Professional Documents
Culture Documents
ICTTEN516 Learner Guide
ICTTEN516 Learner Guide
Learner Guide
Contents
Prepare to produce technical solutions from business specifications........................................9
Obtain business requirements and business specifications for the client from
appropriate person............................................................................................................................ 9
Research and identify the client’s business model...................................................................14
Determine technical specifications for the business................................................................17
Clarify and confirm the business problem and key stakeholders’ requirements with
stakeholders...................................................................................................................................... 20
Evaluate the impact of the technical requirements......................................................................24
Review and assess business problems, opportunities, and objectives.................................24
Determine technical requirements in respect of input and output, interface, process
flow or quality requirements......................................................................................................... 28
Analyse hardware, software and network requirements.........................................................30
Build business platform based on software solutions..............................................................35
Investigate processes to be changed by the business solution............................................41
Produce an evaluation document on the impact of the technical requirements on the
business.............................................................................................................................................. 45
Produce technical business solutions...............................................................................................48
Develop technical solutions in response to problems and business requirements..........48
Determine costs involved to implement the technical business solution............................54
Investigate a range of supplier products to determine which one best meets technical
requirements..................................................................................................................................... 57
Produce a report on the technical solutions addressing the business specifications and
recommendations against business requirements...................................................................59
Document and validate agreed solutions....................................................................................... 62
Forward technical requirements and solution overview to appropriate person for
feedback............................................................................................................................................. 62
Analyse feedback and incorporate change as required.........................................................63
This unit describes the skills and knowledge required to compile and evaluate business
specifications from a client and produce viable business solutions.
It applies to individuals who carry out network design and implementation of practical
technical solutions of information and communication technology (ICT) networks. They
are employed by telecommunications and information technology networking
provisioning companies specialising in integrating converging and emerging technologies
of ICT networks.
Unit Sector
Modification History
Release Comments
Release 1 This version first released with ICT Information and
Communications Technology Training Package Version 2.0.
Performance Evidence
Note: If a specific volume or frequency is not stated, then evidence must be provided at
least once.
Knowledge Evidence
ICTTEN516 Produce technical solutions from business specifications 7|Page
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 August 2019
To complete the unit requirements safely and effectively, the individual must:
Assessment Conditions
Gather evidence to demonstrate consistent performance in conditions that are safe and
replicate the workplace. Noise levels, production flow, interruptions and time variances
must be typical of those experienced in the telecommunications networks engineering
field of work and include access to:
First, let us consider what a technical solution in the ICT domain might be. ICT technical
solutions cover the wide fields of telecommunications, systems analysis and design,
software, web development and IT networks. A diverse range of solutions are available to
address the business challenges of the modern era.
Requirements are generally the description of future needs describing high-level ideas for
a product, service, or user experience, whereas Specifications are more detailed and may
include documentation of non- functional requirements.
A Project Management (PM) system manages the planning, organisation and completion
of a project with defined outcomes, making sure it is well-executed, delivered on time,
and within budget. A Customer Relationship Management (CRM) is the combination of
practices, strategies and technologies that companies use to manage and analyse
customer interactions and data throughout the customer lifecycle, with the goal of
Technical solutions are designed by first considering business requirements. There are
several methods to gather business requirements. Some of the most popular techniques
are
Objectives of BRD:
Executive Summary.
Project Objectives.
Project Scope.
Needs Statement.
Financial Statement.
Functional Requirements.
Non-Functional Requirements.
Assumptions.
ICTTEN516 Produce technical solutions from business specifications 12 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 August 2019
Benefits and Costs.
Environmental Factors.
Consultants should be aware that the data they are gathering may be commercially
confidential or contain personal private information. For this reason, consultants may find
some resistance to disclosing this type of data.
‘a plan for the successful operation of a business, identifying sources of revenue, the
intended customer base, products, and details of financing’ .
If you are going to provide a technical business solution, it is essential to know what a
business model is designed to achieve. A business model can be a company's plan for
making a profit. It can identify the products or services the business intends to sell, the
target market(s) it has identified, and the expenses it anticipates.
A business model is often a high-level plan for profitably operating a particular business in
a specific marketplace.
A primary component of the business model is the value proposition. This is a description
of the goods or services that a company offers and why they are desirable to customers
or clients, ideally stated in a way that differentiates the product or service from its
competitors.
For example, a Fast-Moving Consumer Goods (FMCG) entity often deals with products
that are sold quickly and at a relatively low cost. Examples include non-durable household
goods such as packaged foods, beverages, toiletries, over-the-counter drugs, and other
consumables. They may have products that have a limited shelf life. So, the business
model has a supply chain focus to avoid product expiry. So, the business model solution
might include tracking the time to from shipment to shelf and provide data that can
support supply chain optimisation decisions.
To create an efficient business model-based solution, there are several methods that can
be adopted. Key business areas that may require an ICT solution are:
Market Analysis: Marketers need to carry out research and analysis to determine customer
demands, market segmentation, and opportunities in the market.
The title given to a technical specification or requirements document, and the information
included, will vary depending on the industry and project. These documents are essential
guides for defining a product or system and ensuring mutual understanding among
stakeholders.
Revision Log: A record of document updates that designates who is responsible for the
updates, in order to track changes.
Assumptions, Risks, and Dependencies: Factors affecting the project and requirements.
These items may include constraints that present limitations to a project, a description or
diagram of the context and larger system in which a product exists or is being created,
and specific assumptions such as what technology, equipment, or expertise may be
available.
Determining the technical requirements and specifications is one of the most significant
steps of the business solution process. Sometimes this process is called solutions
development.
Solutions development explores options for how to meet requirements and then
implements the best solution. In broad terms, solutions development comprises the steps:
Evaluation and selection examine all the ideas and assesses how well they will perform
against stated criteria such as reduced capital cost, speed of delivery or level of risk.
The emerging solution is subject to periodic reviews and ultimately results in the issue of a
specification that can be used to build a detailed business case. In some cases, the
detailed specification will only cover the early stages of development, with later stages
being refined as work proceeds. The development of value-improving proposals can
occur at any stage of delivering a project or program.
A key idea from systems engineering is the progressive testing of the emerging products
against the expectations laid down in the specification and requirements. ‘Verification’ is
the term used to ensure that the solution is being built right; ‘validation’ is the term used
to ensure that the right product is being built.
What: What questions, such as “What problem is the company facing?” can provide clear
ideas about the operational activities of the organisation.
Who: Who questions, such as "Who buys our products/services?" or "Who are our
customers?", provide insights into distribution and marketing potentials.
Why: Why questions like “Why are we providing this service?” or “Why is our service or
product not succeeding?” are open-ended questions that can lead to deep insights into
how a business is operated.
Involving key stakeholders is an essential step in defining the project scope. A successful
project needs the important stakeholders to be part of building the project scope.
Otherwise, conflicts between the stakeholders and project management may arise.
Define Process Requirements: Process requirements describe how people interact with a
product and how a product interacts with other (often existing) business processes. This
involves understanding how data moves and how business transactions flow from one
point to another. For example, consider website invoicing. How do such transactions link
back to invoicing and accounting and at what point, if any, can staff view and alter the
status of orders?
Identify the limitations: A most critical step during the project scope definition is to identify
the limitations of a product or process. When it comes to software development, you
need to clearly determine the features that will not be present.
Once all the requirements are locked in, they are used to drive the details of a technical
solution. It is important that any technical requirements established should be able to be
understood by those who are to implement the solution.
For example, consider an expanding company that needs to strengthen its wireless
network to reach locations away from head office. The wireless network will include
Now, having established the facts, solutions to optimise or expand the network coverage
and improve the network speed can be considered. This may involve developing a BRD,
technical specifications, a project scope and a financial business case.
When the proposed solution is accepted, a project team may be formed, and the
implementation begun.
Activity 1 - Notes
Financial issues such as tight credit conditions or inability to refinance debts as was
experienced following the GFC (Global Financial Crisis) can severely limit the ability of a
company to operate.
Reputational problems also cause severe damage to an enterprise. Poor customer service
can attract immediate social media attention. Samsung has also experienced reputational
damage due to exploding phones. Volkswagen faced similar issues due to have cheated
on emissions testing.
There are many other examples of potential business difficulties such as branding,
positioning, regulations, consumer demand, supply chains, competition, etc.
Business Objectives are the results an enterprise wants to achieve. It usually includes a
time frame and a list of resources to achieve these goals. The objectives of a business
organisation should be measurable, suitable, and feasible. For example, business
objectives of a car manufacturing company might be
Business goals and objectives are used to drive action plans for a company. Usually, an
ICT project is part of the action plan required to support specific goal achievement.
Example of business goals, objectives, and action plans can be:
Of particular concern to ICT students are the ways that ICT may play a part in business
solutions. For example, an action plan requiring an in-depth analysis can be facilitated by
The most compelling analysis for identifying business opportunities, problems and
objectives is to conduct a SWOT (Strengths, Weaknesses, Opportunities, Threats) analysis.
ICT students also need to be familiar with business domains, functions and organisations
to better contribute to business solutions
Business Domain refers to the area of core business, for example, healthcare, finance or
aviation. The business domain suggests what types of product, services, customers a
business may have and what kind of markets the business operates in.
Take the example of Vodafone providing services to its users. The business domain of
Vodafone is telecommunications. Also, there are sub-sections of company Vodafone that
take care of sales, customer support, engineering etc. to provide a complete solution for
its customers.
Business Functions are processes or operations that ensure the proper functioning of an
organisation. Business Functions are further categorised:
Core Functions are business functions that are critical, and closely related, to a
business's strategy. Usually, the core business functions make up the primary
activity of the enterprise, but they may also include other (secondary) activities if
the enterprise considers these as part of its core functions. Core functions of
Vodaphone are telecommunications engineering, marketing & sales, finance, etc.
Support Functions are key enablers to an organisation's success, but they are an
overhead and their activities need to be aligned to support the efficient and
effective delivery of organisational goals. Vodaphone’s support functions may be
call centres, network maintenance, product supply.
The input requirements are the technical inputs that a system specification requires. In
other words, the specified data is the system input requirement.
The output requirements of a system consist of the specified data required to meet
identified needs. This process is carried out by providing a specific data to the system
(Input), the system performs operations on the data (Process) and shows the desired
output wanted by the enterprise or the customer (Output). Take the example of a web
design project in which users can add up their meals and know how much calories they
ate. The inputs are required by the customers in the form of the number and type of food
items consumed. A list of items can be presented to user to select along with the quantity
taken. The system then calculates the number of calories and show the output to the user
in numerical format.
Interfaces are necessary because they determine the interaction of the outside world with
a system and also the interactions of a system with other systems.
Identify the Interfaces: Firstly, identify and analyse the system of interest (SOI) and the
context in which it relates and interacts with its parent system. It is part of (external
interfaces) and an analysis of the parts that make up your SOI and how they interact with
each other (Internal Interfaces).
Define the Interfaces: Once an interface has been identified, it needs to be defined. To
define an interface, you need to determine the characteristics of each system at the
interface, the media involved in the interaction, and the features of the thing crossing the
interface. The media could be electrical through a wire, physical contact, fluid or gas flow
through plumbing, an RF signal through the air or space, optical fibre, data via a universal
communication bus or the internet. The characteristics of the system at the interface could
be an electrical, electronic, or fluid/gas connector or a mechanical interface where the two
systems are bolted together.
Write the Interface Requirements: The documentation of the interface requirements might
take the form:
Analysing the hardware, software, and network requirements has crucial significance in
the business solution process. These are the critical requirements for building a technical
solution.
Let us understand this analysis with the help of an example. Suppose a retail store is
opening a new branch as per its expansion strategy. What are the possible requirements
related to the technical solutions? There would be requirements for a computer network,
local area network (LAN), connectivity to internet, relevant software installations to enable
systems to connect with the network and perform routine operations, hardware
requirements such as routers, switches, cables etc. Some different categories of solution
requirements are:
Software Requirements: Every organisation is different and needs a unique set of software
requirements. The software can be broadly categorised as system software and
application software.
System Software is related to the realm of software which is necessary to run computers
i.e. the Operating System (OS). OS manages the physical resources of the computer and
provides an interface between computers and users. Drivers are also considered to be a
part of system software that helps in connecting different external devices to the network
by installing them.
Application Software are used to perform various tasks and enhance the productivity of a
system. These applications can be databases, document handlers, or development
platforms. Examples of Application Software are Microsoft Excel, Microsoft Visual Studio,
and Adobe Photoshop, etc. However, on an enterprise level, different kinds of software
Network Requirements:
The Network Medium: This is usually formed through cables or fibre optics
connecting computers physically to each other.
The Network Interface: The hardware that attaches a computer to the network
medium and acts as an interpreter between the computer and the network.
Connecting a computer to a system requires an add-in board known as a network
interface card (NIC).
Communications: Communications are a set of rules about how computers are going to
connect or talk with each other. Usually, computers use different software, and a common
language is used, which prompts shared communications.
Services: Services are the shared set of devices computers share. For example, computers
can share cameras or printers. Unless computers are capable of sharing resources, they
remain isolated.
As an ICT practitioner, you should also know that compatibility issues can arise due to
hardware incompatibility or software incompatibility. Hardware incompatibility might
require you to change hardware, whereas software incompatibility may be addressed
through OS troubleshooting or technical support of the vendor. Let us take a look into
these challenges in detail
Troubleshooting Process: Compatibility issues may occur at any stage of the solution
implementation and may require you to track back all the installed devices and software
to identify the root cause and fix it. Root cause is the main reason of the occurrence of
problem. For example, if a sound device is not working in a computer, the
troubleshooting steps include
Let’s assume that first four checks are passed, and sound was not working due to drivers
not compatible with operating system. The root cause is mismatch of driver, but you have
to perform all steps because it’s not the always the case.
For software issues, the technical support software and hardware vendors typically
provide support to resolve the issues occurring in their product environment.
Microsoft operating system Windows tools are described below for reference.
Like Facebook, Uber, or Alibaba, these businesses don’t directly create and control
inventory via a supply chain the way linear businesses do. Platform businesses don’t, to
use a common phrase, own the means of production— instead, they create the means of
connection.
It’s important to remember that a platform is a business model, not just a piece of
technology. A lot of people make the mistake of confusing a platform with a mobile app
or a website, but a platform isn’t just software. It’s a business model that creates value by
bringing together consumers and producers.
The most common misuse of the term “platform” is when it’s used to describe an
integrated suite of software products. This is especially common among cloud-based
Software as a Service (SaaS) companies, which often claim they have a complete
“platform” for X. In such cases, the word “platform” really is just being used as a marketing
term.
Platform design isn’t just about creating the underlying technology. It’s about
understanding and creating the whole business and how it will create value for and build
a network.
In the old model, scale was a result of investing in and growing a business’s internal
resources. But in a networked world, scale comes from cultivating an external network
built on top of a business. This is the essence of how platform business models work.
In the 20th century, we saw platform business models in the shopping mall and auction
house. Like their predecessors, these businesses have mostly used brick-and-mortar
locations to facilitate exchanges. But thanks to connected technology, platforms can now
facilitate the exchange of value produced by decentralised networks of individuals. The
result is that today’s platform businesses are able facilitate exchanges at an
unprecedented scale.
The three most successful platforms to date are Google, Apple, and Facebook. But they
are only the tip of the iceberg. The number of platforms at the top of the economy is
growing fast. In 2016, four of the top five members of Forbes’s list of most valuable
brands were platform companies, as were eleven of the top twenty. And as of early 2017,
the top five companies by market capitalisation are all platforms.
The growth of platform businesses isn’t isolated to the United States; platform companies
such as Alibaba, Tencent, Baidu, and Rakuten have taken over China and much of Asia.
The economies of many of these countries were growing rapidly at the same time that
Internet access became widespread. And because these countries didn’t have the existing
commercial infrastructure that developed economies did, their industries have been
moulded around the Internet and platforms.
Alibaba, for example, has controlled as much as 80% of the Chinese ecommerce market
while Baidu has more than 70% of Chinese search. Tencent, now the most valuable
company in Asia, has nearly 850 million users on its WeChat messaging platform and is by
many estimates the largest gaming company in the world. And Didi Kuadi, China’s answer
to Uber, dominates the taxi market.
A platform ultimately enables this value creation by facilitating transactions. While a linear
business creates value by manufacturing products or services, platforms create value by
building connections and “manufacturing” transactions.
The core transaction is the platform’s “factory”- the way it manufactures value for its users.
It is the process that turns potential connections into transactions. Getting the core
transaction right is the most important part of platform design, as the platform business
will need its users to repeat this process over and over to generate and exchange value.
However, although a platform enables the core transaction, it doesn’t directly control its
users’ behaviours. The challenge is a unique one: how to get potentially millions of people
to behave the way you want them to.
Audience building
Matchmaking
Providing core tools and services
Setting rules and standards
If a platform handles these four functions well enough, it will be able to facilitate its core
transaction (and, hopefully, a lot of it).
Types of Platforms
While all platforms share the same underlying business model, not all platforms are the
same. Through our work and research, we’ve delineated the 9 different types of platform
businesses, which are listed below. They are organized by the type of value that’s
exchanged in the platform’s core transaction.
Matching a platform’s design to its type is essential to its success. Platforms that don’t get
this right tend to get left behind by the competition. Platform type affects everything from
the design of the core transaction to how you handle the four functions, making it one of
the most fundamental distinctions that any platform business must understand.
Figuring out which platform type a business fits into should always be one of the first
steps in designing a platform.
Although all platforms are focused on connecting consumers and producers, which
category your platform falls under fundamentally alters the core value you will try to
deliver. This choice translates into very different core transaction paradigms and dictates
how you design your platform.
ICTTEN516 Produce technical solutions from business specifications 39 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 August 2019
The core transaction is just one example of why a platform’s type matters for platform
design. Your platform’s type also influences how you design and deliver on its four core
functions.
For example, each core transaction paradigm requires radically different matchmaking
strategies or rules and standards. Which category your platform falls under also influences
your audience-building strategy. Exchange platforms, such as Uber and Alibaba, need to
focus on building liquid marketplaces that have sufficient overlap of supply and demand.
Maker platforms, such as Android and YouTube, are more focused on organically building
“stars” who, because of their high matching intention, can act as powerful nodes in these
networks.
Many maker platforms want existing celebrities to join and bring their fans with them;
however, when the platform can create its own celebrities due to the network effects
within its network, you know it’s reached critical mass. YouTube’s PewDiePie, Instagram’s
Dan Bilzerian, and Vine’s Nash Grier are all examples of normal producers who rose to
fame by building huge organic followings on their respective platforms.
As you can see, understanding a platform’s type has a big impact on how you design its
core transaction and four functions. That’s why figuring out which platform type a
business fits into should always be one of the first steps in designing a platform.
Once you have devised a business solution for the enterprise, you should analyse the
processes that will be affected and changed by this solution.
For explaining the processes changes, you should consider three states:
Current: You have to analyse the current performance and the procedures and processes
currently running.
Transition: The transition states explains how the new process will be implemented in the
organisation. It will include the costs, training, and any new devices to be introduced.
Future: Finally, you have to analyse how the installation or application of the new
technical devices or software will change the business. You can also assess performance
by conducting sample tests on the latest product, process, or service.
Step 1 (Gap Analysis): Identification of the process change holds key significance. You
need to work closely with the functional stakeholders to design the future process. You
also need to determine actions plans to support moving to future processes.
Step 2 (Stakeholder Management): Now you have to identify the key stakeholders and
staff affected. Understand their concerns and issues and handle them accordingly.
Step 3 (Communications): Identify the change audience and key messages and methods
of communications used by the enterprise. Analyse the communications by sending and
receiving the feedback then invest feedback into stakeholder engagement.
Network security protocols: The fundamentals of network protocols give you a better
understanding how a network is structured and how communications are being
transmitted. Network security also has protocols in place to maximise the benefits sought
from protocol implementation. Network security protocols maintain the security and
integrity of the data during transfer or movement of data over a network connection.
These protocols are designed to secure the network data from any unauthorised user,
application, or device.
However, firewalls do not always detect and stop viruses or harmful malware, which may
lead to data loss. An anti-virus software is implemented to prevent the virus and/or
harmful malware from entering the network.
As an ICT engineer, you should know that every security step involves some change in
user experience. For example, the addition of username password requires the users to
input user information on every access to the system. This could be annoying for users.
Any proposed process changes should be well documented so that they can be included
in user information and passed to relevant persons utilising the network.
The Network Security Standard provides measures to prevent, detect, and correct network
compromises. These are the agreed-upon ways of performing something. But in the case
of networks, standards might imply syntax, semantics, methods of communication, or
error recovery methods. Some standards are broadly followed, such as ISO and ANSII.
Data Encryption: The translation of data in an encrypted form such as a code, or text is
data encryption. This data can be converted into the original form using a decryption key
or password.
Data encryption is a security method where information is encoded and can only be
accessed or decrypted by a user with the correct encryption key. Encrypted data, also
known as ciphertext, appears scrambled or unreadable to a person or entity accessing
without permission. Data Encryption is used to deter malicious or negligent parties from
accessing sensitive data. An important line of defence in a cybersecurity architecture,
encryption makes using intercepted data as difficult as possible. It can be applied to all
kinds of data protection needs ranging from classified government data to personal credit
card transactions.
The information about network security measures should be shared with company
employees. This would also help to prevent attacks. The information such as do not share
passwords, avoid opening unknown emails with attachments, keep firewalls enabled helps
to educate employees about data security. Please note that data security can be one
module of overall technical solution or a standalone solution as per customer needs as
well.
Executive Summary: The executive summary contains the details of the essential content
of the document. It previews the main points of the report and enables readers to build a
mental framework for organising and understanding the detailed information in the
evaluation. Consider writing the executive summary after writing the whole document as
this provides the core of report to a reader.
Introduction: The introduction contains brief information about the previewing of the
current system and the requirements of the system. For example:
Evaluation Objectives: The underlying objectives which need to be fulfilled for the
successful completion of the project
Products List: What products need to be included in the network. This may include
hardware and software.
Evaluation Criteria: How evaluation would be performed for the measurement of project
success
Activity 2 - Notes
Solving complex business problems may involve more than one technical solution.
Therefore, it’s necessary to carefully plan the solution. Consider these few critical steps
when developing a business solution:
You may have been provided with business requirements by the enterprise, but
that may not mean that they have properly identified the problems that they are
currently facing. You need to approach requirements with a critical mindset.
Thoroughly evaluate the performance of current technologies used by the
organisation with respect to their business requirements.
Identify system errors and inefficiencies of current solutions used by the
organisation.
List the problems that are recognised during the BRD evaluation
Propose the most cost-effective and technological efficient solution to each
identified problem currently faced by the organisation
Choose the most suitable technological solution, while bearing in mind possible
limitations of that technology.
Re-evaluate proposed solution(s) by testing in various cases and sample situations.
After the analysis of the BRD, you will need to build a unique, efficient, and productive
solution for the problems identified.
In this age of technology, there are numerous ways of developing solutions to business
issues, but some technologies might not be as productive as others.
Prior to SaaS, companies used to buy and maintain the hardware on-premise to
support the enterprise-level applications. Moreover, the company needed to hire
IT professionals to tackle the software and hardware issues as well as to update the
software. But nowadays vendors house the hardware and store the data of clients
and provide updates as well. The clients just need to either install the application
on their computers or use it online. Furthermore, the SaaS usually provides with
the monthly or yearly subscription option that includes the cloud storage, project
management, and automatic social media updates. This service is beneficial as
enterprises can unsubscribe before the payment of next period subscription. The
software management and updates are a part of this subscription. However, data
security is an issue in acquiring this service as the data security is maintained and
protected by the vendor.
Examples of SaaS based platforms leading the business world are Salesforce,
Microsoft, Adobe Creative Cloud, and Amazon Web Services. These companies
provide services to their customers by using software applications.
4. Optical Networks: Many organisations are using private optical fibre networks. In
this type of network, the enterprise owns packet-optical transport equipment,
connected to leased dark fibre. Leased services can companion the private optical
network where either fibre is not available or too expensive, or where there are
lower bandwidth needs. These private optical networks offer the enterprise a
combination of agility, control, and economy. Today, the enterprises seek a lot of
efficiency and speed in their operations. Gone are the days when the organisations
used to order phones or data services and held back for weeks. Some of the
reasons why enterprises choose private optical fibre networks are:
Scalability and Productivity: As scalability and productivity is easily
manageable in private optical networks, most of the organisations prefer
these networks. These enterprises expect extensive ranges in capacity or
application and thus, opt for optical networks.
Service Responsiveness: High service responsiveness is required when
recurring changes are made to location or satellites operations. As the
network’s sole occupant can easily raise priorities, reaction to such changes
becomes faster.
Risk Tolerance: There is some probability of risk attached with the private
optical networks. With the choice of building and designing a networking
using system integrator carries risk.
ICTTEN516 Produce technical solutions from business specifications 50 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 August 2019
Capital Culture: The way of spending funds also matters when it comes to
the matter of spending on capital costs instead of operational costs. Small
organisations may prefer monthly expense over investing cash to save
operational funds.
Number of Servers
Number of Devices (Laptops, Desktops, Smartphones, or Tablets)
Number of key software apps to be used and their licence cost
Amount of Data Need to be Stored
To determine the cost, IT service providers estimate the number of support hours
required for each item. A company that has more devices is likely to incur more support
hours than a company with fewer devices.
Let us suppose that one IT system calculator estimates the cost of one device or server to
be 25 hours per year. If the IT services provider charges $100 per hour. Therefore, small
businesses can estimate the minimum cost of device support per year using the following
formula.
Costs may be higher than this estimate because it depends on how much the IT solutions
provider charges per service hour. However, it is likely that device support will be the bulk
of the recurring costs. As the cost of storage data securely shrinks, the amount of data to
be stored affects the price less.
Backing up data also costs, but this is essential to keep the data safe in case something
drastic happens. Backing up 500 GB may cost only $100 per year. However, storing more
data will cost more money. Storing and backing up 10,000 GB may be more like $2,500
per year. However, this number is still often much less than the device support as you
may choose only to back up the company’s critical data.
Most companies that choose to use outsourced IT system services spend between $1,000
and $9,000 per month. The number of employees and the need for servers are the main
drivers of these recurring costs. In comparison, an in-house IT person will cost about
$5,000 per month. However, this employee may also receive company benefits and is
likely be limited to 40 hours per week. For many companies, it is cheaper and easier to
outsource recurring IT costs.
One Time IT Systems Cost: Although recurring costs are more likely to impact the budget
than one-time costs, small businesses should account for one-time expenses. Completing
the initial setup of the software programs that a company needs can be a large expense.
At the very least, small businesses should budget for setting up email accounts, a software
program to create and share documents and accounting software, like Quicken.
Sometimes setup can be completed by the small business owner.
However, outsourcing can be a better use of resources. Installation and setup can be time
intensive. Estimates for outsourcing these costs should include at least 25 customer
support hours at a cost of $100 per hour for a total of $2,500 minimum. However, small
businesses should contact an IT solutions provider for a quote for their specific software
setup needs.
Software costs also add up in the solution cost of the company. To identify the software
costs, you should first choose the critical software required for the company. Critical
software list can be divided into two categories:
An Operating System (OS) is usually a large and powerful program that controls
and manages the hardware and other software on the computer. All the
computers and computer-like devices require operating systems. These devices
include laptop, desktop, smart watch and smartphone etc. Some examples of
Operating Systems (OS) are Microsoft Windows: Microsoft Windows is a renowned
Operating System which is run by a desktop or laptop computers. It has several
functions and features such as Windows Search; you can explore any file by its
name and date. Windows Updates; Windows include an automatic update feature
with the intended purpose of keeping its system update and secure.
ICTTEN516 Produce technical solutions from business specifications 55 | P a g e
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V1.0 August 2019
Linux: Linux is famous operating system which is run on smartphones and other
devices. Some features of Linux include Portability; it means that software can work
on different types of hardware in the same way. Multi-User; multiple users can
access system resources (ram/memory/applications) at the same time.
Discovering Suppliers: There are several methods to find appropriate suppliers for the
business, there are some of these mentioned here that might help you:
An online search can be very helpful in finding suppliers who might be advertising
themselves.
Visiting Exhibitions is another helpful method for finding suppliers.
Market Research can also prove handy in finding the right suppliers for the
business.
Price: Price is the key factor while choosing the suppliers, but the price always does not
guarantee the quality of the product. Therefore, always consider the quality of the
product you are acquiring from the suppliers.
Stability: Look for experienced suppliers who have been in business for a long time.
Stability is important, especially if you are entering into a long-term contract with a
supplier or they are the only supplier of a particular item you need for your business.
Exercise due diligence; check the supplier's credit history to see if they are financially
stable. It is worth finding out what businesses have used a supplier’s services and asking
them for a reference.
Reliability: Reliability is another key factor while looking for suppliers. Reliable suppliers
provide the right goods or services at the right time. Usually, large suppliers are preferred
as they have large stocks, enough resources, and systems in place so that they can still
deliver if anything goes wrong. However, you can develop relations with small suppliers –
especially if you are the prime customer.
Vendor due Diligence: Vendor due diligence involves a detailed assessment and the
preparation of an independent report on a company which is issued to interested parties
and can be legally relied upon by the ultimate purchaser.
Early identification and detailed analysis of key risks and issues for potential
purchasers. This gives them the opportunity to ensure they can be mitigated or
placed in the appropriate context prior to commencement of the acquisition due
diligence process by potential purchasers; and
Increased confidence for potential buyers through the presentation of a detailed
financial due diligence report that reduces the cost and time associated for
potential purchasers to due diligence.
Addressing the Problems: Your document must consider and analyse the identified
business problems that the enterprise was facing. It should also outline the known errors
or gaps in the previous system or the processes.
Technical Solution: The report should include a technical solution for each identified
business requirement to be addressed. The technical solution needs to be supported by
technical device requirements, diagrams and technical layouts. It should also include the
software requirements and how the software will be acquired and deployed.
Benefits of the Solution: The report must spell out the changes that will be brought about
by the proposed solution(s), explain how the changes will be implemented and identify
the benefits for adopting the solution.
You should apply design concepts to the solution you are proposing. Some of the design
concepts widely implemented in industry are:
Service Design: With service being an integral part of modern world business, service
design models are widely used as business solutions. Supported by the solutions such as
SaaS, service design is becoming popular in the IT world. The classic example is
salesforce.com which is providing sales services to the clients all around the world. Service
design is the activity of planning and organising people, infrastructure, communication
and material components of a service in order to improve its quality and the interaction
between the service provider and its customers.
In service design, you need to explore how the current systems of the organisation may
be upgraded to support new introduced services introduced.
Marketing Design: A firm looking to grow its business may look to revamp its marketing
strategies through new technical solutions. JCDecaux Australia’s Lipton Iced Tea Misting
Station is one such experiential marketing campaign that required an innovative technical
implementation. Above-the-line (ATL) marketing solution designs aim to address different
areas of advertising. In traditional marketing, high-reach media is used. These mass media
channels are television, radio, print media, and Internet.
Digital is affecting the boundaries between ATL and BTL, connecting both approaches
into a “through the line” (TTL) integrated approach.
Remember that every technical solution has its pros and cons. No solution is perfect. Even
the best solution for today’s problem may become obsolete quite quickly. As an ICT
designer, your job is to look into these trade-offs and provide an optimum solution to
address business problems.
An optimal solution is a feasible solution where the objective function reaches its
maximum (or minimum) value – for example, the most profit or the least cost.
Activity 3 - Notes
One of the most important steps involved in finalising and validating a technical solution is
by receiving feedback. The appropriate person or team is often the client management
team or the assigned client project manager. This feedback can help you to improve or
review any of the important things that you may have missed or got wrong in the
developed solution. Positive feedback from an appropriate person will add credibility to
the solution. Obtaining feedback may require several steps:
Compile Requirements: Obtain the technical requirements from project documents and
compile these to create a complete document. This document will contain all of the
agreed technical requirements; and the benefits, costs and threats related to the technical
solution. It will also contain the changes to be brought about by the solution which is
being proposed.
Review of the Solution: Before sending it for acceptance and sign-off, it is often wise to
have an independent person assess the solution. Ask a colleague to review the proposal
and offer unbiased advice.
Involving the Stakeholders: If possible, also involve important stakeholders. Their early
feedback on different technical solutions may avoid conflict later on. You might decide to
do this by conducting an online survey of different stakeholders.
Appropriate Person: The ultimate sign-off for a technical solution may be the CEO or the
CFO. But common sense suggests that you should always obtain the approval of the
senior ICT officer before requesting final approval.
Prototype: If appropriate, you can also try to create a prototype of the product or service
and get it tested by a third-party or by the project manager.
React: Be careful not to react emotionally to negative feedback from the client or the
project manager or any other appropriate person. Negative feedback can be hard to
accept but can be very valuable as a lesson learned. Rather than react, concentrate on
feedback and make sure you clearly understand what the feedback providers are telling
you.
Reflect: During this stage, you need to reflect upon the feedback provided. You need to
ask yourself questions like; "What would they have preferred me to do?" or "What could I
have done better?"
Respond: If the feedback clearly was not appropriate, it is appropriate for you to respond
in a professional but firm manner. Finding out what really happened and being able to
clarify what happened in a heated situation is an important skill to learn.
Often feedback is obtained during project meetings. Unfortunately, in the heat of the
moment, many of us react with defensiveness and anger, verbally attacking the person
giving feedback. But the truth is, we need to get over it. We know there’s value in
constructive criticism.
But constructive criticism can work both ways. You can receive it, but also sometimes you
want to give it. Sharing and receiving feedback is part and parcel of improvement. If you
have ideas on how someone can improve, don’t hold your ideas back, rather, share your
criticism constructively.
Of course, to be sensitive to others’ feelings and offer feedback when you feel the other
person is ready to take it. Otherwise, you may come across as imposing your views on
others, especially if you repeatedly tell others what to do without them asking for your
opinion.
Version control is a system that records changes to a file or set of files over time so that
you can recall specific versions later.
If you are a technical solutions designer and want to keep every version of a proposal
(which you would most certainly want to), a Version Control System (VCS) is a very wise
thing to use. It allows you to revert selected files back to a previous state, revert the entire
project back to a previous state, compare changes over time, see who last modified
something that might be causing a problem, who introduced an issue and when, and
more. Using a VCS also generally means that if you lose files, you can easily recover.
Many people’s version-control method of choice is to copy files into another directory
(perhaps a time-stamped directory, if they’re clever). This approach is very common
because it is so simple, but it is also incredibly error prone. It is easy to forget which
directory you’re in and accidentally write to the wrong file or copy over files you don’t
mean to.
To deal with this issue, programmers long ago developed local VCSs that had a simple
database that kept all the changes to files under revision control.
In a DVCS (such as Git, Mercurial, Bazaar or Darcs), users don’t just check out the latest
snapshot of the files; rather, they fully mirror the repository, including its full history.
Thus, if any server dies, and these systems were collaborating via that server, any of the
client repositories can be copied back up to the server to restore it. Every clone is really a
full backup of all the data.
Anyone involved in developing ICT solutions, particularly for multi-location clients, needs
to obtain and use a document version control system with iterative capabilities.
Sign-off is an indication that stakeholders agree with and approve the requirements and
solutions that have been elicited and documented.
Communication between you and your client is the most important part of your project. It
began with your client explaining the business problem to you. You then created a
business requirement which explained you understanding of the scope, standards,
expected outcomes, intended audience, and explanation of the technical solution you
intend to use. You then completed an initial design to solidify your technical solution
validity. This is only for the planning stage.
The only question is that while you have identified how you understand the project to be,
does it coincide with your client's vision? The only way to find out is to ask your client. This
requires you to meet with your client, share all of your documents and then receive your
client's OK to move ahead with your work.
The pivotal document in this verification cycle is the Client Sign-Off. This is the document
that your client signs to validate that they have read your materials and are in complete
agreement with what you are doing. The trick is to create a document that is
comprehensive enough to ensure that if your client ever changes mind about what you
are doing, the responsibility will rest on them rather than on you. This also means that
your client will be responsible for paying for the additional resources that are necessary if
there is any change of plans.
Activity 4 - Notes