Final PM
Final PM
LEVEL: 6
ASSIGNMENT: 1
To be completed by student
Certification: I certify that the whole of this work is the result of my individual effort and
that all quotations from books, Periodicals etc. have been acknowledged.
To be completed by lecturer
Comments:
Grade/Mark **
Faculty of Arts, Science and Technology
LEVEL: 6
ASSIGNMENT: 1
To be completed by student
Certification: I certify that the whole of this work is the result of my individual effort and
that all quotations from books, Periodicals etc. have been acknowledged.
To be completed by lecturer
Comments:
Grade/Mark **
Faculty of Arts, Science and Technology
LEVEL: 6
ASSIGNMENT: 1
To be completed by student
Certification: I certify that the whole of this work is the result of my individual effort and
that all quotations from books, Periodicals etc. have been acknowledged.
To be completed by lecturer
Comments:
Grade/Mark **
Faculty of Arts, Science and Technology
LEVEL: 6
ASSIGNMENT: 1
To be completed by student
Certification: I certify that the whole of this work is the result of my individual effort and
that all quotations from books, Periodicals etc. have been acknowledged.
To be completed by lecturer
Comments:
Grade/Mark **
Faculty of Arts, Science and Technology
LEVEL: 6
ASSIGNMENT: 1
To be completed by student
Certification: I certify that the whole of this work is the result of my individual effort and
that all quotations from books, Periodicals etc. have been acknowledged.
To be completed by lecturer
Comments:
Grade/Mark **
Faculty of Arts, Science and Technology
The London Borough of Glyndwr (LBG) in decided to re-assess its existing IT system with a
view for developing a new Information Management System for the efficient running of the
Council due to the recent political situations. There is no confidence with the existing IT system
due to its unreliable and utilizes old technology and therefore needs to be upgraded as soon as
possible. To this end, they are requesting as a matter of urgency for the IT Director & Computer
Manager to provide them with an Information management system that they can depend on.
The Board of the London Borough of Glyndwr (LBG) Council faces a number of problems
with the current IT System due to unreliability and the inability to add further functionality
LBG council needs that software to address current problems and reliability and adaptability
for future periods. The cost-effective solutions must be made and ensure the implementation
of new technology is a must in this regard. The main concern of the council is to integrate all
the stakeholders into the new software systems to increase the reporting of every transaction.
Since LBG is government council security over date stealing is highly concern. The new system
should be user-friendly as to easily adopted present employees to the new system. External and
internal risk factors wanted to be at minimum level therefore thorough analyzing the present
system and internal forces and external forces is a necessary requirement. Project sustainability
for the next few years is very important as the council won’t be able to allocate budget for
another software development within the next few years. Therefore, accruing new technology
for the project is very important. Survey and forecasting are part of this project for a better-
quality software system.
The basis for the project organization will be based on the following diagram.
External Consultant
Providers Company Glyndwr Council
Finance
Director
Supplier Consultant IT Director
Services
Director
Page 13 of 64
02. Project Organization and Objectives
The below figure will show how the project organizational structure and the data movement.
IT Finance/
Consultant
Services
Director
Director
Project
Coordinator
Supplier
Page 14 of 64
03. Individual role definitions & Objectives
Financial managers increasingly assist executives in making decisions that affect the
organization, which requires analytical skills and excellent communication skills.
Below are some major functions which are done by the finance manager.
• Management of cash
• Financial planning
• Financial negotiations
• Evaluation of financial performance
• Financial decision
Page 15 of 64
3.2. IT Director
Objectives:
• Formulate and establish IT policies and systems to support the implementation of strategies
laid down by top management
• Analyzing the business needs of all departments to determine their technology needs
• Monitor all technical operations (eg network security) and evaluate them according to
established objectives
• Purchase efficient and cheap technology and software
• Examine the use of technology equipment and software to ensure performance and
efficiency
• Identify the need for improvements, configurations or new systems and report to top
management
3.2. Supplier
Ensuring the quantity -wise and quality -wise supplies as required by the project consultant
with priority concern of the following factors ; Price , quality , aftersales service , warranty
period, reliability, durability, adaptability to the future technology changes.
Objectives:
The supplier ’s objectives are based on the final objectives of the entire project . Introducing
cutting age technology to this project is a mandatory and foremost objective of the supplier as
the council’s main objective is to introduce a new tech software system that can cater to the
demand of the council for the next consecutive years. Since the council has a limited budget,
all the procurements are done either calling a tender or comparing quotations with supports
from the technical adviser.
3.4 Consultant.
• Doing research, Interviews, document reviews, observations to identify the issues and
identify the affected audience.
• By analyzing the gathered information sets the scope and objectives of the project.
• Identifying the weakness and provide solutions with the cooperation of the IT director.
• Reassess in the Exiting IT Infrastructure.
• Provide Solutions for the Team members when there having issues.
Page 16 of 64
• Prepare reports
• Get in touch with new technology
• Conduct risk assessments
• Organize User acceptance testing
• Works with the team members to achieve the goals
3.5 Coordinator
In the LBG council, most of the documents they handle manually. Only a few functions they
do by using computers. As they handle most files manually in the day to day life they face a
lot of issues. Because of that, we have noticed a large number of man-hours are wasting.
We have noticed a few reliability and capability issues with the manual file handling,
Page 17 of 64
5. Manual Files are not stored in a secure way
Inside the of the council premise, we haven’t identified any quality controls that are maintained
As per the UK law council must keep the records of the at least last 22 months'' tax return
details and at least the last 6 years VAT record (UK GOV, 2019). However, in the LBG council
finance division all the documents except few like invoice raising, doing manually. They have
received computers that have good configurations and in good condition. And they have
experienced staff with good computer literacy. As they have computers with good conditions
and experienced staff that have past experience with the ERP systems they wanted to move
forward with the new technologies. In the Finance division including the finance director, there
are 10 staff members.
As the Incomes to the council, they received payments from the residents, businesses, and
government. And as the expenses, they have monthly standard payments, employee wages,
petty cash, Reimbursement, Other purchasing. They have to provide the reports Debtor report,
Pending supplier payments, total expenses for the given period, Total collection for the given
period for the Management and create reports for the internal usage as well.
In this kind of a larger organization with the current manual system, they have to spend more
time, resources, and effort to do the accounting works like trial balance calculation, transaction
journalizing, prepare financial reports, statements. The staff has to spend more time to prepare
and maintain the manual files as well. With a large number of transactions, they work under
very pressure and because of that sometimes when doing calculations and transactions some
errors also have occurred. If any small mistake happen in the manual system they have to go
to the very beginning and to find out the mistake and do the corrections
In the HR division, they do all the manually works basis. They keep data about every person
in the council and keep track of the employees. And manage the employees. But as they have
no any share point or share folders like files sharing resources, they have faced a lot of
difficulties in document availability because of that and considering the security of the
documents they have kept most of the files manually. All the manual files they have keeps in
the HR division by using racks because of that there is no even much space in the HR division.
Page 18 of 64
In the HR Division, they keep Lot of kinds of documents manually. I have mentioned below a
few files that they keep manually,
• Records of the CV’s: - CV’s of the past employees, Present employees and received
and rejected CVS during the recruitment.
• Staff Training Records: - HR division conducts the Orientations, training and awareness
programs to the staff members so the HR division keeps records of those.
• Payroll details: - Processing the payroll, benefits is also a role of the HR division and
they have to keep all the data related to payroll manually.
• Employees Master Data files: - they have maintained the employee’s master data file
manually to store the current employee's data.
• Personnel files: - They keep manual files that include all the details of the employees.
• Attendances: - in the council, they record the attendance on attendance books. Daily
HR must record the attendance again on their files.
• Leave Details: - they maintain leave details sheet for each employee and when the
employees apply for the leaves they must update it.
Other than these files they have keeps so many files like hiring candidate’s data, interviewing
data, employee's individual tax forms, company’s business licenses, Insurance Records.
With the busy schedule of the HR division they are very fed-up with this manual file
maintaining and most of the time daily they have to submit the reports to the management.
Page 19 of 64
4.1.3. Problems with the Vendors & Suppliers management
When during the review of the vendor & supplier management we have noticed that without
doing any risk assessment or obtaining an agreement they have done the dealings with the
vendors and suppliers. They haven’t recorded any of the supplier or vendor details and the
services they provided, any agreement that related to anti corruptions and bribery, any
declaration and undertaking agreement, any data protection clause.
They haven’t categorized the suppliers and vendors according to the services they provide
even. We have realized that as they have no proper records of these both parties when the
urgency has happened the coordinator is facing plenty of issues during communicating with
the suppliers and vendors.
LBG council has one internet leased line it is connected to the core switch and access switches
are connected to the core switch and in other ends, it is connected with the user’s computers.
Page 20 of 64
As servers, they have two physical servers and one is dedicated for the Email server and in
other sever, there is two logical severs.AD/DC and the DHCP Servers are the two logical
servers.
But the issue is there is no security in the network and anyone can do attack the network. And
also there is no redundant network equipment. If any equipment fails the whole network will
effect.. And there is no shared point in the network. On the user's side, there is no UPS for the
users if any power failure happens all the computers shut down.
As this is a government council all the data in the council must be protected. but in the council,
as they manage a lot of documents in an unsecured way. We have identified a lot of problems
the documents are not in proper order and anyone can access the division and takes the
documents. Users are not aware of information security. Management has not taken any action
to ensure that the information assets are properly protected from a variety of threats, to ensure
data integrity. Availability, and confidentiality.
In the council, we haven’t identified any policies implemented to ensure information security.
The internal network can be accessed to any person via cable connection. Or anyone can attack
through the internet connection and any user can share any document via the internet and
upload to any places and users can access any web site. The council premise has covered by
CCTV camera system but the camera system hasn’t connected to the network and if anyone
wanted to check the camera footage he/ she must go to the server room and check the DVR
system.
There is no any hardware or software inventory and there is no data backup process to be
identified. During the documents archiving, transferring, disposing of there is no register or
process conducted. There is no authentication and access management, equipment security,
electronic communication security, antivirus management, exploit management procedures
identified in the council.
4.2. Solutions
For the Finance Division, we are proposing to implementing software that can do all the
functions of the Finance division
Page 21 of 64
By using an accounting software package we reduce the workloads by minimizing the looping
works of the accounting. In the current system if they received payment, bill, voucher, invoices
or if someone requested for a report they have to find the related files and check then work on
what they received and again update the manual files and issue the reports. Bu by using
software they can record all the revenues they are having, all the expenses, and also they can
create the reports.
In the software, they can search for anything and do adjustments and updating. During the
implementation period, we can update all the manual files they have to the software. We are
planning to implement the software with friendly user interfaces and as paper works are
reduced the staff member's work stress also can be reduced.
When we check for software to the finance division we have realized that the in present there
lot of famous integrated software’s and we can purchase the software and customize the
software to meet our requirements.so during the meetings we had, we agreed to purchase
customized accounting software. The software will be installed on the application server that
we are going to set up.
In the council premise, we have planned to set up a file server and we are planning to create a
shared folder the accounting division and map it to the accounting staff members with the least
privilege. Then the users can keep most of the documents as soft copies from that the data
availability will be high.
For the HR division also we are planning to introduce HR software. we are going to purchase
and implement a customized software that meets our requirements. This software is also finally
linked with the finance software for payroll purposes.
Through the HR software package, we are planning to maintain the HR master data files about
the employees, Employees Performance and the attendance details leave details. And also by
using this software HR division can calculate the employees’ salaries, Allowances, EPF, ETF,
and send it to the finance to process the salary payments. And using this system they can issue
the pay sheets to the staff.
For Each user in the HR division, they will receive access to the software with a unique user
name and user password with the least privileges.
Page 22 of 64
And also we are providing a share folder to the HR division and the users in the HR division
only will have access to this share folder with leased privileges. In the share folder HR staff
can keep all the other documents and files. To mark the attendance we using the fingerprint
machine and attendance will be marked through this and that details will link to the HR
Software package.
All the vendors and suppliers must be categorized by the services that they provide and the all
the dealings that the council do with them must be recorded.
Before starting the business with the vendor or supplier they must take all the details of the
vendors & suppliers for that we have designed a form called know your Business Relationship
(KYBR) Form. And also must have an agreement regarding anti corruptions and bribery,
declaration and undertaking, data protection.
Draws backs in the current IT infrastructure is reducing the reliability of the new system.
Therefore, we are doing some changes in the network to reduce the drawbacks of the existing
system. UPS will be provided to each user for power backup purposes. We have tabled the new
items that we are going to install in the current system and the purpose of their usage.
Page 23 of 64
Through this server, we can protect our network from the virus attacks,
Virus Guard
01 and this will help to keep users virus guard update.(This will create in
Server
the AD/DCHP server as a logical server)
With the new equipment, the existing system will be changing as below,
Page 24 of 64
4.1.5. Solution for the Information Security
We can improve the reliability of the system by improving information security. Management
has not taken any action to ensure that the information assets are properly protected from a
variety of threats, to ensure data integrity. Availability, and confidentiality and system
reliability.
In the new software’s that we are going to introduce only every user in the respective divisions
will have access to each respective software packages and each user will have the unique user
ID and password. In all the network access switches we are going enable the secure port feature
only council equipment will have access to the network. DVR is connecting to the network and
only management will have access to view. We have identified two rooms in HR and Finance
Division all the hard copies of the documents must store in those rooms and those rooms and
the server room will have door access controls and only each respective staff member will have
the access to the rooms.
All the Backup tape drives must store in a secure place outside of the council. Backups will
happen as daily differentially and weekly fully.
As a Government council, LBG council must keep their documents with high security therefore
we are going to some of the Policies and procedures to ensure the data Protection according to
ISO27001:2013.
Policy Name Objective
Information LBG Council shall ensure information security is addressed in all the
Security in Project projects undertaken by teams as per the Information Security in Project
Management Management policy
Employee Employee data is to be treated as strictly confidential and as per the
Information principle of least privilege, it shall be made available only to properly
authorized persons as per clearly defined Control Standards, guidelines, and
procedures. Cryptographic controls, access controls, authentication criteria
must be used to protect confidential information. Periodic reviews must be
in process to validate these controls.
Employee Privacy LBG Council cannot guarantee that electronic and voice mail
communications shall be private. Users using the network shall be aware
that electronic communications could, depending on the technology, be
forwarded, intercepted, printed, and stored and can be accessed in
accordance with this policy. There must be no privacy expectation with
respect to electronic and voice mail communications.
Appropriate Data All LBG Council users must adhere to the control standards, guidelines &
Use procedures defined for appropriate use of LBG Council’s data. Users can
face disciplinary action up to and including termination of employment if
Page 25 of 64
their inappropriate use of LBG Council’s data or systems leads to
intentional or unintentional exposure of LBG Council’s data.
Page 26 of 64
Monitoring System LBG Council shall monitor access to its information systems to detect
Access & Use suspicious activities and take appropriate preventive and/or corrective
actions. Audit trails and reports shall be maintained to serve as evidence in
the event of the security incident.
Exchanges of LBG Council Management must control the exchange of information and
Information and software between organizations to prevent loss, modification, and misuse
Software of LBG Council’s confidential information. The principle of dual control
and segregation of duties must be used wherever required. Agreements shall
be defined to ensure secure transfer of information between the LBG
Council and third parties.
Internet Security Internet access has been provided to LBG Council users to fulfill their
business responsibilities. LBG Council Management is responsible for
providing an appropriate guideline for Use of the Internet. Internet activity
may be monitored and recorded. Users who are not in compliance may face
disciplinary action up to and including termination.
Electronic Electronic communication (electronic mail, Instant messenger, etc.)
Communication provided to LBG Council users is to fulfill their business responsibilities
and must adhere to the appropriate use guidelines for e-mail. Users who are
not in compliance may face disciplinary actions up to and including
termination of employment.
Secure Areas At physical locations containing LBG Council confidential Information,
information systems that support critical or sensitive business activities
must be located in secure areas, which shall not be easily identifiable to
non-LBG Council personnel. Necessary physical & logical controls for
entry to secure areas must be implemented, with documented procedures
for authorization. Authorized staff must be informed of their responsibilities
regarding secure areas and be trained to challenge unidentified or
unauthorized persons attempting to access a secure area. A periodic review
of access control lists must be conducted.
Anti-Virus Systems and user computers regardless of ownership, containing LBG
Management Council management member firms information not intended to public
consumption must have a functioning and up to date antivirus software
installed.
Information LBG Council Management must exercise due diligence in selecting its
security in supplier Service Provider (and Third Party who may have access to LBG Council
relationships Data) by Security reviews. Service Provider and Third Party must provide
documented evidence of an adequate security program that complies with
the minimum control standards established by Information Security.
Business LBG Council Management must initiate, develop, test, document and
Continuity maintain business continuity and disaster recovery program.
Program
Table 3 Policies and objectives
Page 27 of 64
05. Project planning information
5.1. Gantt Chart.
Page 28 of 64
Page 29 of 64
Page 30 of 64
Page 31 of 64
Page 32 of 64
Page 33 of 64
Page 34 of 64
Page 35 of 64
06. Specifications (SRS)
6.1. Product Scope
We are going to introduce an account package application to resolve identified problems. The
proposed system will cover Job management (Maintain revenue and expenses), client detail
management, employee payroll management, employee details management and generates the
reports.
The Human Resources Department performs these activities. They handle HR master files,
employee's personal files and calculate their salary. Analyses and updates the organization's
salary budget. And also maintaining department records and providing the report to the
management etc...
The financial Department performs these activities. Finance department managing ravenous
and expenses. And also they maintaining department records and providing the report to the
management.
This application allows users to work quickly and efficiently. The following benefits can be
obtained from this application.
By using the proposed system, we can quickly do the calculation accurately, by storing data
securely, by using data backup and restore option Can prevent data loss, Unauthorised
modification and misused because of these features the reliability will be increased.
we can adapt the latest technology to this system and can add any additional features from that
we can meet 21st-century requirements and can improve the capability.
This system is developed for the purpose of keeping records easier and accurately. The software
is developed by java platforms such as the external interface and the coding for the smooth run
on Microsoft windows. The database for the system will be prepared by MYSQL and there is
a server system for the product.
Page 36 of 64
Hardware Specification
➢ User Machines
• 2GB RAM
➢ Server Machine
• 32GB RAM
➢ Router
Software Specification
➢ Windows 7 / 8 / 8.1 / 10
➢ Hyper-V
➢ VM ware
Page 37 of 64
6.5. Design and Implementation Constraints
This software package develops by using java as front end and MYSQL server as the back end
of the system. the package will be run in the application server. Application server os is
windows 2016 R2 64-Bit server OS. The application should be support JDK13 or higher. The
software must be support with MySQL 8.0.18 or higher.
Page 38 of 64
6.7. Functional requirements
We are planning to create a new system for this organization to link with each and every
department and our expectation is to make the whole organization as a single unit. According
to the above diagram we have planned to divide the system into two main categories. One is
for the accounts department and the other is for the HR/Admin department. But finally, both
are linked with each other.
Page 39 of 64
In the accounts department, they are three main subcategories. They are Revenue, Expenses,
and Reports. In the revenue part, we have focused on all the payment collections. Payment
collections are the income source of this organization. The organization has 3 types of rate-
Payers. It collects payments from the Residents, from Bussiness, and from Government
departments. In here a user should log in to the system using his/her credentials and select the
revenue category to do changes in the revenue system. Then the user can select the payment
collection method and enter new data or edit existing data. Every received payment should be
entered into the system. As well as a receipt and an invoice should be raised for each received
payment in the system. In this section, there should be a facility to check the due payments and
due dates also using that a user should be able to find who has done full payments, who has
done partial payments and check the installments and due dates of the Rate-Payers.
In this system the second main subcategory is Expenses. All the expenses of the organization
should be recorded under this. We can divide expenses into four parts. One is Monthly standard
payments. Building rentals, Electricity bills, Water bills, Telephone bills, Internet bills, and
Loan installments belong to this. Employee Wages also the expense of the organization.
Employee Remuneration, Bonus, Commission, and all other Allowances should be included in
Employee wages. There is another expense called petty cash. Petty cash reimbursement
information should be recorded under that. As an organization, we have to purchase stationery,
Furniture, and other required items. So all these purchasing payments should be recorded under
Other Purchasings section. All Supplier/ Vendor payments belong to this. Users should go to
the Payment section and select the payment type in the appearing interface. The payment
process has divided into four main steps and these steps should be followed to release the
payment. First purchasing invoices, bills should be entered into the system. After that, a
payment voucher should be raised against the invoice or bill. Then that payment should be
directed to the next level for approvals. After getting the approval, payment can be released to
the relevant party by cheque or cash or bank transfer.
The Third main subcategory is Reports and this is very important to take the decisions within
the organization. A user should be able to take Debtor reports, Pending Supplier Payments,
Total Expenses of the organization for a given period and Total Collection of the organization
for a given period. Users can view outstanding amounts and due dates of Rate-payers from the
Debtor report section. This report can be made for a single Rate-payer and as well as for a set
of Rate-payers according to the user requirement. Another important report is Pending Supplier
payments. This report is needed to arrange the funds for the upcoming payments. Reports of
Page 40 of 64
Total Expenses and Total Collection also can be generated from this system. From this user
can generate Expenses and income of the company for a given period like Monthly Expenses,
Monthly Income, Weekly Expenses, Weekly Income and etc. The user has to give only the
report type and the particular time period for generating a report. By studying these reports,
management can get an idea about the financial situation of the organization and it helps to
take decisions for the progress of the company. As well as, considering Total expenses and
Total Collection reports management can understand that the organization is profitable or
overspent.
Page 41 of 64
recorded under the second section, Salary Calculation. Employee Attendance, Leaves should
be linked with this. Employee Salary details like basic salary amount, Allowances, EPF, ETF
amounts are recorded in this category. Final Section is to calculate the employee's monthly
salary. All the salary deductions and additions are done by the system and then the final
monthly salary amount is calculated. An employee pay sheet is also issued in this section. Then
these salary records are sent to the account departments as they need this information to release
the salary from the system.
Council follows quality standards to manage the organization well. Every user is received a
login name and password for the system and the user should not give his/her credentials to
others. All the data which are stored in the database server is encrypted. All the suppliers/
vendors should be registered in the organization and purchasing’s are not allowed from
unregistered suppliers/ vendors. As well as all the Rate-payers also should be registered in the
system.
Page 42 of 64
1.1. Level 01 / Level 02 Data Flow Diagram
Page 43 of 64
1.2. Nonfunctional requirements
2. The access to system data can only be changed by the system data administrator
3. Every fail attempt by a user to access a data item is recorded in an audit trail and user
accounts must lock for five minutes.
4. User interface must be user-friendly.
5. User guide will inbuilt with the software as a help to users.
6. User password must be at least 11 characters long.
7. Respond time maximum of 10 seconds.
8. There is an auto backup facility.
9. The software must available 24*7
07.Feasibility Study
The cost analysis and economic feasibility of the project can be identified as follows. Since the
London Borough of Glyndwr (LBG) is a government institution, the council has already
allocated funds for the new information system. As such, the system has the potential to make
purchases and payments relevant to the system such as the following.
• Construction costs
• To set up the new system and introduce employees, meeting cost etc….
We can implement the system with the less expenses than given budget.
Page 44 of 64
7.2. Legal Feasibility
Since London Borough of Glyndwr (LBG) is a government agency, Citizen's data is heavily
integrated, so a more secure system must be established within the Council to obtain data
backups.
All software currently used in Council is paid licensed software, and all computers and software
owned by the Council must be legally purchased from their organization's registered suppliers
or new suppliers.
Issue a billing number to maintain the computerized bill of lading provided by the Council to
the Legal Division of the Bank, after making payments to the persons attending the Council
and depositing in the data tables the relevant payments.
Use login for each aspect of the information system. These are important for legitimacy and
security as they are currently performing their duties separately.
Delivery mode Service providers are responsible for setting up the new system, and the
agencies provide them with a warranty period
The current method is to use software like Word excels installed on separate computers. Instead
of installing the new system software on the same computer hardware and operation software
Since the server is currently in use, you can install the new operating system and the new server
system using the same operating environment
The system can also be used individually for the same purposes as it is at present, and computer
networking can be used to share data.
The environmental impact of this project is minimal, and the project will only use the available
resources to install the new system so that no computing devices are released to the
environment.
According to Technical Feasibility, these councils already have computers that are suitable for
the new system, but all computers have to use 'Uninterruptible Power Supply'.
Page 45 of 64
There are also two servers used as Mail Server and DHCP Server in the Council. Therefore,
the IT staff has the technical knowledge to set up and use the new server. To improve the
software performance we setting up a new application server.
08.Risk Management
8.1. Risk Assessment
Various risk factors and problems were identified throughout the different phases of the project
implementation and have been listed. Internal and external threats for the project were
identified based on the level of consequence. By critically analyzing the risk factors, problems
and threats, an effective controlling plan/ mitigation plan was implemented. These risks could
stem from a wide variety of sources, including financial uncertainty, legal liabilities, strategic
management errors, accidents, natural disasters, etc.
Risks factors and their likelihood of occurrence and severity to the projects are tabulated as in
table 01. The highest value is given numerical 5 and the lowest is given numeric 1. The
cumulative value of the risk to the project for each risk’s factors is highlighted as per the given
color code.
Page 46 of 64
Low
Medium
High
Barriers related to the IT project of the LBG council can be minimized before occurring it. The
work team can reduce issues before it happens (mitigating risk). As per the mitigation plan,
issues could be avoided in the upgrading process.
Our reliable automated system helps to reduce the failure rate. IT professionals manage the
information security by giving the dependence on an automated system and to ensure customer
privacy. Manipulated risk factors listed above are described with risk mitigation plan in detail
below.
Filling the replacement of skilled employees is not an easy task. Therefore, our system
development team has an agreement with another reliable company to get hired employees to
fulfill the right match for any role whenever we need it.
▪ Equipment failure
For this project, we use two new core switches. Therefore, if one access switch fails the other
alternate switch can be used to avoid breakdown the system. All the configurations of the router
and switches are saved in notepads to reduce configuration works when needed. For
minimizing the computer break downs UPSs are used. And to protect the PCs from malware,
Page 47 of 64
anti-virus guards are used. On the other hand, the supplier is advised to supply reliable and
quality equipment with warranty replacement to overcome additional cost that can be occurred
when replacing malfunctioning equipment.
▪ Tools failure
The preventive maintenance plan is introduced with a routing inspection plan. Our team
conducts regular inspections to identify the problems before occurring system failures. Every
tool provided with a checklist system. By doing the inspection, update the checklist to make
sure that the pre-inspections are done on time and documented for future prediction plans.
▪ Environmental disasters
Environment disasters can be occurred in any time. So regular backup is very important. These
regular backups must be stored in a different place and it should be secured well and encrypts
the data to avoid data stealing. Alternatively, a cost-effective and secure online backup system
is purchased from a reliable supplier to save time and money. Insurance plans is obtained to
avoid any risks of bankrupt the company in a major disaster.
▪ Technology changes
This project and its software is developed in the way that any new technology can be easily
merged to the existing system. Also, R & D work done through the system by analyzing the
feedbacks from different stakeholders for adopting new technologies. s
▪ Dependency changes
This system is developed to work with the latest supportive and background software to
overcome bugs of the system. Dependency changes in future development is critically analyzed
and updated version of the present system will be installed to suit for new software versions.
▪ Requirement changes
Data is collected from the different stakeholders and from the present systems to identifying
the user requirements before developing the new software system. Forecasting is done for the
future requirement changes by collecting present data with the help of survey reports.
Understanding the current requirements and forecasting future requirements reduce the risk
factor of requirement changes in the future. Therefore, it reduces the likelihood values of the
requirement changes in this project thus total risk factors can be kept in a reduced value. But
the severity cannot be minimized unless developing a proper adoption plan for future
Page 48 of 64
requirement changes. In this aspect, research and development works are carried out in a
continuous basis for ahead years.
Competitors are accepted as a challenging advance to the new project. Get the full details of
competitor's capabilities would help to develop advanced systems to the LBG council.
Analyzing the similar kind of software systems and their advantages and disadvantages can be
used to minimize the risk factors from the competitors to the LBG council.
In the system of LBG council that contains sensitive data including all source codes design
specifications and other related documentation can be applied Two Factor Authentication(2FA)
and for preventing from loss of source codes can be used data loss prevention tools. Apart from
that, all the source codes are backup in several media with restoration point in daily basis.
▪ Political influence
Hence this is a public system it’s better to have construct frustration coverage, Natural
catastrophe cover, Exploration cover, and political violence cover. However, since the
government is one of stakeholder for LBG council, still that can have some risk factors from
that side. Therefore coordination with the government is very important to have modification
as required by the government.
▪ Price increasing
Tolerance will be kept 10% of the total project cost to overcome the adverse effect of the cost
variation in the future supplies. Meanwhile preparing detailed BOQ with pricing would help to
overcome these issues. Also, an agreement must be made with the supplier to supply the goods
at the same price as mentioned in the quotation.
Safety and health is the first and foremost thing in this project as human factors is the most
valuable assets of this project. Health insurance will be provided for all workers while
identifying the safety factors in every project works. Mental health is very important for a
software project. Stress can be minimized by reducing unnecessary works and reducing
conflicting between members within the group by introducing a proper communication system
with feedback. Progress of the project will be presented in the daily meetings. At the same time
Page 49 of 64
bottlenecks are discussed between members. Teamwork is very important and work relations
and supportive guidance will be shared among the members to obtain full utilization each and
every member's capabilities.
09.Financial Information
9.1 Resource Requirements
Resource requirements involve determining what resources such as equipment, people,
services and materials. And their quantities are needed to complete the project.
The main output is a list of resource requirements that provide the basis for budget estimating
and budget controls and provide valuable information to the project resource management
process. There are four typical types of resources under which all requirements can be grouped:
Human or labor resources; Includes consulting services consist of the right people with the
special expertise and skills needed to complete activities of the project schedule. People can
come to organized, or hired for the duration of the project. Interpersonal skills it also includes
consultants who bring a high level of technical expertise It is not found in the organization or
the local labor market.
The project develops a list of human resource needs specialist levels, experience areas,
education, and language requirements. This information is used in the resource management
process to get or hire the right people. For example, the list of human resources needed for a
project can be listed below:
Page 50 of 64
9.2 Human Resources Calculations
9.2.1 Monthly Turnover Rate:
This is describe as percentage of employees leaving in the given time period.
1
= × 100
5
= 20%
2
= × 100
5
= 40%
Total Revenue
RPE =
No of employees
= $100000 / 5
= $20000
$30000+$8000+$5000
=
6.41
= $6708.26
Page 51 of 64
Part time employees = 2
Work Hours/ Months = 85
Employees
=
Human Resources team members
=5/3
= 1.66
($22000−$14500 )
= × 100
$14500
= 51.72%
Page 52 of 64
9.2.6 Cost per Hire:
= ( $10000 = $25000 ) / 8
= $4375
All equipment included Project specific tools such as computers, servers and routers.Utilities
include a wide range of requirements for materials Electricity, Telephone lines, Internet access,
Office supplies,Office space and project use. The material may also be included Building
materials used to build the facilities provided to the beneficiaries.
Materials # of units
Books and Manuals 10
Stationaries 20
Electricity 100
Table 6 Equipment and Materials Account
A cost estimate, which is the process to approximate the costs that the project will spend to get
or use the project resources.
Page 53 of 64
Estimated items for new implemented system.
# Requirement unit
1 Core Switch 24Ports management License 1
2 Multimode SFP Transceiver (1 Gbps) 8
3 Switch 24Ports 1
4 Firewall 1
5 Rack Mountable Server 2
6 Tape Library 1
7 UPS 650VA 21
8 Door Access Controller 3
9 Fingerprint Print Scanner 1
10 Virus Guard Server 21
11 Quick Books software 21
12 Accpay HR software
Table 8 Reqired Hardware Items
Page 54 of 64
9.4 Product Cost Calculation
Benefits
Page 55 of 64
9.4.2 Multimode SFP Transceiver (1 Gbps)
▪ SFP transmitters are hot switchable and can be replaced / removed without interrupting
the running device or the need for a reboot.
▪ SFPs comply with most communication standards, such as Ethernet, Sonnet and Fiber
Channel.
▪ The SFP cage is mounted on the PCB board to accept the transmitter. This is not only
a simple replacement and redesign, but also eliminates further manufacturing steps and
reduces costs.
▪ SFPs have a number of termination options, such as UTP copper, single-mode, and
multi-mode. Enables long and short distance communication.
Page 56 of 64
Benefits
▪ one of the main advantages of managing switches is that they fail to add to your
network, thus helping to reduce network malfunction. Management switches combine
the Spanning Tree Protocol (STP) to provide redundancy in the network. This provides
redundant routes but prevents loops created by multi-functional paths between
switches.
9.4.4 Firewall
Item Name Item Description Units $ / unit Total
Page 57 of 64
9.4.6 Tape Library
Benefits
▪ It consume the less power
▪ Legacy data
▪ Scalability
Page 58 of 64
Benefits
▪ It helps to restrict certain areas.
▪ It is difficult to duplicate.
▪ Beyond standard doors.
▪ Protect values.
▪ Allow multi-location access.
▪ Helps save energy and costs.
• Simplify employee turnover.
9.4.9 Fingerprint Scanner
▪ Fingerprint scanners are unique and highly secure, they use unlocking / unlocking
devices and apps without having to remember passwords, they are easy, cheap and fast
to set up, making online transactions much easier when you tap the screen with your
finger.
▪ Fingerprint scanner provides high accuracy, is the most economical biometric computer
user authentication technology, it is the most developed biometric and small storage
space required for biometric printing, thus reducing the amount of database memory
required.
Page 59 of 64
9.4.10 Virus Guard
Benefits
▪ Easy to use
▪ Use to Financial Management
▪ Financial Reporting.
▪ Cash Management
Page 60 of 64
9.4.12 HR Package - Accpay HR software
Page 61 of 64
9.4.14 Other Cost
Units 12
No of units 10
$120.00 //
Page 62 of 64
9.5 Budget of the project
$ $
Budget Actual
Capital for project $2,000,000
Materials
Books and Manuals $120.00
Stationary $200.00
Electricity $2,275.00
Telephone $750.00
Profit(income-expenditures) $2,277,253.73
Table 9.5.1 - Budget Table
Page 63 of 64
10.References
Page 64 of 64
PM
by WELLABALAGE DON YASITH DINUSHA
9 %
SIMILARITY INDEX
6%
INTERNET SOURCES
0%
PUBLICATIONS
9%
STUDENT PAPERS
PRIMARY SOURCES
1
www.pm4dev.com
Internet Source 1%
2
Submitted to Glyndwr University
Student Paper 1%
3
Submitted to Brighton School of Business
Student Paper 1%
4
www.datadirectglobal.com
Internet Source 1%
5
Submitted to University of Pretoria
Student Paper 1%
6
Submitted to Trident University International
Student Paper <1%
7
www.kouga.gov.za
Internet Source <1%
8
www.hcareers.ca
Internet Source <1%
9
www.careerexplorer.com
Internet Source <1%
10
Submitted to London School of Commerce
Student Paper <1%
11
ciscogpl.com
Internet Source <1%
12
www.bne.catholic.edu.au
Internet Source <1%
13
Submitted to Emirates National Schools
Student Paper <1%
14
Submitted to Florida Community College at
Jacksonville
<1%
Student Paper
15
Submitted to Champlain College
Student Paper <1%
16
iibfadda.blogspot.com
Internet Source <1%
17
www.afamcapital.com
Internet Source <1%
18
Submitted to Kennedy-Western University
Student Paper <1%
19
www.wwt.com
Internet Source <1%
20
Submitted to Monash University
Student Paper <1%
www.jcschools.org
Internet Source
Internet Source
<1%
21
22
Submitted to University of Derby
Student Paper <1%
23
itprice.com
Internet Source <1%
24
www.g-net.co.th
Internet Source <1%
25
www.pp.co.nz
Internet Source <1%
26
Submitted to Victorian Institute of Technology
Student Paper <1%
27
Nancy J. Hodges, Albert N. Link. "Knowledge-
Intensive Entrepreneurship", Springer Science
<1%
and Business Media LLC, 2018
Publication
28
www.scribd.com
Internet Source <1%
29
global-goose.com
Internet Source <1%
30
www.spiriteshop.co.uk
Internet Source <1%
31
www.co.washington.ar.us
Internet Source <1%
Appendix 01
INVITATION TO TENDER
FOR
Scope of Service: Suppling hardware accessories and software solutions for the renovation of
the Information system in LBG council
The LBG Council is pleased to invite you to tender for LBG Council system. The Invitation to
Tender will open at (date). Once open, you will have access to an electronic tender box for
downloading the document “LBG Council” and all associated Appendices.
The tender documents comprise this ITT letter, rules of tendering and the ITT documents.
This ITT sets out the information which is required in order to assess the suitability of
applicants in terms of their quality assurance processes, relationship management, pricing,
service levels and innovative solutions to meet the requirements of IT Project.
The successful applicant will be required to deliver services in accordance with this document
specification and the contract to be placed with the successful applicant.
The contract will be subject to LBG Council IT System requirements and satisfactory
performance through continuous monitoring and performance review. During the contract life,
the successful applicants will need to achieve continuous improvement. Failure to do so may
result in the contract being terminated.
1 Scope of Procurement
During the reassessment of the current IT infrastructure of the LBG council few
requirements of the equipment’s and tools to improve the existing system.
2 LBG Council
London council called London Borough of Glyndwr (LBG) Council, located in North Wales.
As a government council our vision is to provide the best services to the all the peoples lives
in the council area. We receive the money from the residents, Business, and from the
government. Using these funds, we provide the services to the peoples.
3 Procurement Process
The attention of the bidders is drawn to the following guidelines of the Procurement
Guidelines published by Government of the United Kingdom:
▪ Officials shall refrain from receiving any personal gain from any Procurement Action.
No gifts or inducement shall be accepted. Suppliers/contractors are liable to be
disqualified from the bidding process if found offering any gift or inducement which
may have an effect of influencing a decision or impairing the objectivity of an official.
The Purchaser requires the bidders, suppliers, contractors, and consultants to observe the
highest standard of ethics during the procurement and execution of such contracts. In
pursuit of this policy:
(a) “corrupt practice” means the offering, giving, receiving, or soliciting, directly or
indirectly, of anything of value to influence the action of a public official in the
procurement process or in contract execution;
4 Award Criteria
Contract will be awarded to the bidder whose quotation has been determined to be lowest
evaluated bidder.
a) Notwithstanding the above, the LBG Council reserves the right to accept or reject any
quotations and to cancel the bidding process and reject all quotations at any time prior
to the award of contract and without thereby incurring any liability to any affected party.
b) The bidder whose bid is accepted will be notified of the award of contract prior to
expiration of the quotation validity period. The terms of the accepted offer shall be
incorporated in the Notification of Award.
c) Employer will pay the Contractor in consideration of the execution, completion, and
maintenance of the Works by the Contractor as prescribed by the Contract;
d) The notification of award will constitute the formation of the Contract
e) Purchaser reserves the right to increase or decrease the quantity by 5% without any
change in the unit price or other terms of the contract.
1. Brand (Specify)
2. Model (Specify)
3. Country of Manufacture (Specify)
4. OEM should be listed in the leader’s
quadrant in Gartner report for Wired LAN
Infrastructure for last 5 years
5. Hardware Features
Network Infrastructure equipment must
1
use 240V AC power
Should support minimum 8 x 1G Ethernet
2
interfaces
Must have minimum 2 SFP Gigabit uplink
3
ports
Switching bandwidth should be minimum
4
216 Gbps
Forwarding rate should be minimum
5
107.1 Mbps
Support switch model should be stackable
6
up to 8 switches
Stacking bandwidth should be minimum
7
80 Gbps
Proposed switches should be operating in
8
wire-speed and should be non-blocking
6. Switching Features
Must support Fast Ethernet (IEEE 802.3u,
1
100BASE-TX)
Must support Gigabit Ethernet (IEEE
2
802.3z, 802.3ab)
Must support Jumbo Ethernet frames over
3
9000bytes
Must support IEEE 802.1d - Spanning-
4
Tree Protocol
Must support IEEE 802.1w - Rapid
5
Spanning Tree
Must support IEEE 802.1s - Multiple
6
Spanning Tree Protocol
Must support IEEE 802.1q - VLAN
7
encapsulation
Must support IEEE 802.3ad - Link
8
Aggregation Control Protocol (LACP)
Must support IEEE 802.1ab - Link Layer
9
Discovery Protocol (LLDP)
Must support auto-sensing and auto-
10
negotiation (Link Speed/Duplex)
Must support Dynamic Host
11
Configuration Protocol(DHCP)
7. Routing Protocol Support
1 Must support Static IP routing
Should be able to configure layer 3
2 interface on physical port, LAG, VLAN
interface or Loopback interface
8. Security Features
Must support multiple privilege levels for
1
remote access
Must support Remote Authentication
Dial-In User Service (RADIUS) and/or
2
Terminal Access Controller Access
Control System Plus (TACACS+)
3. Switch 24Ports
If Yes If No
Bidders Bidders
Complied
No Details Response/ Response/
(Yes/No)
Reference Reference
Page Page
1. Brand (Specify)
2. Model (Specify)
3. Country of Manufacture (Specify)
4. OEM should be listed in the leader’s
quadrant in Gartner report for Wired LAN
Infrastructure for last 5 years
5. Hardware Features
Network Infrastructure equipment must
1
use 240V AC power
Should support minimum 8 x 1G Ethernet
2
interfaces
Must have minimum 2 SFP Gigabit uplink
3
ports
Switching bandwidth should be minimum
4
216 Gbps
Forwarding rate should be minimum
5
107.1 Mbps
Support switch model should be stackable
6
up to 8 switches
Stacking bandwidth should be minimum
7
80 Gbps
Proposed switches should be operating in
8
wire-speed and should be non-blocking
6. Switching Features
Must support Fast Ethernet (IEEE 802.3u,
1
100BASE-TX)
Must support Gigabit Ethernet (IEEE
2
802.3z, 802.3ab)
Must support Jumbo Ethernet frames over
3
9000bytes
Must support IEEE 802.1d - Spanning-
4
Tree Protocol
Must support IEEE 802.1w - Rapid
5
Spanning Tree
Must support IEEE 802.1s - Multiple
6
Spanning Tree Protocol
Must support IEEE 802.1q - VLAN
7
encapsulation
Must support IEEE 802.3ad - Link
8
Aggregation Control Protocol (LACP)
Must support IEEE 802.1ab - Link Layer
9
Discovery Protocol (LLDP)
Must support auto-sensing and auto-
10
negotiation (Link Speed/Duplex)
Must support Dynamic Host
11
Configuration Protocol(DHCP)
Minimum Technical Specification
4. Firewall
If Yes If No
Bidders Bidders
Complied
No Details Response/ Response/
(Yes/No)
Reference Reference
Page Page
1. Brand (Specify)
2. Model (Specify)
3. Country of Manufacture (Specify)
4. OEM should be listed in the leader’s
quadrant in Gartner report for Wired LAN
Infrastructure for last 5 years
5. Hardware Features
8 x 10/100/1000 Mb/s Ethernet Ports
1
1 x 10/100/1000 Mb/s Ethernet
Management Port
Solid State Drive Capacity 100 GB
2
Memory 8 GB
4
Flash Memory 8 GB
5
Supported Applications
5
>3,000
URL Categories >80
6
Frequency 50/60 Hz
10
1. Brand (Specify)
2. Model (Specify)
3. Country of Manufacture (Specify)
4. OEM should be listed in the leader’s
quadrant in Gartner report for Wired LAN
Infrastructure for last 5 years
5. Hardware Features
Processor
1
Up to two 2nd Generation Intel®
Xeon® Scalable processors with up to
28 cores per processo
Ports
2
Network Options
4 x 1GbE
Front Ports
3
1 x Dedicated iDRAC direct USB
1 x USB 2.0
1 x USB 3.0
Rear Ports
4
1 x Dedicated iDRAC network port
1 x Serial
2 x USB 3.0
1 x Video
Internal Boot
5
Boot Optimized Storage Subsystem
(BOSS):
HWRAID 2 x M.2 SSDs 240GB
Memory*
6
DIMM Speed
Up to 2933MT/s
Up to 10 x 2.5 -inch with up to 8
7
NVMe, SAS/
SATA/SSD/NVMe, max 76.8TB , or up
to 10
NVMe drives max 64TB. Or up to 4 x
3.5”
SAS/SATA, max 64TB
Remote Management iDRAC9
8
6. Tape Library
If Yes If No
Bidders Bidders
Complied
No Details Response/ Response/
(Yes/No)
Reference Reference
Page Page
1. Brand (Specify)
2. Model (Specify)
3. Country of Manufacture (Specify)
4. OEM should be listed in the leader’s
quadrant in Gartner report for Wired LAN
Infrastructure for last 5 years
5. Hardware Features
Capacity (Native) Up to 800GB
1
Altitude
10
(operational) 10,000 feet maximum
Temperature
11
(operational) 10° C to 35° C
Relative humidity 20% to 80% non-
12
condensing
Minimum Technical Specification
7. UPS 650VA
If Yes If No
Bidders Bidders
Complied
No Details Response/ Response/
(Yes/No)
Reference Reference
Page Page
1. Brand (Specify)
2. Model (Specify)
3. Country of Manufacture (Specify)
4. OEM should be listed in the leader’s
quadrant in Gartner report for Wired LAN
Infrastructure for last 5 years
5. Hardware Features
Voltage Range 230VAC ±10%
1
Battery Mode 230VAC ± 10%
2
1. Brand (Specify)
2. Model (Specify)
3. Country of Manufacture (Specify)
4. OEM should be listed in the leader’s
quadrant in Gartner report for Wired LAN
Infrastructure for last 5 years
5. Hardware Features
Readers 2
1
Doors 1
2
Cards 8,000 in Web Mode*
3
Schedules 240
7
1. Brand (Specify)
2. Model (Specify)
3. Country of Manufacture (Specify)
4. OEM should be listed in the leader’s
quadrant in Gartner report for Wired LAN
Infrastructure for last 5 years
5. Hardware Features
Password Protected
1
Language English
10
1. Brand (Specify)
3. Country of Manufacture (Specify)
5. Software Features
Expense tracking
1
Scan receipts
2
Reporting
4
Create invoices
5
Accounting software
6
Sales tax
7
Bank reconciliations
8
Progress invoicing
10
11. HR Package
If Yes If No
Bidders Bidders
Complied
No Details Response/ Response/
(Yes/No)
Reference Reference
Page Page
1. Software (Specify)
3. Country of Manufacture (Specify)
5. Software Features
Attendance Marking
1
Scan Documents
2
Reporting
4
CV Handling
5
HR software
6
Leave Handling
9
Payroll Handling
10
Appendix 01
Conditions of Contract
The Contractor warrants that all the items used are new, unused, and of the most recent or
current models/products, and that they incorporate all recent improvements in design and
materials, unless provided otherwise in the Contract.
The bidder further warrants that the items shall be free from defects arising from any act or
omission of the Contractor or arising from design, materials, and workmanship, under
normal use in the conditions prevailing in the country of final destination.
Comprehensive onsite warranty (labour and parts) shall remain valid for three (03) years for
and all items/devises after same have been delivered, installed and accepted by the purchaser
at the final destination All charges with regard to the supply of spare parts, labour, travel, per
diem and accommodation to Contractor's staff etc; shall be borne by the Contractor during
the period of comprehensive onsite warranty. Purchaser shall not pay any additional
expenditure for services rendered during the above period.
Appendix 02
Declaration and Undertaking
· In this declaration and undertaking, the terms “LBG Council Entity” means any entity in
United Kingdom which I (or the one that I represent) have/has a contract for supply of goods
and/or services.
· I have received the LBG Council United Kingdom Code of Ethics and Professional
Conduct for Suppliers (LBG Council Supplier Code) which I will read, understand and
comply with (including compliance with all applicable laws and regulations in this regard)
to the extent applicable to me/my organization.
· I have read and understood the LBG Council Anti-Corruption Training Deck.
· I certify that I/my organization have/has been in compliance and shall continue to comply
with the Anti-Bribery/Anti-Corruption clause which is or will be included in the contract
with the LBG Council Entity upon entering into the Business relationship with the LBG
Council Entity.
· I acknowledge that all rights in the Material, the name, trademark, logo and other identifiers
of LBG Council Entities and any other items belong exclusively, as between me (or the
organization that I am representing) and the LBG Council Entities, to the LBG Council
Entities with whom I/my organization have (or will have) a contract for supply of goods
and/or services.
· I acknowledge that by signing below, I/my organization am/is agreeing to be bound by this
declaration and undertaking and that this shall form part of any contract I/my organization
have or may have with any LBG Council Entities for supply of goods and/or services.
Individuals Name :
Designation :
Location :
Signature :
Date :
Company Seal :
BUSINESS
PROPOSAL
FOR
NETWORK
EQUIPMENT
& SOFTWARE
Executive Summary
Tech Solution’s mission is to be a pioneer in providing information technology based solutions for business
organizations to make them gain competitive advantage. In doing so we shall respond to technological change,
competition, and globalization with the use of cutting edge technology to cater to the organization’s overall
strategy.
Tech Solution is a highly focused IT systems integration company.We started our operations as an IT solutions
provider in 2005 and since then we have grown to become a leader in this field. We offer variety of IT products,
solutions & services through partnership with global solution providers. Over the past 14 years we have built
a strong clientele across multiple industry verticals and entered into strong business affiliations with various
global IT infrastructure and Service providers/vendors.
While our main products & services are LAN/WAN Design and Implementation, Remote Access Solutions,
Network Security, PC/Server Computing, Storage Systems, Thin Clients Computing Solutions, Printing &
Imaging Solutions, Integrated Application Delivery & Application Security Solutions, Patton Connectivity &
Coverage Solutions, UPS Solutions, Software Solutions and Manage Services &Web Technology. As a part
of business expansion Tech Solutions has recently launched into the solutions market as well. We have
acquired Oracle Gold Partnership and formed many partnerships with global service providers such as
Autodesk, Hospitality Sector Solutions, and military-grade Cyber Security Solutions. Rich with the best
resource team in the IT industry, we continuously evolve our organization to be in par with global technology
advancements.
We understand that the clients expect comprehensive solutions of high quality which cater to their
requirements. Our focus is to delight you with the best quality of solutions and services which in
return will strengthen our long-term corporate relationship. Our primary objective in this proposal is
to provide the most optimal solution with industry standard best practices, to LBG Council.
This business proposal is designed and submitted to be compliant with Tender document published by LBG
Council on Procurement of Severs, Hardware Accessories and software solutions for the renovation of the
information system in LBG council. Price Schedule for above is attached along with all the documents
required.
We at Tech Solution sincerely hope that we would be given this opportunity to work with LBG
Council in catering to your requirements and facilitate the growing needs as a long-term partner and
a partner in years to come.
LBG COUNCIL FORM BID
I/ We, the Tech Solution herein after called the Bidder hereby in accordance with the
advertisement dated 21st & 22nd June 2019, bid for the SUPPY OF 10 NOS OF NETWORK
EQUIPMENT at the prices statedin the Schedule of Prices annexed hereto. Should this bid be
accepted I/We, covenant and agree with the LBG Council to perform and fulfil all and each of
the Conditions of Bid.
This bid together with your written acceptance therefore, shall constitute a binding contract
Between us.
3. Switch 24Ports
If Yes If No
Bidders Bidders
Complied
No Details Response/ Response/
(Yes/No)
Reference Reference
Page Page
4. Firewall
If Yes If No
Bidders Bidders
Complied
No Details Response/ Response/
(Yes/No)
Reference Reference
Page Page
Memory 8 GB yes
4
6. Tape Library
If Yes If No
Bidders Bidders
Complied
No Details Response/ Response/
(Yes/No)
Reference Reference
Page Page
Altitude yes
10
(operational) 10,000 feet maximum
Temperature yes
11
(operational) 10° C to 35° C
Relative humidity 20% to 80% non- yes
12
condensing
Minimum Technical Specification
7. UPS 650VA
If Yes If No
Bidders Bidders
Complied
No Details Response/ Response/
(Yes/No)
Reference Reference
Page Page
Doors 1 yes
2
Cards 8,000 in Web Mode* yes
3
Reporting yes
4
If Yes If No
Bidders Bidders
Complied
No Details Response/ Response/
(Yes/No)
Reference Reference
Page Page
Reporting yes
4
CV Handling yes
5
HR software yes
6
1 2 4 5 6 7 8
Item Description of Goods Qty Unit Unit Sub Total Price $
No° Price $ Total $
Partnerships
Lenovo HP
Cisco Oracle
Dell IBM
AMP Fortinet
Autodesk Microsoft
Micro Focus VMWare
McAfee Symantec
Veeam Citrix
Details of Company Directors
Type of Company: Limited Liability Company and Involved in Information Technology related products,
services and Solutions – as Authorized Partners, Distributor and Solution Provider.
Names of Directors:
.
Appendix 03
Know Your Business Relationship (KYBR) Form - ENTITY
• Full Address
4. * Below are additional details required only when 10% or greater shareholders of the entity is an
Individual.
1. Name of the entity(s) where the individual hold a 10% or greater stockholding in an entity that files
(or contemplates filing) an annual report with the SEC or a US banking regulator?
Key
Position Father’s Full
Name* (including positions/
middle name) (eg. Board Date of Birth NIC/ Name
directorship
Member/CE (DD/MM/YYY Address Passport *Please do not
*Please do not use s held in
O/CFO/ Y) Number use initials
initials other
Proprietor)
companies
6. Details of a contact person for further clarifications:
Name
Designation
Mobile Phone
Email
Appendix 04
MINUTES OF THE IT MEETING HELD ON 01th Des 2019
2 Identify the main object of the project and the complete phases. Get member feedback on project Scoop All
3 Sharing each other's work rules and sharing the responsibilities of members All
4 Assign the responsibility of collecting information about the studios on other similar projects. All
5 Preparation of a report on all matters expected of the institute through the new system Coordinator
MINUTES OF THE IT MEETING HELD ON 15th Des 2019
Payment to pay for people who need to install new system and hardware
4 Finance
Supplier
5 Gets the quotation to the corresponding device
MINUTES OF THE IT MEETING HELD ON 22th Des 2019
Prepare the project plan and timelines for the project and Delegate the creation of a data flow diagram. Coordinator
5
Finally monitoring the data flow
MINUTES OF THE IT MEETING HELD ON 29th Des 2019
All
5 Finally, discuss what should be included. And obtaining feedback from members