Verified Document

Lawrence Berkeley National Laboratory Implementation Plan Introduction Essay

Lawrence Berkeley National Laboratory Implementation Plan Introduction and Business strategies

Lawrence Berkeley National Laboratory continully receives increasing competition in the information services industry. To reinstate the effectiveness and generate consumer satisfaction, as well as company presence in the market, a proactive strategy must be formed to increase functionality and service, as well as generate a wider consumer base, all while minimizing overhead and operational cost. Along with this aim, an implementation plan must be executed. The plan will consist of a five-step problem-solving model. This model will identify and address concerns, while establishing a process of improvement for Lawrence Berkeley National Laboratory and create increases in the company's wireless service efficacy. "The 5-Step model is a process to; categorize the situation, label and frame the central issue, articulate final goals, possible alternatives, and evaluate those alternatives" (Kundra, United States, & Chief Information Officers Council (U.S.),2010, p. 12)

The model as mentioned, involves five steps and follows an incremental format. The advantages of using this model were to formulate and convey in accruments after chartering an overall architecture. Eight deliverables are classified as crucial in meeting the goals to increase effiacy in Lawrence Berkeley National Laboratory.

1) Increase capacity for wireless service in shuttle buses within three years.

2) Generate a strategy to increase research towards advancing the high speed networking divison

3) Start notifying customers of updates in service.

4) Align Technologies Workers Union with Lawrence Berkeley National Laboratory restructuring objectives three months after the strategy is implemented.

5) Show decrease in overhead expense three-month after financial growth strategy is developed and implemented.

II. Implementation Plan

Project Description

The reason for the creation of this project is to accommodate wireless Internet access to all (student, researchers, employees, and business travelers) using the Lab adminstered shuttle bus service.

The primary difficulty of this project is the installation and maintenance of wireless technology on the shuttle buses without causing a decline in shuttle service.

The aim is to increase and augment productivity for all who utilize the company's bus shuttles.

Measurable Organizational Value (MOV)

The main measure of value an increase in Lab shuttle bus use which wll minimize chances of overcrowded parking lots and allow for convenient use of web services. This will bolster productivity within the facility and traveling to it as well as added employee and consumer satisfaction. Evaluations of satisfaction will help improve the organization's ability to provide

Safeguards

Safeguards must be in place in order to prevent over-usage of the wireless network as well as data hacking. A password assisted login will keep guests from overloading the network and minimize who uses it who is not woring or studying in the organization. Routine maintenance including firewall and software updates will allow for a better measure of security. Many people will be using the wirless networks on a daily basis. It is imperative safeguards are in place to protect a person's personal data. The possiblity of leaked research or financial documents can lead to a loss of business or possible legal problems in the future.

Media-access control or MAC address filtering is an excellent tool in limiting access to only identifiable network cards with approved MAC addresses. "A MAC address is a hardware code unique to each PC and network device" (Martin, 2008, p. 50). It is not the strongest baseline defense, due to clear broadcast of MAC addresses, but it is a suitable safeguard. In addition to MAC protocols, encryption may also ensure access to sensitive date to only authorized receivers.

An example of encryption is WPA, a security standard, and it use of TKIP. "TKIP is an open protocol that includes a rekeying feature, a message integrity ceck, and packet key mixing" (Ward & Peppard, 2002, p. 32). It allows for greater control over security measures. Inclusion of VPN's or Virtual Private Networks allows for human safeguards. Workers who wish to access the company's networ from an unsecure location, for instance on the shuttle bus heading away from the facility or towards it, will have to follow protocol in order to keep data secure.

Project Scope

All of the sixteen passenger vehicles apart of the Lawrence Berkeley National Laboratory will have wireless access points installed and maintained in order to provide wirless internet service to all who board the shuttle buses and vans. Lawrence Berkeley National Laboratory owns ten shuttle buses and six passenger vans currently in function.

Vehicles that will not have wirless access points installed are lab owned cars, long-term use vans, and electric vehicles. The scope of this project to provide working internet access solely in passenger transport vehicles.

Project Schedule Summary

Project start date: September 1, 2013

Project end date: October 04, 2013

Timeline of project developments and breakthroughs:

All materials expected to be delivered on September 1, 2013

The first of sixteen vehicles installed with wireless access point on September 10, 2013

Milestone -- Successful test run of first 2 vehicles with wireless Internet

Next 2 vehicles in with installed with wireless access point on September 11, 2013

Milestone...

Installation process was done by a company outside of the control of the organization.
Following a strict schedule is imperative to keep budget concerns to a minimum.

Testing is crucial in predicting successful outcome of project and must meet or exceed Lab wireless protocol standards.

Requirements for Out-sourcing

Need to meet budget limit:Outsourced transpotation to move Class B vehicles decreased cost of project and let organization focus on other facets of the project, particularly the in-sourcing of the wireless network.

Out-sourcing of IT installation also achieved same goal to keep within budget and increase focus on wireless newtork

Requirements for In-sourcing

Need for increased security: The wireless network is important due to control over information sent and received and possible problems between users and support.

Resources Required

Workers -- Two Information Technology staff (acting manager Mr. Peach), One Transportation driver with Class B Passenger license (outsourced)

Technology -- Technology requirements consist of wireless technology including: wireless access points, virtual private network, encryption and virus protection, IT staff will provide the assistance to identify and measure the success of the implementation plan.

Facilities -- The maintenance yard suited for Lab vehicles makes the ideal environment for the completion of tasks. It will also allow for quick resolution to possible vehicle maintenance issues.

Resources to be provided

One Global Electric Motorcar

Facilities (responsible manager Mr. Llewellyn)

Needed from September 1, 2013 to October 4, 2013

Assumptions and Risks

Assumptions used to formulate estimates

IT staff's ability to finish two wireless installations per day

Key risks, chance of occurrence, and effect

Probability of vehicles needed for back-up during wireless installation

Maintenance requirements may hinder pace of installation schedule

Chance of key staff used for other mission critical Lab responsibilities

Limits

Project cannot hinder or prevent any and all IT departments daily duties or the operation of the organization owned shuttle service

Possible utilization of areas within or outside the organization

The IT staff must perform job duties without it affecting the shuttle service. Time of operation must not confluct with shuttle operation.

Project Administration

Communications plan

The aim is to advertise the new wireless Internet on Lab passenger vehicles and shuttle buses. This will achieved utilizing a number of methods. The Today at Berkeley Lab newsletter will be notified to run daily advertisements/notifications to ride the shuttle service. Bus drivers will also have given to them papers that will be posted inside the vehicles concerning the new service along with instructions how to access the wireless service. Finally, the Facilities Resource Manager agreed to send a mass email notifying the staff about the changes. The email will also include an invite for more users to utilize the shuttle service.

Scope management plan

The main objective of the scope management plan is for the Logistics and Site Services managers to deliver assurance all single passenger vehicles have wireless service installed and do not come into problems due to budget constraints and concerns over safety.

Implementation and project closure plan

The technical implementation of the wireless Internet for all chosen vehicles will be equipped with security features mentioned earlier that will safeguard riders from information theft. These safeguards include user login and encryption among others.Warnings will be posted on buses about information sensitivity while on access.

Glossary

Anti-Virus Software

Anti-virus software will protect your computer from…

Sources used in this document:
References

Haugen, D.M., Musser, S., & Lovelace, K. (2009). Outsourcing. Detroit: Greenhaven Press.

Kundra, V., United States, & Chief Information Officers Council (U.S.) (2010). 25 point implementation plan to reform federal information technology management. Washington [D.C.: The White House, [Chief Information Officers Council.

Lacity, M.C., & Hirschheim, R.A. (1995). Beyond the information systems outsourcing bandwagon: The insourcing response. Chichester: Wiley.

Laudon, K.C., & Laudon, J.P. (2002). Management information systems: Managing the digital firm. Upper Saddle River, N.J: Prentice Hall.
Cite this Document:
Copy Bibliography Citation

Related Documents

Technology in Ways That Make
Words: 5835 Length: 20 Document Type: Thesis

Students can collaborate with students in other schools and other countries as they develop ideas, skills, and products. Students in a class can collaborate outside class without having to meet in person. The theory behind collaborative learning is that the social construction of knowledge leads to deeper processing and understanding than does learning alone (Appalachian Education Laboratory, 2005). The bulletin board and the chat room have become the backbone of

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now