-Server Networking I ------------------------------------------------- Homework Assignments Name: Ernani Narag Week 6 Homework: Due Week 7 Assignment 1: Ticket Escalation Assignment Requirements Respond to the following email, making recommended solutions and explaining the rationale for your recommendations: ---- FROM: Manager TO: Systems Administrator RE: Support Prioritization I am receiving complaints from department supervisors that their support issues are not being addressed in a timely manner. We need a ticket escalation policy to ensure business priorities are met, while managing end-user expectations. Please draft a policy describing how support requests will be prioritized. In addition to normal troubleshooting prioritization, please address the following departments: customer service, sales, accounting and marketing, prioritized in that order. How can we better manage these business requirements? ---- Submission Requirements Address all of the concerns of the manager and provide a recommendation. Microsoft Word. 1-2 pages. Self-Assessment Checklist I made recommendations to address all of the concerns in the email. | * | I explained my reasoning. | * | I composed a professional response. | * | I used critical thinking. | * | I have followed the submission requirements:File Format: Microsoft...

Words: 359 - Pages: 2

Premium Essay

Client Server Networking Analysis

...First the warehouse workstations. For those I would really try to install Windows 7 Enterprise. With Enterprise, the workstations can access their server without VPN. It also allows the workstations to access files from their server much quicker. Plus the added security, like the encryption of internal and external drive data, would not hurt. Only problem is that the company needs a volume license in order to be able to have Enterprise installed on their computers. However, if this business has Microsoft’s Software Assurance, then they can have Enterprise installed at no extra cost. For the workstations at the main office building, I would try to have Enterprise installed on those computers, but Professional would be good too. Enterprise for the same reasons as above. Faster server access, better security, etc. Professional would be fine on these workstations though. Since these workstations are in the same building as the physical server, they would not need the faster server access. The only thing that Enterprise would be installed for is the better security. No matter which Windows 7 edition I choose to install, I would choose to do a clean install over just an upgrade. Both would put the new Windows edition on the workstations, but one is more secure than the other. An upgrade just changes the version of Windows without moving/deleting anything on the computer. Any files, caches, background running applications, etc. will still remain once 10 is installed. With a clean install...

Words: 299 - Pages: 2

Free Essay

Peer to Peer and Client/Server Networks

...Peer-to-Peer and Client/Server Networks Darsheen Smith Strayer University Peer-to-Peer and Client/Server Networks A network is a group of computers and other devices, such as a printer, that are connected by some type of transmission media (i.e. fiber optic cables or radio waves) (Dean, 2010, p.2). Originally “sneakernet” was the only means of electronic source sharing. It involved the transfer of electronic information by physically couriering removable media, such as floppy disks, from one computer to the next (Wikipedia, 2011, para 1). With the advancement of computer technology so is the modernization of computer networking. Analysis There are two types of networks, peer-to-peer and client/server networks. Both have the capability to communicate with other computers on the network. They also have the capability to protect files from unauthorized users. There are also distinct differences between the two types of networks. In a peer-to-peer network every computer can communicate directly with every other computer. No computer has more authority than another. A Typical peer-to-peer network consists of two or more personal computers (Dean, 2010, p.3). In contrast, a client/server network consists of a central computer, called a server, which is designed to permit communication and information sharing between computers, known as clients, on the network. The clients do not share their resources directly with each other...

Words: 642 - Pages: 3

Premium Essay

Nt1330 Unit 3 Assignment 1 Client Server Architecture

...Client-server architecture of a computer network in which many clients (remote processors) request and receive service from a centralized server (host computer). Client computers provide an interface to allow a computer user to request services of the server and to display the results the server returns. Servers wait for requests to arrive from clients and then respond to them. Ideally, a server provides a standardized transparent interface to clients so that clients need not be aware of the specifics of the system (i.e., the hardware and software) that is providing the service. Clients are often situated at workstations or on personal computers, while servers are located elsewhere on the network, usually on more powerful machines. This computing...

Words: 418 - Pages: 2

Premium Essay

Nt1330 Unit 3 Assignment 1 Client And Server Architecture

....NET .NET have offers a client/server technology by deploying web-based applications written in ASP.NET on a Windows Server running IIS. For client desktop applications, .NET doesn’t provide any tools for automated deployment of application. The developer must compile the application and handle the install on each client. There are also isn’t an application server for .NET that meaning there is no centralized way to manage solution and clients. Most .NET developers use the Visual Studio IDE (Interface Design Environment) to develop their applications. There is no built-in version control with .NET, although you can setup your own SVN/CVS server to manage sharing code with multiple developers. Other Microsoft technologies such as SQL Server and Active Directory, have API’s available for .NET so developers can write code to integrate those services into their applications. Note that the API is available and the .NET framework doesn’t do much for you automatically. The .NET developer must control everything manually in their code. SERVOY...

Words: 400 - Pages: 2

Free Essay

Governor Attorney-Client Privilege

...Governor-Attorney Client Privilege I. The Office of the Governor should not invoke government attorney-client privilege to prevent testimony by a government lawyer when the lawyer is subpoenaed in a federal grand jury investigation for possible federal criminal violations. This decision is up to the courts in a case by case basis. a. Attorney Client Privilege is subject to the common law by courts “in the light of reason and experience.” FRE 501. i. FRE 501 can be relied on over FRE 503 at the discretion of the Court. 1. FRE 503(a)(1) only makes “broad propositions that a governmental body may be a client for purposes of the attorney-client privilege” (In Re Duces Tecum, 8th circuit, 916). a. “We are instructed by Rule 501 to interpret the attorney-client privilege via common law ‘in light of reason and experience’ and not solely in light of the rule promulgated by the Supreme Ct. in 1972” (Id). ii. Necessity of Granting Potentially Relevant Info to Fed. Grand Jury as a matter of Constitution and Criminal Justice. 2. It is up to the federal grand jury to determine whether there is sufficient evidence to justify a formal accusation against a person for a crime (US Constitution, 5th amendment). 3. The rule of law should reign supreme and should be considered natural that every step be taken to ensure that justice be served promptly. b. “Supreme Ct. recognizes that the principle...

Words: 1142 - Pages: 5

Free Essay

Peer-to-Peer vs Client Server Network

...What's the difference between client/server and peer-to-peer networks? There’s quite a bit, although most of the differences are in two areas – security and cost. Beyond that, your consideration for what you need is largely dependent on budget and the size of your organization. So, what’s the difference? A peer-to-peer network has no central server. Every workstation on the network shares files equally with everyone else on the network. This also means there is no authentication of users and no central storage. This model is considered a decentralized form of networking. Conversely, the client/server network provides a central pool of data and resources, with user profiles established with localized restriction on which data can be accessed. This model is commonly referred to as a centralized form of networking. Both are good! There’s an old saying, ‘wisdom is what works’. Well, the same is true for your network. Peer-to-peer networks are great for use in homes or in small businesses where employees interact regularly and share all information and files. They don’t cost much to setup, nor are they difficult to manage. The downside is there’s almost no security (pretty much controlled at an individual ‘share’ level). Once you get more than 8-10 workstations connected, there would likely be an impact to performance and management since each station functions as both client and server at the same time. As each employee manages the sharing of their workstation...

Words: 452 - Pages: 2