As the newly Chief Information Officer (CIO) for our company I highly understand the drive to become a leading provider and advisor for data collection and analysis field. With the leading edge equipment Web analytics and operating systems data the future of the company looks promising. Becoming a foremost consultant of Web analytics in this market will be fortuitist to the company. The vision of the Chief Executive Officer (CEO) will be foreseen in the near future with the proper planning and execution of the plan.
To rehash the accomplishments and aspirations on the future of the company. The company is currently a $25 million dollar data collection and analysis company that has been operating less than two (2) years. There are twenty employees on one floor to comprise the company faculty. The vision of the CEO is to grow by 60% over the next eighteen (18) months. Expand to three (3) floors within six (6) months that would consist of the new leverage department into cloud computing technologies and Software-as-a-Service (SaaS). These are the vision that the CEO has to improving the abilities of this company and as the CIO, I conquer with him. So this is beginning of the planning process to accomplish our task. With this enhancement of our technology our goal is to be able to support Corporations and Banking industries.
The company is into data collection and analysis in which certain utilities are used to perform these duties. The data that is collected is Attribute data which is presence or absence of a characteristic and Variables data that can be specific measurement. The descriptions of the two types are as followed: * Attribute data give you counts representing the presence or absence of a characteristic or defect. These counts are based on the occurrence of discrete events. * Variables data are based on measurement of a key quality characteristic produced by the process. Such measurements might include length, width, time, weight, or temperature, to name a few. This data may be SP-base data that can be collected over system traffic that we are analyzing.
Panel data (also known as longitudinal or cross sectional time-series data) is a dataset in which the behavior of entities is observed across time. Monitoring network upload and download data of computers or network devices (DVR, Internet radio, wireless connections, etc.). Online Monitoring Data is gathering information on the internet that the customers are producing and analyzing the essential output that can contribute to the customer. When we conduct analysis of a customer network we have two kinds of data; Quantitative data refer to the information that is collected as, or can be translated into, numbers, which can then be displayed and analyzed mathematically.
Qualitative data are collected as descriptions, anecdotes, opinions, quotes, interpretations, etc., and are generally either not able to be reduced to numbers, or are considered more valuable or informative if left as narratives. The following describes both: * Quantitative data – typically collected directly as numbers, the frequency (rate, duration) of specific behaviors or conditions, test scores (e.g., scores/levels of knowledge, skill, etc.), survey results (e.g., reported behavior, or outcomes to environmental conditions; ratings of satisfaction, stress, etc.), numbers or percentages of people with certain characteristics in a population (diagnosed with diabetes, unemployed, Spanish-speaking, under age 14, grade of school completed, etc.)
* Qualitative data – qualitative information tends to be “soft,” meaning it can’t always be reduced to something definite. Qualitative data can sometimes be changed into numbers, usually by counting the number of times specific things occur in the course of observations or interviews, or by assigning numbers or ratings to dimensions (e.g., importance, satisfaction, ease of use).
There are personnel that have assigned duties with in the company to accomplish these jobs. The first one is the Chief Information Officer (CIO) duty is coupling (aligning) what the information technology (IT) department conducts daily operations within the company. Analyst/Project Manager researches and analyze functions may include budget tracking and financial forecasting, project evaluation and monitoring, maintaining compliance with corporate and public regulations, and performing any data analysis relevant to project tasks. Staff Information Systems Analyst (Specialist) experience performing a variety of information technology systems analysis, design, development, installation, implementation, procurement, or technical support duties in connection with information technology systems, multifunction office automation systems, microcomputer systems, or teleprocessing networks or analysis of operational methods and designing information technology systems to meet desired results.
Database administrators—DBAs, for short—set up databases according to a company’s needs, and make sure they operate efficiently, fine-tuning, upgrading, and testing modifications as needed. They are also responsible for implementing security measures to safeguard the company’s most sensitive data. The system administrator is sometimes called the sysadmin or the systems administrator, responsible for maintaining a multi-user computer system, including a local-area network (LAN). Typical duties include:
* Adding and configuring new workstations
* Setting up user accounts
* Installing system-wide software
* Performing procedures to prevent the spread of viruses
* Allocating mass storage space
These are the staff members that are assigned to the IT department of the company to implement and supervise their certain areas of productivity. A description of the information systems that the company currently has to support the business are the Geographic Information Systems (GIS) is a method of digital (i.e., computerized) mapping that can show you where particular people, events, things, or conditions are, and give you other information about them as well. It links data to its geographic location. Strength, Weakness, Opportunity, Threat. A SWOT analysis guides you to identify the positives and negatives inside your organization (S-W) and outside of it, in the external environment (O-T). Box and Whisker Plot: A tool used to display and analyze multiple sets of variation data on a single graph. Check sheet: A generic tool that can be adapted for a wide variety of purposes, the check sheet is a structured, prepared form for collecting and analyzing data.
Control chart: A graph used to study how a process changes over time. Comparing current data to historical control limits leads to conclusions about whether the process variation is consistent (in control) or is unpredictable (out of control, affected by special causes of variation). Design of experiments: A method for carrying out carefully planned experiments on a process. Usually, design of experiments involves a series of experiments that start by looking broadly at a great many variables and then focus on the few critical ones. Histogram: The most commonly used graph for showing frequency distributions, or how often each different value in a set of data occurs. Scatter diagram: A diagram that graphs pairs of numerical data, one variable on each axis, to look for a relationship.
Stratification: A technique that separates data gathered from a variety of sources so that patterns can be seen. Survey: Data collected from targeted groups of people about their opinions, behavior or knowledge. Horizontal and Vertical Integration There are two main types of integration used in integrated delivery systems (IDS). Horizontal integration is defined by the Pan American Health Organization (2008) as “the coordination of activities across operating units that are at the same stage in the process of delivering services.” Horizontal integration involves grouping organizations that provide a similar level of care under one management umbrella. Vertical integration is defined by the Pan American Health Organization (2008) as “the coordination of services among operating units that are at different stages of the process of delivery patient services.”
The databases are open SQL that are capable to process values, batch data and messages are stored. The security of these systems will be protected by the company internal and external firewalls. Intrusion detection system on the DMZ along with IDS antivirus or antispyware may not block a threat or attack from the internal network faster than the outside networks. Other security measures will be reset the SSID and ESSID from the default settings, create a new password on an annual bases, use the ACL to check computers or laptops used on the network, RADIUS server will assets with this prevention., activate the WPA or WPA2 applications codes to deter hackers, check our network once in a while for any network access points that are not secured in your network.
Analytics interface is the decision-maker’s domain. User-centric analytics follows the approach of other user-centric designs: start from user needs and work backward to design the interface that supports those needs, ultimately to the analytics that will drive that interface. Four things to look at during this process are role-based design, less is more, sensory cues direct attention, interfaces suggest actions. Do to this company’s type of business it will be involved with such as medical, corporation, and financial analysis the perimeters of the company with this plan will meet and exceed the CEO guidance.
Since the company is growing outsourcing is a considerable choice of storage of database systems. Main databases and operating system should be maintained in storage facility to protect from system corruption. Each processing measure will be stored onsite and offsite to keep integrity of information. Collaborating with other companies will assist in the company’s reputation. International marketing and banking will guide the company into offshore activity. This would mean that IT department will need to make sure that the company’s operating systems and tools will be compatible with the customers IT service. This can lead into another department of the company which would be product production of our own operating systems.
This plan that I have compiled to assist with the growth of the company will benefit in the building of the IT department. I do believe what I have written can be used in the overall plan by the CEO.
Lane, D., 2011, “The Chief Information Officer’s Body of Knowledge People, Process, and Technology”, John Wiley & Sons, Inc, Hoboken, NJ
Mark, M. & James, B., 2006, “Information Security: Principles and Practices”, Prentice Hall, Inc., Upper Saddle River, NJ