Premium Essay

Nt1330 Unit 3 Problem Analysis

Submitted By
Words 1311
Pages 6
The routine job of scheduling employees within a company can be complex due to the diverse number of combinations available. The "integer goal programming model," when used for employee shift scheduling, lends success in many different types of work environments. This assists in providing practical answers in a quick and efficient manner. The integer programming formulation solves the complex problems within approximately 98% efficiency. This program is versatile enough to be able to handle a vast number of zero-one variables. The flexibility it bestows can make the job of employee scheduling a quick and easy task. The use of this program will ensure that you have the correct number of employees to staff the current needs of the department …show more content…
Variables and Their Relationships

A decision variable is an input that is controllable. This represents the significant decision to be made that will meet our objective. The outcome variables for this problem are to determine what the accurate number of people are to cover each shift to deliver the optimal customer service for our clients while keeping the payroll within the budget set forth by the company. We need to be able to have the correct mix of customer service representatives to make available the greatest resources to meet the needs of our business.
Formulation of the Model

I held a meeting with the manager of the West Coast Customer Service Team and listened to her concerns. Many people on her team want to work the earlier shifts with only a few who were willing to be adaptable. After meeting with the team and explaining to the hardships that the customers are experiencing with her limited staffing later in the day; she handed out the survey asking them to complete it honestly and to be as open-ended as

Similar Documents

Premium Essay

Nt1330 Unit 3 Problem Analysis Paper

...There is a variety of anti-virus software is on the market today, only a selection of them have an all in one protection which includes protection for servers, safe storage and of share sensitive data (internal and external) on networks. Avira Server Security is a recommended choice for network that consists of a variety of server points. The anti-virus software updates automatically, including back-up server protection, ensuring all data is protected without the need for an automatic patching systems. A penetrating testing schedule should also be included, along with policy and procedure on how to safely carry out testing by trained administrators, to exploit system vulnerabilities. The handling of sensitive data within departments can be monitored by using monitoring software on desktops, or watching corporate traffic on system network. Monitoring software send all activity and history logs to the Information Technology department, this can be reviewed or analysed at any particular time, to monitor how data is being transferred or handled both internally and externally. These measures can indicate whether the right protocols are being followed within each department. A penetrating testing schedule should also be included, along with policy and procedure on how to safely carry out testing by trained administrators. The loss of power can be prevented by implementing a back-up generator with an automatic transfer switch. Uninterrupted power supplies have a battery life of 30minutes...

Words: 664 - Pages: 3

Premium Essay

Nt1330 Unit 3 Problem Analysis Paper

...recommended approach is advantageous over the others since it provides the patients with the flexibility to choose various providers. Question Three Data warehousing and data mining can be used within the healthcare system to improve various hospital operations. Data mining can be used to facilitate proper decision making by hospital management and also support hospital recruitment activities. Winter and Haux (2012) stated that data mining helps pull management-relevant data from other systems while data mining enhances the analysis of such data to provide appropriate information that can support healthcare managers. In terms of recruitment, patient documentation data can be mined by the warehouse systems to foster proper recruitment of participants for clinical trials. References Mosser, G., & Begun, J. W. (2013). Understanding Teamwork in Healthcare. McGraw Hill Professional. Scott, R. T., & Rosenblatt, H. J. (2017). System Analysis and Design Eleventh (11 ed). Boston, MA: Course Technology Cengage Learning Winter, A., & Haux, R. (2011). Health Information Systems: Architectures and Strategies. London: Springer ...

Words: 438 - Pages: 2

Premium Essay

Test

...30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110  NT1210 Structure and Introduction to  ComputerLogic Networking    IS3120 IS3110 NT1210 Network  Risk Management in Introduction to General Education...

Words: 2305 - Pages: 10

Premium Essay

Nt1230 Syllabus

...adminstrative tasks of popular desktop operating system(s) for standalone and network client computers, and related aspects of typical network server functions. Client-Server Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course relates to other courses in the NSA program: 1 Date: 8/31/2012 Client-Server Networking I Syllabus NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420...

Words: 1834 - Pages: 8

Premium Essay

Nt2640

...as well as router and switch configurations, are also examined. IP Networking Syllabus Where Does This Course Belong? This course is required in the associate degree program in Network Systems Administration and associate degree in Mobile Communications Technology. The following diagrams indicate how this course relates to other courses in respective programs: Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1201 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming Technology Courses General Education/ General Studies 1 Date: 7/18/2011 IP Networking Syllabus Mobile Communications Technology MC2799 MCT Capstone Project NT2640 IP Networking MC2560 Mobile Wireless Communication I MC2660 Mobile Wireless Communication II MC2665 Mobile...

Words: 2573 - Pages: 11

Premium Essay

Nothing

...practices, various media and interconnection components), networking devices and their specifications and functions. Students will practice designing physical network solutions based on appropriate capacity planning and implementing various installation, testing and troubleshooting techniques for a computer network. Where Does This Course Belong? | | | NT2799 | | | | | | | | NSA Capstone | | | | | | | Project | | | | | NT2580 | | | NT2670 | NT2640 | | PT2520 | | Introduction to | | | | | | | | | | | Email and Web | | | | | Information | | | | IP Networking | | Database Concepts | | | | | Services | | | | | Security | | | | | | | | | | | | | | | | NT1330 | | | NT1230 | NT1430 | | PT1420 | | Client-Server | | | Client-Server | | | Introduction to |...

Words: 10839 - Pages: 44

Premium Essay

Unit

...opportunity for work experience in your field or in a related field to add to your résumé. You may have an opportunity to serve your community or work for a local employer for a project that will take between 20 and 30 hours. Project Logistics Career Services will identify an employer with needs in the following areas: Network related tasks (mostly confined to the LAN and Microsoft Windows Server 2008 environments) Students are expected to practice various skills discussed in all the technical courses in Quarters 1 through 3 of the NSA program at an employer’s site on network related tasks (more confined to the LAN and Microsoft Windows Networking with Server 2008 environments) that would involve installation, configuration, testing, maintenance and documentation of the worksite network and its components, and to properly document the technical information in all involved activities. Such documentation will be used as the source material for Items 2 and 3 defined in the Deliverables section of this document. Possible example projects could be (but are not limited to): Install/maintain/upgrade site LAN cabling/wiring Survey, inventory and document networking layout and assets Install, configure and/or support Windows 7 desktop as network clients Install, configure and/or support Windows Server 2008 for a network Install, configure and/or support a site LAN (local area network, wired or wireless) General network user...

Words: 6762 - Pages: 28