Distribution: Restricted to Sponsor and Project Team The SeeLock module of Compute.Access is a project that has the objective of reducing the possibility of unrestricted access to offices. The basic idea is to use the barcode on staff and students’ identification cards along with face recognition techniques to determine if an individual that intends to enter an office is authorized. The motivation behind the project includes reducing recurrent costs, as well as increasing functionality. Purchasing an existing option off the market would expose the university to a cost of approximately $100 million over a period of 10 years. As a result, the Principal has decided to approve a project to develop a prototype with a preliminary estimated budget of $5 million. The additional required functionality allows cross referencing a picture of an individual aiming to enter an area with the ID presented, as well as allowing an authorized person to indicate whether there is duress. If a duress signal (to be determined) is detected, control of the door is passed directly to a security unit, along with a video feed of the door area. It is assumed that the items listed in appendix A can be outsourced. On demand reports of user accesses should be available. The prototype is to be installed at the main Computing office however full documentation of the procedures used to create the product is expected to allow easy replication to other locations. It is important that the system be completed and tested at a point in time when traffic is low, and as such the system needs to be completed by December 2023 to allow testing in the first week of January 2024. Appendix A. Purchase Magnetic Lock. (Duration 5 days; Cost $100,000) Purchase Camera and Network Storage Device. (Duration 2 days, Cost $150,000) Install a Network Connection. (Duration 5 days, Cost $40,000) High Level deliverables are Hardware, Software and Procedures Work packages for Hardware Magnetic Lock Camera Barcode Scanner Door ID card Network Work packages for Software Duress Signal Video Feed Face Recognition Software Work packages for Procedures Documentation Audit Log User Manual Question 1: 1(a) Review the resulting work breakdown structure and create an Activities List. 1(b) Determine predecessor and successor relationships and estimate durations on each activity in the list, and then present the updated activities list.

Practical Management Science
6th Edition
ISBN:9781337406659
Author:WINSTON, Wayne L.
Publisher:WINSTON, Wayne L.
Chapter2: Introduction To Spreadsheet Modeling
Section: Chapter Questions
Problem 20P: Julie James is opening a lemonade stand. She believes the fixed cost per week of running the stand...
icon
Related questions
Question

CHARTER BEGINS.....  (this is not a graded assignment)

Version 1.0
Distribution: Restricted to Sponsor and Project Team
The SeeLock module of Compute.Access is a project that has the objective of reducing the possibility of unrestricted access to offices. The basic idea is to use the barcode on staff and students’ identification cards along with face recognition techniques to determine if an individual that intends to enter an office is authorized. The motivation behind the project includes reducing recurrent costs, as well as increasing functionality. Purchasing an existing option off the market would expose the university to a cost of approximately $100 million over a period of 10 years. As a result, the Principal has decided to approve a project to develop a prototype with a preliminary estimated budget of $5 million. The additional required functionality allows cross referencing a picture of an individual aiming to enter an area with the ID presented, as well as allowing an authorized person to indicate whether there is duress. If a duress signal (to be determined) is detected, control of the door is passed directly to a security unit, along with a video feed of the door area. It is assumed that the items listed in appendix A can be outsourced. On demand reports of user accesses should be available.
The prototype is to be installed at the main Computing office however full documentation of the procedures used to create the product is expected to allow easy replication to other locations. It is important that the system be completed and tested at a point in time when traffic is low, and as such the system needs to be completed by December 2023 to allow testing in the first week of January 2024.

Appendix A.

Purchase Magnetic Lock. (Duration 5 days; Cost $100,000)
Purchase Camera and Network Storage Device. (Duration 2 days, Cost $150,000)
Install a Network Connection. (Duration 5 days, Cost $40,000)

High Level deliverables are Hardware, Software and Procedures

Work packages for Hardware

  • Magnetic Lock
  • Camera
  • Barcode Scanner
  • Door
  • ID card
  • Network

Work packages for Software

  • Duress Signal
  • Video Feed
  • Face Recognition Software

Work packages for Procedures

  • Documentation
  • Audit Log
  • User Manual

Question 1:

1(a) Review the resulting work breakdown structure and create an Activities List.

1(b) Determine predecessor and successor relationships and estimate durations on each activity in the list, and then present the updated activities list.

Expert Solution
steps

Step by step

Solved in 5 steps with 5 images

Blurred answer
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Practical Management Science
Practical Management Science
Operations Management
ISBN:
9781337406659
Author:
WINSTON, Wayne L.
Publisher:
Cengage,
Operations Management
Operations Management
Operations Management
ISBN:
9781259667473
Author:
William J Stevenson
Publisher:
McGraw-Hill Education
Operations and Supply Chain Management (Mcgraw-hi…
Operations and Supply Chain Management (Mcgraw-hi…
Operations Management
ISBN:
9781259666100
Author:
F. Robert Jacobs, Richard B Chase
Publisher:
McGraw-Hill Education
Business in Action
Business in Action
Operations Management
ISBN:
9780135198100
Author:
BOVEE
Publisher:
PEARSON CO
Purchasing and Supply Chain Management
Purchasing and Supply Chain Management
Operations Management
ISBN:
9781285869681
Author:
Robert M. Monczka, Robert B. Handfield, Larry C. Giunipero, James L. Patterson
Publisher:
Cengage Learning
Production and Operations Analysis, Seventh Editi…
Production and Operations Analysis, Seventh Editi…
Operations Management
ISBN:
9781478623069
Author:
Steven Nahmias, Tava Lennon Olsen
Publisher:
Waveland Press, Inc.