There are some
Endothon’s outsourcing expectations as well as needs for the vendors of
outsourcing discussed in the Request for proposal and sourcing plan case study.
The needs of the Endothon’s criteria for the selection of a finalist are
mentioned here, such as the total cost for the services proposed, the track
record as well as the experiences in the completing projects of similar scope
as well as the difficulty for the companies to international manufacturing. The
stability in the financial situation for the provision of the requested scope,
resources as well as the duration for this work. Another requirement, need or
criteria of Endothon is the subsequent document as well as the recognized the
understanding and then taking the feedback from the referenced accounts and the
customers.
Furthermore, the
company needs to make its strategies strong as well as the company will have focus
on three modules of ERP system that are going to be implemented in the company.
The further requirements of Endothon’s outsourcing are discussed, such as Total
cost, the techniques which are used as well as the offered services, executive
services, the proposed schedule as well as the project work plan and the
payment terms.
Identify the project sponsor, stakeholders, and steering committee
based on information in the Endothon corporate profile, using the attached
“Sourcing Plan Case Study.”
There are
several number of clients I have found of the company from the document such as
the director of information technology, the executive staff of the company that
is composed of the experienced manufacturing as well as aviation member like
the chief executive officer (CEO) that has more than thirty years’ experience,
the Chief operating officer (COO) as well as the chief of supply chain manufacturing
department, the senior vice president of sales, Anne Scofield is the senior vice
president of human resource department, the chief financial officer, the chief
marketing officer (CMO) as well as the chief information officer (CIO).
Furthermore, the citizens, internal customers, the whole staff of the company, the
basic project team, as well as the IT specialists are also the stakeholders.
Summarize the strengths and weaknesses of the proposal from Bullzai
Ltd. (Bullzai), noting any gaps in the vendor’s response to requirements
specified in the attached “Request for Proposal.”
Note: Use the “Bullzai_Response to Request for Proposal” attached.
A gap analysis
will also be provided by Bullzai that will recognize a review of the best
practices as well as any kind of weaknesses along with applicable laws as well
as the international policies which are linked with the practices. Bulli will
provide the following:
·
The determination of threat levels such as medium,
low as well as high
·
To mitigate the threats in all areas such as
high, medium, and low, the level of effort is also identified.
·
The requirements of time cost as well as the
estimated resource for the mitigation of threats
·
The pass, as well as the full analysis through
Oracle web Services security detection capabilities, protection as well as the protocols.
The
gaps are also discussed in this documents such as the international needs related
to the business of the company, objectives review as well as the goals, the
review of the sampling of the configuration of laptop traffic as well as the desktop
traffic to make sure the usable network capability of the current
infrastructure of the proposed system, as well as the review of workstation, network
device configuration infrastructure as well as the server configuration infrastructure.
Summarize the strengths and weaknesses of the proposal from Synesthor
Ltd. (Synesthor), noting any gaps in the vendor’s response to requirements
specified in the attached “Request for Proposal.”
Note: Use the “Synesthor_Response to Request for Proposal” attached.
Strengths
Several kinds
of strengths we recognized for serving in the commercial sectors. To attain public
as well as the commercial sector clients, we do the following in the advisory capacity.
The first point is that listen as well as work closely with all departments for
unique service requirements, the identification of the power by having the
networking platform to combine the solution building toward the coverage. It helps
to minimize the costs as well as helps to maximize the efficiency of the system
through virtualization. Another most important strength is that it maximizes
effect of the citizen within determining new techniques for performing work by
using the tools.
Weaknesses
A gap analysis
will also be provided by Acutron, which will highlight the weaknesses of the
security against the greatest ever approaches, the laws linked with the
practices as well as they are applicable international policies. Some
weaknesses such as determination of the levels of threats in all the mediums
like low, high, and medium, the levels of the effort for the threat mitigation
in all areas as well as the appropriate assessed time requirements, cost as
well as the resources for the mitigation of the threats.
Identify which vendor you want to award the outsourcing contract to,
justifying why that vendor was chosen.
In the
identification, the assignment of the contract of outsourcing to vendors is
discussed as well as a brief justification is also mentioned why this vendor is
chosen for the outsourcing contract. First of all, the company will see and
observe the overall performance of the prior services of the vendors, and then
a comparison is performed to see the payment of dues or the fee, the company will
also observe whether he has the resources as well as the technology for this
agreement. Furthermore, he should also have the ability to meet the deadlines,
limited liabilities as well as trustworthiness. The contract will be assigned
to the supply chain vendor.
The
justification on this topic is that the company should have to grant the
contract for outsourcing to that vendor who will have the mentioned abilities
because the company will never want to get any kind of loss in the business.
Recommend modifications to the chosen vendor’s bid, amending key
weaknesses and oversights in the selected vendor’s response to the RFP (i.e.,
the “Synesthor_Response to Request for Proposal” or the “Bullzai_Response to
Request for Proposal” attachment) and justifying how the recommended
modifications will benefit your company.
The
key weakness of the supply chain vendor, for the break down to stall your
ability to make the profits or revenue as well as delivering the products
because the vendor only takes part in the supply chain. It should also focus on
the related works as well as should have an oversight on the related departments.
The major weakness is that if the vendor cannot get the supplies, the breakdown
of the machine, the sales crashes, he will not able to locate the inventory in
the warehouse.
Summarize how a problem-solving negotiation strategy could be used to renegotiate
the weaknesses and oversights identified in part F.
The
problem-solving negotiation technique is very useful for renegotiating the
weaknesses of which are identified before. Every business needs negotiation on
the recognized problems because these are the weaknesses of the company
business as well as the weaknesses of the system or the software because these
kinds of problems can damage and destroy the whole system as well as it can
also affect the workability of the system or business. The negotiation to solve
the problem is essential technique because some other kinds of unexpected
problems can also be identified that are most dangerous for the system. Furthermore,
the negotiation for renegotiating the problems is useful technique because you
can easily find the new problems as well as it can make the things easy for you
to implement the new system as well as making the business strategy better.
Recommend training to mitigate misunderstandings in cultural
communication that may arise between Endothon and the chosen outsourcing
vendor.
I recommend you to train for the
mitigation of misunderstandings within the cultural communication that may arise
among the Endothon. In the first step, you should avoid making or asses the
conclusion first, or you should avoid making any kind of judgments. Give
everyone time for speaking because sometimes the employees can give a very
strong reason or very strong points to overcome or avoidance from the
misunderstanding. The whole team along with the team leaders as well as the
managers must have to be united in the sense of vision and mission. You should
have to make your communication clear, straight as well as transparent because
most the misunderstandings are generated from the unclear communication.
Explain technical and security challenges related to the country where
your chosen vendor is located, including IT security, physical security, and
the protection of intellectual property.
The six kind of technical and the
security challenges exist related to the country where we have chosen the
vendor location including physical security as well as information
technological security such as the requirements of e-commerce, the data
breaches or system security attacks, the governmental legislation and laws as
well as the regulations of the industry, the shortage of the staff for the
information security, the immature security information market, as well as the wireless
computing and the workforce of mobile.