Professional Documents
Culture Documents
BSBOPS502 Manage Business Operational Plans: Project Portfolio
BSBOPS502 Manage Business Operational Plans: Project Portfolio
Financial Information
The board of directors decided to create a cloud-based solution that will
allow consumers to access the software from their own devices. A
cloud-based solution is expected to cost $2 million, according to the
board of directors.
Cloud policies are the rules that govern how businesses use the cloud.
Cloud policies are commonly used to protect the integrity and privacy of
company-owned data, but they can also be used for
finance management, cost utilization, performance management, and
security of network.
Establish potential
Requirements for Physical Resources
physical resource
The delivery of various services over the Internet is known as cloud
requirements computing. These resources include data storage, servers, databases,
Use the information from networking, and software, among other tools and applications.
• The licensing of a software application to clients is known as software-
your research and
as-a-service (SaaS). Licenses are usually supplied on a pay-as-you-go
knowledge of your work
or on-demand basis. This kind of mechanism is available in Microsoft
area. Office 365. Infrastructure-as-a-service (IaaS) is a means of supplying
For each potential activity everything from operating systems to servers and storage as part of an
on demand service using IP-based connection. Instead of purchasing
in the operational plan, list
software or servers, clients can obtain these resources through an
the physical resources
outsourced, on-demand service. IBM Cloud and Microsoft Azure are two
required (identify at least well-known examples of IaaS systems. The most complicated of the
one). three layers of cloud computing is platform-as-a-service (PaaS). PaaS
and SaaS are comparable in several ways, but the main distinction is
For each physical
that instead of distributing software online, PaaS delivers it locally.
resource:
Salesforce.com and Heroku
Attachment 1-Project Portfolio Template
• research and
summarise
information on
resource alternatives
input)
resource will be
obtained/purchased
procedures
implications (e.g.
approval required,
Amount to be
budgeted etc.)
explain any
Intellectual Property
(IP) requirements,
rights and
responsibilities linked
to the resource (other
than those already
considered).
List ways to monitor the an upgrade, and the breadth and frequency of security audits.
KPIs. Other essential KPIs monitor data encryption, anti-virus software
use and timeliness, and isolation and logging.
3. Service and Helpdesk: Controlling service and helpdesk KPIs such
as the times at which assistance is offered and the support
techniques used.
6. Lack of staff with the skills to manage security for cloud applications
Consult with others The following are some of CGI's consulting services:
Summarise the outcomes of Formation of a cloud strategy and roadmap
your meeting with relevant
— For the shift to a cloud-enabled hybrid IT environment, CGI
stakeholders:
professionals give consulting and planning across strategy,
Which stakeholders did applications, data, and infrastructure. We assist clients with aligning
you consult with? business and technical requirements, documenting key indicators of
cloud adoption success, and developing a customised roadmap for
Why were these
moving ahead. To enable enterprise transformation adoption, we use
stakeholders part of the
tried-and-true tools and frameworks, such as:
consultation process?
• Capture and aggregate enterprise data with CGI Unify360 Portfolio
Were any changes to
Manager.
your suggested
activities, resources, The CGI Unify360 Code Analyser analyses source code to discover
timeframes, KPIs and which applications are most suited for cloud migration.
monitoring processes
Evaluation of the cloud situation
requested?
Describe how you
collaborated to achieve joint - CGI aids customers in examining their current applications in order
outcomes. to determine cloud suitability. We examine responsibilities (entire
portfolios or specific apps) together, and then devise a best-fit cloud
How did you seek feedback,
foundation arrangement plan for each. We discuss the re-engineering
advice and support?
and costs associated with inheritance applications. We plot cloud
specialist co-op (CSP) contributions based on the cost, risk, and
effort of cloud move. The cloud availability assessment aids in the
planning, migration, and management of the mixed IT biological
system's advancement.
Application modernization and defence — Using CGI tools and
techniques, our experts assist organisations in assessing legacy
portfolios and applications in preparation for cloud migration. Our
application modernization and defence measures reduce waste by
removing old and maturing innovation. Our strategy is in line with the
hybrid IT ecosystem architecture and enhances system compatibility.
• Our specialists use data collecting and analysis tools like CGI
Unify360 Portfolio Manager and other third-party tools to determine
which apps can be migrated to the cloud directly, which should be
rebuilt, which should be replaced (possibly with a SaaS model), and
which should be left alone.
• We use CGI Unify360 Code Analyzer to analyse source code,
detecting and resolving technical cloud migration barriers.
Attachment 1-Project Portfolio Template
Migration and transformation are two words that come to mind while
thinking about migration and transformation.
CGI provides end-to-end services for planning and executing cloud
migrations to any cloud target, from a single system to the business.
Key benefits :
• Complete awareness of both the commercial and technical sides of
cloud computing
• Describe the dangers, benefits, and consequences of cloud
computing for your company.
• Expert cloud computing guidance and recommendations
• A clear transition path
• Full implementation and transition assistance
• Highest possible return on investment with the least amount of risk
timeliness, as
well as
isolation and
logging.
4. How many
calls are
made or
which support
methods are
used and
received per
week.
5. the
support's
qualification
Organize a Advertisement
Sales 6 months
live Consultant
demonstration manager Cloud
for current computing
clients. service
provider for
graphic
designers
Storage of
data
improve Educate Servers
6 months 25000$
our salespeopl Databases
people's e on how to Networking
talents in use the software
order to be new
more product.
effective
support
customers
Networking
Software
Organize
6 months
school visits
Attachment 1-Project Portfolio Template
Activity required to Risk associated with How you will mitigate the risk
realise objective the activity
Make a web User Privacy Is Treating user data with respect (due to the importance
advertisement for Being Invaded of privacy) by acquiring legal authorization for the use of
the new product. a name or likeness in advertising, and protecting your
users' privacy
Organize a live Defamation All of their information is thoroughly vetted, and they
demonstration for avoid making disparaging remarks about a competition..
current clients.
Educate Lack of product You can increase your sales team's performance and
salespeople on knowledge assist your firm further its mission by identifying,
how to use the new monitoring, and mitigating risks.
product.
Arrange for school It's possible that A brief follow-up email following each stage of the free
visits. prospects will take trial (signing up, live demo, etc.) encourages your users
longer to convert into to take action.
paying clients.
Attachment 1-Project Portfolio Template
TOXOPEUS, Lucas
Document resource Searching the internet for cloud-based businesses that fit the
requirements budget. If Worlducation receives what it requires, it will enter into a
cloud computing collaboration agreement to ensure the
Document the resource
confidentiality of Worlducation's data in the cloud, as well as the
requirements (following
security of company data, in line with existing privacy regulations.
organisational policy and
procedures).
Attach proof to this section of Requirements for Physical Resources The delivery of various
the portfolio. services over the Internet is known as cloud computing. These
resources include data storage, servers, databases, networking,
and software, among other tools and applications.
1. SaaS (software-as-a-service) refers to the licensing of a software
application to clients. Licenses are usually supplied on a pay-as-
you-go or on-demand basis. This kind of mechanism is available in
Microsoft Office 365.
2. Infrastructure-as-a-service (IaaS) is a mechanism for offering
everything from operating systems to servers and storage as part of
an on-demand service using IP-based connection. Clients can
avoid purchasing software or servers by renting them instead. The
most complicated of the three layers of cloud computing is platform-
as-a-service (PaaS). The key distinction between PaaS and SaaS
is that instead of distributing software online, PaaS is a platform for
producing software that is provided via the Internet. Platforms like
Salesforce.com and Heroku fit within this approach.
Attachment 1-Project Portfolio Template
Operational plan (if you did not use the provided table) ☐
Contingency plan (if you did not use the provided table) ☐
Incorporate Intellectual Here are a few things to keep in mind when incorporating our
Property (IP) requirements company's intellectual property (IP) requirements:
Take necessary steps to
ensure any IP requirements
Various associations now keep their data assets on a variety of local
(established in Section 1 of
and cloud-based limit contraptions. As a result, the initial step in
your Project Portfolio) are
obtaining guaranteed development is to locate it, create a
incorporated in the execution
framework for it, and depict it in a range of sizes, from the tiniest to
of activities (e.g. memo to
the most difficult. Customers can also bring their own devices
staff, contractual agreement,
thanks to the presence of BYOD. They routinely copy sensitive data
Attachment 1-Project Portfolio Template
email to include it in induction to their own devices while working on their computers in a way that
process etc.) makes them think twice about data. To avoid data breaches, it's
critical to recognise who approaches sensitive property, such as
Attach proof to this section of
clients, project labourers, and associates, and to pick out likely
the portfolio.
symptoms of compromise. Keeping an eye on access control to
detect insiders who no longer require access (e.g., who have left the
organisation or gone on to another venture) is also a significant
development.
Insiders or workers who are disgruntled might sometimes
compromise sensitive information, thus organisations should focus
on implementing security procedures. Delegates should be informed
on association shows and strategies for overseeing safe
development, as well as the outcomes of their activities. A data
security method should specify which data should be obtained and
where it should be discovered, as well as who should access it and
how it should be protected. It should also mention how sensitive
data, such as IP, should be migrated, as well as the process for
destroying it when it is no longer needed or required.
Affiliations can look through a wide range of data security devices,
and taking effective risk countermeasures is critical to reducing the
risks associated with IP. This includes performing certain controls to
monitor customer activities as well as maintaining access controls.
Data Loss Prevention (DLP) strategies, like Endpoint Protector, are
an important part of any online security strategy. This method can
locate sensitive data, both moving and fixed, and track how and by
whom it is utilised. Similarly, encrypting important corporate data or
creative work data can reduce the chance of difficulties.
Thank you for taking the time to read the information I've provided
above.
Lucas TOXOPEUS
Lucas texopeus
Negotiate and approve Many beneficial outcomes are realised by our organisation.
variations
Summarise the outcomes of
By using variance analysis effectively, you can do the following
your negotiations with relevant
stakeholders: • A competitive advantage in demonstrating your capabilities
through clarity of structure and processes, as well as clearly defined
Who was part of the
roles and duties.
negotiation?
• Improved risk management as a result of insights that minimise
What are reasons for
both controllable and uncontrollable variability.
underperformance and
how can it be solved? • Improved decision-making that increases shareholder value.
What did you negotiate • Behavioural and systematic biases in your forecasts and variance
(e.g. adjusted timeframe results are eliminated.
to allow for additional • A better grasp of the relationship between profitability drivers and
training)? other indicators like price/volume.
How can you support the
resource going forward?
Which variations were
approved?
Attach proof of your
negotiation to this section of
your portfolio (if not already
viewed in person by your
Attachment 1-Project Portfolio Template
assessor).
Documented performance ☐
Proof of approval ☐
Attachment 1-Project Portfolio Template