You are on page 1of 19

BSBOPS502

Manage business operational plans


Assessment Task 2

Student Name Harpinder Singh Kler Student ID Number

Unit Start Date Unit End Date

Assessment Due Date Date Submitted


Section 1: Planning for an operational plan

About the organization


Provide an overview of An Overview of the Business Worlducation is a social enterprise that
the organization and manufactures tablets for primary school students. They not only concentrate on
product/services/program
gear, but they also have a ruthless team that creates projects, content, and
m s.
exercises to better attract and teach understudies. Worlducation is a term used
Describe the key functions
to describe a strategy of changing the way children learn at school and creating
and activities of the work
area you will develop an the most effective form of learning by utilizing man-made consciousness
operational plan for. technology that can track each child's progress and modify to their requirements

Briefly describe at least two as they learn. Worlducation used to only offer B2B tablet PCs since they realized
objectives outlined in the their material and equipment were only useful if the full study hall was using
strategic plan (if there is no them and the educator was conducting the activities. It also assisted the
strategic plan for your
outreach team in focusing on larger agreements and reducing the number of
business, develop two
objectives for your work possible issues that could arise from individual clients. In any case,
area or business).
Functions and Activities of Critical Importance
Describe your job role.
1. Develop a cloud-firing technique that includes many clouds. A cloud-first
Explain how your job role
contributes to the broader strategy should extend beyond the IT department's scope. The entire
goals of the business or organization must understand and accept it. As a result, IT organizations
work area. must concentrate on more than just the technical aspects of a cloud-first
strategy.

2. Practice workload placement analysis on a regular basis. Continuous


workload placement analysis entails reassessing workloads on a frequent
basis, determining if the existing execution venue adequately fulfils the
organization's demands and whether migrating to a different model
provides more value without putting the organization's operations at risk.

The Strategic Plan has two goals:

1. Raise sales to increase donations to needy classrooms.

2. Improve our people's talents so that we may better serve our consumers.

Job Purpose, I have overall responsibility for a project's effective initiation,


planning, design, execution, monitoring, controlling, and closure as the
project manager. The project manager must ensure that risk is controlled
and uncertainty is minimized.
Stakeholder Contribution Approval
Source information

Identify stakeholders who


will contribute to the Project Sponsor Manages project finances, authorize
operational plan and participates in critical new ideas
provide relevant approvals: decision-making, oversees and
engagement and modificati
□ Who are they communication procedures, on ons
(consider escalation, assists in the formulation of
specialist resource the original scope and
manager, colleague, project charter, and
manages stakeholder
client)?
relationships.
□ What contribution
will they make?

• What will they


Approve (if relevant)? Project Manager a project's successful the project
start-up, planning, plan's
Identify and summarize
design, execution, approval or
any legislation relevant to
monitoring, control, and the scope's
the operational plan you close-out revision
develop. throughout
the project's
Identify and summarize
execution
any organizational
policies and procedures
Sales Manager assigning sales territory, Prepare and
relevant to the
setting quotas, mentoring budget for
operational plan you
salespeople, providing marketing;
develop. (Attach proof to
sales training, and plan and
this section of your developing a sales strategy budget for
portfolio). promotional
action
Summarize the financial
information (e.g., budget Project team member Setting quotas, mentoring No member of
and forecast) that will salespeople, giving sales the project
inform spending and training, and designing a team has the
(attach proof to this sales plan are all things that authority to
sales managers do. approve any
section of your portfolio).
report or
explain how the resource documentation
will be recruited and .
inducted following policy
and procedure.

explain any financial


implications (e.g.,
approval required,
amount to be budgeted
for etc.).
Explain any Intellectual
Property (IP)
requirements, rights and
responsibilities linked to
the resource.
Relevant Legislation the Privacy Act 1988

Introduced to preserve and promote individual privacy, as well as to


regulate how Australian government agencies and businesses with
revenue of more than $3 million, as well as some other businesses,
handle personal information.

Financial Information
The board of directors decided to create a cloud-based solution that will allow
consumers to access the software from their own devices. A cloud-based
solution is expected to cost $2 million, according to the board of directors.
Cloud policies are the rules that govern how businesses use the cloud. Cloud
policies are commonly used to protect the integrity and privacy of company-
owned data, but they can also be used for finance management,
cost utilization, performance management, and
security of network.

Establish potential physical resource requirements


Requirements for Physical Resources
Use the information from yourThe
research andof
delivery knowledge of your work
various services overarea.
the Internet is known as cloud
computing.
For each potential activity in the These
operational plan,resources include
list the physical data storage,
resources requiredservers,
(identifydatabases,
at least
networking, and software, among other tools and applications.
one).
The licensing of a software application to clients is known as software- as-
For each physical resource: a-service (SaaS). Licenses are usually supplied on a pay-as-you-go or

on-demand basis. This kind of mechanism is available in Microsoft Office


365. Infrastructure-as-a-service (IaaS) is a means of supplying everything
from operating systems to servers and storage as part of an on-demand
service using IP-based connection. Instead of purchasing software or
servers, clients can obtain these resources through an outsourced, on-
demand service. IBM Cloud and Microsoft Azure are two well-known
examples of IaaS systems. The most complicated of the three layers of
cloud computing is platform-as-a-service (PaaS). PaaS and SaaS are
comparable in several ways, but the main distinction is that instead of
distributing software online, PaaS delivers it locally.
Salesforce.com and Heroku
research and summarize information on resource alternatives (e.g. RPA vs human input)

analyses options and choose best one

explain how the resource will be obtained/purchased following policy and procedures

explain any financial implications (e.g. approval required,


Amount to be budgeted etc.)
 explain any Intellectual Property (IP) requirements, rights and responsibilities linked to the resource
(other than those already considered).

Establish potential KPIs

Basic Services: basic support includes availability, which is defined as the amount
For each activity, establish measurable KPIs.
of time the service is available + maintenance time as a percentage of total time.
Show how you approached establishing
If the systemthe
canKPIs in arequests
process mathematical
within away using
certain problem-solving.
response time, it is considered
usable.
How do the KPIs reflect financial The KPIs mean time between failure and mean time to repair, which
requirements?
indicate the time intervals at which failures should be expected and how long it
takes to repair them, are also provided.
Security: Security KPIs govern issues such as which software version levels should
be utilized, how long it should take to perform
List ways to monitor the an upgrade, and the breadth and frequency of security audits. Other
KPIs. essential KPIs monitor data encryption, anti-virus software use and
timeliness, and isolation and logging.
3. Service and Helpdesk: Controlling service and helpdesk KPIs such as the
times at which assistance is offered and the support techniques used.

Identify data security Data Security Issues


issues
1. Lack of visibility into what data is within cloud applications
Identify any data security
2. Theft of data from a cloud application by malicious actor
requirements or issues
associated with the 3. Incomplete control over who can access sensitive data
activities. 4. Inability to monitor data in transit to and from cloud applications

5. Cloud applications being provisioned outside of IT visibility (e.g., shadow IT)

6. Lack of staff with the skills to manage security for cloud applications

7. Inability to prevent malicious insider theft or misuse of data

8. Advanced threats and attacks against the cloud application provider

9. Inability to assess the security of the cloud application provider’s operations


Inability to maintain regulatory compliance
Section 2: Developing an operational plan

Consult with others The following are some of CGI's consulting services:
Summaries the outcomes of Formation of a cloud strategy and roadmap
your meeting with relevant
— For the shift to a cloud-enabled hybrid IT environment, CGI
stakeholders:
professionals give consulting and planning across strategy, applications,
• Which stakeholders did data, and infrastructure. We assist clients with aligning business and
you consult with? technical requirements, documenting key indicators of cloud adoption
success, and developing a customized roadmap for moving ahead. To
• Why were these
stakeholders’ part of the enable enterprise transformation adoption, we use tried-and-true tools
consultation process? and frameworks, such as:
• Capture and aggregate enterprise data with CGI Unify360 Portfolio
• Were any changes to
Manager.
your suggested
activities, resources, The CGI Unify360 Code Analyzer analyses source code to discover which
timeframes, KPIs and applications are most suited for cloud migration.
monitoring processes
Evaluation of the cloud situation
requested?
Describe how you
collaborated to achieve joint - CGI aids customers in examining their current applications in order to
outcomes. determine cloud suitability. We examine responsibilities (entire portfolios
or specific apps) together, and then devise a best-fit cloud foundation
How did you seek feedback,
arrangement plan for each. We discuss the re-engineering and costs
advice and support?
associated with inheritance applications. We plot cloud specialist co-op
(CSP) contributions based on the cost, risk, and effort of cloud move. The
cloud availability assessment aids in the planning, migration, and
management of the mixed IT biological system's advancement.

Application modernization and defense — Using CGI tools and techniques,


our experts assist organizations in assessing legacy portfolios and
applications in preparation for cloud migration. Our application
modernization and defense measures reduce waste by removing old and
maturing innovation. Our strategy is in line with the hybrid IT ecosystem
architecture and enhances system compatibility.

• Our specialists use data collecting and analysis tools like CGI Unify360
Portfolio Manager and other third-party tools to determine which apps
can be migrated to the cloud directly, which should be rebuilt, which
should be replaced (possibly with a SaaS model), and which should be left
alone.
• We use CGI Unify360 Code Analyzer to analyze source code,
detecting and resolving technical cloud migration barriers.
Migration and transformation are two words that come to mind while
thinking about migration and transformation.

CGI provides end-to-end services for planning and executing cloud


migrations to any cloud target, from a single system to the business.

Key benefits:

• Complete awareness of both the commercial and technical sides of


cloud computing

• Describe the dangers, benefits, and consequences of cloud


computing for your company.

• Expert cloud computing guidance and recommendations

• A clear transition paths

• Full implementation and transition assistance

• Highest possible return on investment with the least amount of risk


Objective Activity/ Person Timeline Resources KPI Budget
responsible required
strategy to
for
achieve
completion
objective

Objective Activity Person When Human and KPI to


selected required to responsible must the physical measure and
from realise for the activity be resources monitor
strategic objective activity’s completed required to success of
plan successful by or complete the activity
completion during activity
which
period is it
to be
completed
Increase Create an Sales Advertisement 2. which
6 months 25000$
sales in online advert manager t Consultant software
order to for the new Cloud version levels
increase product computing will be used,
donations to service how long it
classrooms provider for will take to
in need. graphic deploy an
designers upgrade, and
Storage of the scope
data and
frequency of
security
audits
3. Data
encryption,
anti-virus
software use
and
timeliness, as
well as
isolation and
logging.
4. How many
calls are made
or which
support
methods are
used and
received per
week.
5. the
support's
qualification

Objective Activity/ Person Timeline Resources KPI Budget


responsible required
strategy to
for
achieve
completion
objective
Organize a live Advertisement
Sales 6 months
demonstration Consultant
for current manager Cloud
clients. computing
service
provider for
graphic
designers
Storage of data
improve Educate Servers
6 months 25000$
our people's salespeople Databases
talents in on how to Networking
order to be use the new software
more product.
effective
support
customers

Networking
Software
Organize
6 months
school visits
Develop a contingency plan.

Activity/strategy Potential risks Planned Response


to achieve
objective

Activity required to Risk associated with How you will mitigate the risk
realize objective the activity

Make a web User Privacy Is Treating user data with respect (due to the importance of
advertisement for Being Invaded privacy) by acquiring legal authorization for the use of a
the new product. name or likeness in advertising, and protecting your users'
privacy

Organize a live Defamation All of their information is thoroughly vetted, and they avoid
demonstration for making disparaging remarks about a competition.
current clients.

Educate salespeople Lack of product You can increase your sales team's performance and
on how to use the knowledge assist your firm further its mission by identifying,
new product. monitoring, and mitigating risks.

Arrange for school It's possible that A brief follow-up email following each stage of the free trial
visits. prospects will take (signing up, live demo, etc.) encourages your users to take
longer to convert into action.
paying clients.
Approve plan Dear CEO,

Follow organizational policies I'm sending you this request for your approval of our functional layout
and procedures to seek for our next project. I've attached an itemized plan that the group and I
approval for your operational created to this email. When you accept our proposal, we will
plan: immediately begin working on the project. You'll find this arrangement to
be a comprehensive response to better engaging our present customers
• Who will you seek
with retargeted advertising. I'm sure you've been seeking for an answer
approval from?
to how we might generate more repeat business, and I'm confident that
• How will you seek this is it. I'm looking forward to your response.
approval?

Attach proof of approval (e.g.


Minutes of executive team Sincerely,
meeting, draft email) to this
section of the portfolio.

TOXOPEUS, Lucas

Document resource Searching the internet for cloud-based businesses that fit the budget. If
requirements Worlducation receives what it requires, it will enter into a cloud
computing collaboration agreement to ensure the confidentiality of
Document the resource
Worlducation's data in the cloud, as well as the security of company
requirements (following
data, in line with existing privacy regulations.
organizational policy and
procedures).

Attach proof to this section of Requirements for Physical Resources The delivery of various services
the portfolio. over the Internet is known as cloud computing. These resources include
data storage, servers, databases, networking, and software, among other
tools and applications.

1. SaaS (software-as-a-service) refers to the licensing of a software


application to clients. Licenses are usually supplied on a pay-as- you-go
or on-demand basis. This kind of mechanism is available in Microsoft
Office 365.

2. Infrastructure-as-a-service (IaaS) is a mechanism for offering


everything from operating systems to servers and storage as part of an
on-demand service using IP-based connection. Clients can avoid
purchasing software or servers by renting them instead. The most
complicated of the three layers of cloud computing is platform- as-a-
service (PaaS). The key distinction between PaaS and SaaS is that instead
of distributing software online, PaaS is a platform for producing software
that is provided via the Internet. Platforms like Salesforce.com and
Heroku fit within this approach.
Explain plan to team Dear, team!

Attach proof to this section of


the portfolio (if not already
If it's not too much difficulty, look for both people and physical resources
viewed in person by the
that are required for this project for your careful consideration. If you
assessor).
require any additional clarity, don't hesitate to ask me whatever it is. I'll
try to provide you with further information about the two asset
requirements based on your needs.
Section 3: Managing operational performance

Confirm human resource Dear team,


acquisition
Good morning. I'd want to draw your attention to some noteworthy
Confirm that any new staff changes affecting our claim to fame. Our primary company has reasoned
members required to complete that a couple of rebuilding of our subject matter is all together so our
the activities in the operational progress through this assignment can be essentially as foreseeable as
plan were recruited and inducted possible due to Worlducation's new HR obtaining.
according to the organization’s
When in question, this is fantastic news for us all; we will be on boarding
policies, practices and
ten more specialists, which will help us deal with our current
procedures (e.g. Via email, face-
understaffing crisis while also preparing us for the greater arranging
to-face conversation, survey etc.)
duties that this merger is expected to bring about.
Attach proof to this section of
I've scheduled a labor force meeting for later today from 12pm to 1pm,
the portfolio.
where I'll lay out the plan for this massive transformation; lunch will be
provided. If it isn't too difficult, please contact me at any time
throughout the following few weeks.

Confirm physical resource Dear team,


acquisition
Good morning. Because of Worlducation's new actual acquiring, our
Confirm that any new physical leader the board has decided that a few rebuilding of our area of
resources and services required specialty is all together so that our change via this project can be as
to complete the activities in the consistent as possible.
operational plan were acquired
This is generally good news for us all, because we will use cloud- based
according to the organization’s
calculating to aid our organization's execution during COVID- 19.
policies, practices and
procedures (e.g. Via email, face- I've scheduled a staff meeting for tomorrow from 12 to 1 p.m., during
to-face conversation, invoices, which I'll go over the steps of this critical changeover; lunch will be given.
quotes etc.) Please feel free to contact me with any questions or concerns at any
moment throughout the next few weeks.
Attach proof to this section of
the portfolio.
Warm regards,
Lucas TOXOPEU

Incorporate Intellectual Here are a few things to keep in mind when incorporating our company's
Property (IP) requirements intellectual property (IP) requirements:

Take necessary steps to ensure


any IP requirements
Various associations now keep their data assets on a variety of local and
(established in Section 1 of cloud-based limit contraptions. As a result, the initial step in obtaining
your Project Portfolio) are guaranteed development is to locate it, create a framework for it, and
incorporated in the execution depict it in a range of sizes, from the tiniest to the most difficult.
of activities (e.g., memo to Customers can also bring their own devices thanks to the presence of
staff, contractual agreement, BYOD. They routinely copy sensitive data
email to include it in induction to their own devices while working on their computers in a way that makes
process etc.) them think twice about data. To avoid data breaches, it's critical to
recognize who approaches sensitive property, such as clients, project
Attach proof to this section of
laborers, and associates, and to pick out likely symptoms of compromise.
the portfolio.
Keeping an eye on access control to detect insiders who no longer require
access (e.g., who have left the organization or gone on to another venture)
is also a significant development.

Insiders or workers who are disgruntled might sometimes compromise


sensitive information, thus organizations should focus on implementing
security procedures. Delegates should be informed on association shows
and strategies for overseeing safe development, as well as the outcomes
of their activities. A data security method should specify which data
should be obtained and where it should be discovered, as well as who
should access it and how it should be protected. It should also mention
how sensitive data, such as IP, should be migrated, as well as the process
for destroying it when it is no longer needed or required.

Affiliations can look through a wide range of data security devices, and
taking effective risk countermeasures is critical to reducing the risks
associated with IP. This includes performing certain controls to monitor
customer activities as well as maintaining access controls. Data Loss
Prevention (DLP) strategies, like Endpoint Protector, are an important part
of any online security strategy. This method can locate sensitive data, both
moving and fixed, and track how and by whom it is utilized. Similarly,
encrypting important corporate data or creative work data can reduce the
chance of difficulties.

Thank you for taking the time to read the information I've provided above.

Harpinder Singh Kler

Plan and implement Dear team,


monitoring
Please find information about our KPI monitoring process and
Choose one activity and its documentation below. Within the performance measure step, there are six
related KPI. process components:

Establish a process that can be 1. Describe the desired outcome (s)


used to monitor and document
2. Recognize different options for action
performance of the KPI (either
using a flowchart or words). 3. Choose the appropriate measurement(s) for each goal.

Implement the process (e.g., 4. As needed, define composite indices


by placing a poster in the 5. Establish goals and benchmarks.
office, sending an email etc.)
6. Identify and document key performance indicators. Please feel free
Attach proof of your to contact me with any questions or concerns at any moment
implementation to this section throughout the next few weeks.
of your portfolio.
Regards,
Harpinder Singh Kler

Assess progress Interval of measurement for key performance indicators:

Assess and document the


progress of the activity you
1. Key Performance Indicators Incentives are frequently measured
selected to monitor in the
across industries.12 month rolling average is the benchmark. This
previous step(use the data
provides a 12-month average of performance rather than a one- month
showing underperformance).
average of performance.
You may consider:

• Is it likely to be completed
2. The first 11 months should be measured on a graduated scale, with
within the timeframe set?
the first month's measurement equaling the first month's availability, the
• Will it meet budget? second month's measurement equaling the average of the first two
• Are any additional months, and so on.
resources required?

• Are any resources under-


performing (identify at
least one)?

Attach relevant data/proof of


progress to this section of your
portfolio.

Attach documented
performance to this section of
your portfolio.

Negotiate and approve Many beneficial outcomes are realized by our organization.
variations

Summaries the outcomes of your


By using variance analysis effectively, you can do the following
negotiations with relevant
stakeholders: • A competitive advantage in demonstrating your capabilities through
clarity of structure and processes, as well as clearly defined roles and
• Who was part of the
duties.
negotiation?
• Improved risk management as a result of insights that minimize both
• What are reasons for
controllable and uncontrollable variability.
underperformance and
how can it be solved? • Improved decision-making that increases shareholder value.

• What did you negotiate • Behavioral and systematic biases in your forecasts and variance results
(e.g., adjusted timeframe are eliminated.
to allow for additional • A better grasp of the relationship between profitability drivers and
training)? other indicators like price/volume.
• How can you support the
resource going forward?

• Which variations were


approved?
Attach proof of your
negotiation to this section of
your portfolio (if not already
viewed in person by your
assessor).

Approve variations. Dear sir,

Gain approval from relevant I've computed the variance in our project budget; please see the table
stakeholders for the below for the data; I'll need your approval for the budget variance. Thank
negotiated variation(s). you very much for your approval.

Attach proof to this section of Best regards,


your portfolio (e.g. minutes of
Harpinder Singh Kler
executive team meeting, email
etc.).

Address underperformance Dear team,

Confirm that support is In light of the group's disappointing performance in the Wolrducation
provided where necessary distributed computing advancement project, I propose that we lead
according to policy and optimal preparation with CGI as one of our outside advisers. For a while,
procedures (e.g., email to I'll give you some advice. I am confident that we will all be invested in
arrange training). this preparation. I am optimistic that this cloud advancement project will
improve the usefulness of firms who have suffered a setback as a result
Attach proof of confirmed
of COVID-19. Please do not hesitate to contact me if you have any
support to this section of your
questions.
portfolio.
With regards,

Harpinder Singh Kler

You might also like