This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Wellness

requesting funds to purchase and integrate six new web servers

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

requesting funds to purchase and integrate six new web servers

 Introduction

The purpose of this proposal is to request funds to purchase and integrate six new web servers that could help more business travelers using the web to reserve rental cars and hotel rooms and business trips. Also, buying airline tickets for business, vacation, or pleasure. A web server’s significant functions are to process, deliver, and store web pages to various organization clients (Potter et al. 2018). The organization requires an expansion that could inhibit the web capacity since the growth of an organization is determined by the satisfaction and quantity of consumers using the organization’s utilities.

Background

The organization is based in Georgia, with many of its facilities spread across the state. It is a significant medical organization with primary health care, caregiver education, and health wellness and promotion. The organization has multiple medical facilities and numerous hospitals that serve people, giving them high standard medical care. The co-relation of each organization is bonded by a web server that serves all the facilities as one. This makes it easier for one body to manage its facilities.

The central vision and mission of the organization are to provide a persistent devotion to clinical fineness, patient well-being, and unparalleled desire. Also, an obligation to guarantee the paramount healthcare to patients, to provide a high standard of quality to patients- motivated health care that is accessible and has a favorable price to every patient. The goal of the organization is to be a well-known World-wide organization.

Don't use plagiarised sources.Get your custom essay just from $11/page

Analysis of procurement risk

Risk analysis is essential as it serves as the techniques used to certify that the contract is ongoing in a prosperous manner. More so, procurement risk is referred to as the potential failures of a procurement process designed to purchase a service, resource, or product. Some of the dangers that may be faced by an organization include;

Inadequate needs analysis – An organization may transpire purchasing too much, not sufficient or wrong services, at sub-optimal values without the advantage of economies and discounts of offered scales by well-negotiated contract. Rogue spending is a crucial apprehension; both in procurement strategy and financially, it generally takes a severe hit to accuracy. The risk can be reduced by utilizing robust packages for procurement software that provides tools to collect and analyze organization data. Hence using a required server to manage the organization.

Software vulnerabilities, for example, Cybercrooks and hacking. – the use of weak or insecure web servers creates a room leakage or exposure of important organization information. This can be reduced by inhibiting robust and secure software to cope with organization data.

Fraud and corruption – Some risks are malicious and intentional. They include; false record-keeping, invoice fraud, and even embezzlement on organization information. This can be reduced by providing an automated and transparent procurement function, limited catalogs from a preferred vendor, and complete transactional information with manuscript cross-checking that makes it tough for a potential fraudster to defer to fake invoices or obscure corruption.

Methods of managing procurement risk

Risks are events that can impede procurements from attaining business and functional objectives (Hong & Zhang 2018). Without these risks, it isn’t straightforward to achieve its enhanced values. The methods aim at identifying, assessing, and managing each risk proactively. The methods use 4t’s framework strategy in managing the risk.

Terminate: Procurement distinguishes the dangers and is considered too risky to ensue and is terminated. The requisite to end the risk rises because effective mitigating strategies are too complicated, dangerous, and expensive to consider.

Tolerate: Generally, this is after the risk is known, and established that the probability of happening is low, or the threat is abridged to levels equal with risk appetite.

Transfer: This resolves or manages the risk by transferring it to a third party. Insurance or Outsourcing are some of the methods of accomplishing this strategy. The element conveyed should always be from the organization requires that it is unable to manage.

  • Treat: Procurement recognizes the likelihood of the event happening again and influences to supply and keenly copes the risk by executing mitigating strategies.

Requirements and environment for the new hardware and software

The medical organization in need of six new web servers that requires an extensive, secure, and standardized data set that stores details for all patients. For a large dataset, data load is usually the biggest concern. A sizeable medical organization would want to incorporate a minimum of 4 x 2 x 1 topology and investment in supplementary resources on the SQL server tier of the given topology (Sheikh, 2018). Some of the recommended SQL server tiers of a vast organization dataset topology include;

Hardware

  Processor64-bit, four-core, 2.5 GHz minimum per core (If your dataset magnitude is suggestively superior to the common dataset, we acclaim eight cores.)
RAM

 

32 GB

 

Hard disk

 

250 GB

 

 

Software

This describes the requirement in software for a large organization. The software requirement is based on its operating system, database server, SharePoint Server, and its feature usage. It includes;

The operating system of 64 bits that has a feature of virtual storage, multiprogramming, time-sharing and can be able to multi-process information. Some of the leading PC with a suitable operating system includes Windows 2000, Windows Server 2003, Windows XP, UNIX Windows 98/Me, Windows CE, Linux, DOS, and Mac Os.

A latest SQL version with 64 bits and an R2 with Service Pack 1. The SQL Server should have the following components, Analysis services, Management tools, Connectivity components, and Database engine.

Requirement and schedule information/statement of work

The web servers opted to be added for the benefit of the organization will serve as a tool for making a job easier between the multiple organization. The web server is scheduled to

  • Ease management applications.
  • It is set to increase and optimize work performance and high-level security.
  • It increases the chances of the utilization of server-side scripting languages such as PHP and cold fusion.

The advantages of using robust, secure servers include; it gives scalability, improves collaboration, allows for faster organization expansion, it also provides for an automated and centralized backup system. More so, it adds up seamless connectivity between multiple organizations.

Process of evaluation

Evaluation is understood as a vital component of some programmer. An evaluation proposal needs to be resolute at the establishment of a programmer advancement, so that for information collection for this tenacity is into project operation. Apart from providing data on the efficiency of a programmer, an evaluation assists in recognizing the difficulty in running. The goal is essential to be imitated in the evaluation proposal and the recital indicator selected. This will help in deciding in what way is preeminent to convey out the evaluation. There stand several different approaches that can be cast-off to evaluate a programmer. Each process has various benefits and difficulties, and the choice of which to practice will be subject to the goals of the programmer, and the resources accessible. It is imperative that the outcomes of the evaluation are mutual with suitable events and that they are utilized in the development of future programmers.

 

 

 

 

Reference

Hong, Z., Lee, C. K. M., & Zhang, L. (2018). Procurement risk management under uncertainty: a review. Industrial Management & Data Systems.

Potter, S. C., Luciani, A., Eddy, S. R., Park, Y., Lopez, R., & Finn, R. D. (2018). HMMER web server: 2018 update. Nucleic acids research46(W1), W200-W204.

Sheikh, B. T. (2018). Interdisciplinary Requirement Engineering for Hardware and Software Development-A Software Development Perspective.

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask