Download - Pharma Info Sys
Electronic Product Sale Logging System
Smith’s Pharmacy
Victor Amaya, Chris McCoy and Robert Berus
October 25, 2007
Table of Contents
1. EXECUTIVE SUMMARY..................................................................................................................................... 1
1.1. PURPOSE.............................................................................................................................................................11.2. BACKGROUND.......................................................................................................................................................11.3. INDUSTRY.............................................................................................................................................................11.4. VISION................................................................................................................................................................11.5. SCOPE.................................................................................................................................................................1
2. PROJECT CHARTER........................................................................................................................................... 1
2.1. PROJECT OBJECTIVES..............................................................................................................................................12.2. PROJECT CONCEPTION............................................................................................................................................12.3. PROBLEM STATEMENT............................................................................................................................................12.4. FINANCIAL RISK ANALYSIS.......................................................................................................................................12.5. INITIAL SCOPE OF THE PROJECT.................................................................................................................................12.6. PROJECT VISION....................................................................................................................................................12.7. BUSINESS CONSTRAINTS..........................................................................................................................................12.8. TECHNOLOGY CONSTRAINTS....................................................................................................................................12.9. PROJECT STRATEGY................................................................................................................................................12.10. PROJECT DOCUMENTATION AND COMMUNICATION...................................................................................................12.11. PROJECT ORGANIZATION AND STAFFING APPROACH...................................................................................................1
3. PROJECT VALUE STATEMENT........................................................................................................................... 1
3.1. BACKGROUND.......................................................................................................................................................13.2. VALUES...............................................................................................................................................................1
4. PROJECT STRATEGY STATEMENT..................................................................................................................... 1
4.1. METHODOLOGY OVERVIEW.....................................................................................................................................14.2. MEETING FREQUENCY............................................................................................................................................1
4.2.1. A-Team Project Development Meetings....................................................................................................14.2.2. Smith’s Pharmacy Client Update Meetings................................................................................................1
5. SYSTEM PROJECT METHODOLOGY................................................................................................................... 1
5.1. ELECTRONIC PRODUCT SALE LOGGING SYSTEM PROJECT METHODOLOGY.........................................................................15.1.1. Requirements............................................................................................................................................15.1.2. Design........................................................................................................................................................15.1.3. Implementation.........................................................................................................................................15.1.4. Verification................................................................................................................................................15.1.5. Maintenance.............................................................................................................................................1
6. GENERAL SYSTEM ANALYSIS............................................................................................................................ 1
6.1. CONTEXT MODEL..................................................................................................................................................16.2. EVENT LIST...........................................................................................................................................................16.3. EVENT DICTIONARY................................................................................................................................................1
Page | i
7. BUSINESS REQUIREMENTS AND RULES............................................................................................................ 1
8. TECHNICAL REQUIREMENTS AND ASSUMPTIONS.............................................................................................1
8.1. EXISTING LAN AND WAN......................................................................................................................................18.1.1. Network Operating System and Client PC Configuration...........................................................................18.1.2. WAN Infrastructure Overview....................................................................................................................18.1.3. LAN Infrastructure Overview.....................................................................................................................18.1.4. IT Equipment Rack Diagram......................................................................................................................1
8.2. POINT OF SALE SYSTEM..........................................................................................................................................18.3. TECHNICAL SUPPORT..............................................................................................................................................1
9. TECHNICAL PLATFORM AND TOOLS REQUIRED................................................................................................1
9.1. .NET FRAMEWORK 2.0...........................................................................................................................................19.2. VISUAL STUDIO 2005............................................................................................................................................19.3. WINDOWS SERVER 2003.......................................................................................................................................19.4. SQL SERVER 2005................................................................................................................................................19.5. CANDIDATE MATRIX...............................................................................................................................................1
10. THIRD-PARTY NEEDS..................................................................................................................................... 1
10.1. VENDORS...........................................................................................................................................................110.1.1. Dell..........................................................................................................................................................110.1.2. Microsoft.................................................................................................................................................110.1.3. IBM..........................................................................................................................................................110.1.4. Suppliers..................................................................................................................................................110.1.5. Consultants..............................................................................................................................................1
11. DATABASE/ERD MODEL................................................................................................................................. 1
12. DATA FLOW DIAGRAM.................................................................................................................................. 1
13. SYSTEM ARCHITECTURAL DIAGRAMS............................................................................................................. 1
14. PROJECT RISK AND RISK MANAGEMENT........................................................................................................1
14.1. RISK MANAGEMENT PLANNING..............................................................................................................................114.2. QUALITATIVE/QUANTITATIVE RISK ANALYSIS............................................................................................................1
14.2.1. Risk Response Planning...........................................................................................................................114.2.2. Monitoring and Control...........................................................................................................................1
15. PROJECT COSTS, STAFFING, RESOURCES, DEPENDENCIES AND SCHEDULE.......................................................1
15.1. BENEFITS...........................................................................................................................................................115.2. BILL OF MATERIALS..............................................................................................................................................115.3. TRIPLE COST ANALYSIS.........................................................................................................................................115.4. RETURN ON INVESTMENT ANALYSIS........................................................................................................................115.5. PROJECT SCHEDULE..............................................................................................................................................115.6. PROJECT STAFFING..............................................................................................................................................1
16. INTEGRATION OF INTERNAL/EXTERNAL SYSTEMS..........................................................................................1
Page | ii
17. SYSTEM ADMINISTRATION, SECURITY, BACKUP AND RECOVERY....................................................................1
17.1. POLICY..............................................................................................................................................................117.2. ACCOUNT MANAGEMENT.....................................................................................................................................117.3. ADMINISTRATIVE.................................................................................................................................................117.4. BACKUP RECOVERY OF NETWORK SERVERS AND DATA...............................................................................................117.5. MICROSOFT SQL SERVER 2005 BACKUP.................................................................................................................117.6. COMPUTER VIRUS PREVENTION.............................................................................................................................117.7. INCIDENT MANAGEMENT......................................................................................................................................117.8. INTERNET USE....................................................................................................................................................117.9. PASSWORDS.......................................................................................................................................................117.10. PHYSICAL ACCESS..............................................................................................................................................1
18. References.............................................................................................................................................................1
Page | iii
Table of FiguresFIGURE 1: FINANCIAL RISK ANALYSIS....................................................................................................................................1FIGURE 2: DEVELOPMENT METHODOLOGY OF THE APPLICATION OF THE ELECTRONIC PRODUCT SALE LOGGING SYSTEM......................1FIGURE 3: CONTEXT MODEL...............................................................................................................................................1FIGURE 4: EXISTING WAN ARCHITECTURE............................................................................................................................1FIGURE 5: EXISTING WAN ARCHITECTURE............................................................................................................................1FIGURE 6: RACK CONFIGURATION........................................................................................................................................1FIGURE 7: POINT-OF-SALE ARCHITECTURE AND CONNECTIVITY..................................................................................................1FIGURE 8: CANDIDATE MATRIX...........................................................................................................................................1FIGURE 9: ENTITY-RELATIONSHIP DIAGRAM...........................................................................................................................1FIGURE 10: DATA FLOW DIAGRAM......................................................................................................................................1FIGURE 11: PROPOSED SYSTEM ARCHITECTURE......................................................................................................................1FIGURE 12: ANNUAL COST AVOIDANCE................................................................................................................................1FIGURE 13: BILL OF MATERIALS..........................................................................................................................................1FIGURE 14: LIFE CYCLE COSTS............................................................................................................................................1FIGURE 15: ROI ANALYSIS.................................................................................................................................................1FIGURE 16: PROJECT STAFFING...........................................................................................................................................1FIGURE 17: INTEGRATION OF INTERNAL AND EXTERNAL SYSTEMS AND SERVICES..........................................................................1FIGURE 18: TAPE BACKUP ROTATION...................................................................................................................................1Figure 19: EMC Retrospect Configuration....................................................................................................................1
Page | iv
1. Executive Summary
1.1. PurposeThis purpose of this project is to provide a technological solution to the problem of manual logbook management of pseudoephedrine logging for a fictitious, small retail pharmacy chain located in the Ohio Valley area called Smith’s Pharmacy. This solution will help to provide data and systems needed to track across state lines while providing reporting capabilities and compliance with Federal regulations.
1.2. BackgroundSmith’s Pharmacy is a four-store retail chain located in the Ohio Valley area. The company operates stores in Cumberland, Maryland, Wheeling, West Virginia (where the management office and computer systems are also located), Washington, Pennsylvania and St. Clairsville, Ohio. These stores provide a business model based on traditional brick and mortar retail pharmacy, similar to those of its competitors, CVS Pharmacy, Rite Aid and Kroger. A more recent focus for Smith’s has been its log keeping activities related to sales of products impact by Pseudoephedrine legislation. Currently, Smith’s maintains its Pseudoephedrine logbooks manually, using a handwritten account of each sale. This is required to maintain compliance with State regulations in its Ohio and West Virginia locations. Specially, Smith’s must abide by statutes Ohio Revised Code, Section 2925.56 and WV 60A-10-5 governing requirements of controlled substances. Violations are severe. Both states impart a fine of violations; Ohio enforces a maximum of $1,000 and West Virginia $10,000. In addition, Ohio’s statues call for a jail sentence not to exceed 180 days.
1.3. IndustrySmith’s is a regional, small retail pharmacy chain. Its competitors include larger brick and mortar retail chains such as CVS and Kroger and mail order. Mail order is particularly troublesome for Smith’s in particular and the retail industry in general, because it allows consumers to obtain a 90-day prescription supply instead of one 30-day supply for each co pay. Since Smith’s is much smaller than these national chains and mail order pharmacies, gaining a competitive advantage in the marketplace is critical to its continued growth and success. For this project, the automation of the logbook function will provide an increase in productivity and customer satisfaction by reducing wait times in pharmacy lines. Keeping compliance is also critical to the continued success of the business by streamlining the audit processes and eliminating financial risks from non-compliance.
1.4. VisionWe envision a complete change in the way Smith’s tracks sales of pseudoephedrine-legislated items. Our solution will eliminate the current system of manual logging and each of the four stores will participate in an online-networked solution for tracking pseudoephedrine sales using an online logbook application that is auditable from a central data source.
1.5. ScopeThe scope of this project will include the following:
1. Design of a centralized database in the Wheeling, West Virginia office to serve as the repository for pseudoephedrine sales data.
2. Expand the existing WAN network infrastructure to support the new system. 3. Design of an application for each retail location that will collect pseudoephedrine sales data at
point of sale and provide a management reporting capability. 4. Project planning for implementation of the new information system. 5. End user training plan.
2. Project Charter
2.1. Project Objectives Create a unified infrastructure across the Smith’s retail pharmacy chain to track Pseudoephedrine
sales by replacing manual logbook tracking measures with an automated system. Increase Smith’s regulatory compliance capability by eliminating errors caused by manual log
keeping. Increase productivity for the business by reducing customer wait times related to the existing
manual logging procedure.
2.2. Project ConceptionThe A-Team Consultants envision a system for Smith’s pharmacy that will allow the organization to solve the problems of manual logbook tracking the sale of products containing pseudoephedrine, ephedrine or phenylpropanolamine by creating a scalable, automated system to replace the manual logbook with a high-tech, online solution. This solution can be used by pharmacists in each of Smith’s four locations to determine of sale of these products to an individual customer is within compliance of Federal and local regulations. If the company decides to open additional stores in other locations, it can quickly implement the system into the existing technology infrastructure.
2.3. Problem StatementSmith’s retail pharmacy stores must record identities of people who purchase over-the-counter pseudoephedrine products as a deterrent to methamphetamine manufacturing. Currently, Smith’s Pharmacy tracks this activity on a handwritten log, which presents the following issues
1. They are handwriting information.2. They are duplicating information (multiple purchases by the same person).3. They are not meeting privacy requirements because they log multiple sales on one page.4. They are unable to enforce the intent of the law because they have no immediate, ad-hoc
reporting capabilities at the time of sale, particularly across several locations.5. They are at financial risk from fines because of 3 and 4.
A solution is needed to replace the traditional logbook in order to provide longer-term (e.g., monthly, quarterly) reporting functionality across multiple locations and assure these stores meet compliance to avoid potential legal penalties.
2.4. Financial Risk Analysis
Figure 1: Financial Risk Analysis
2.5. Initial Scope of the projectThis project will implement an automated logbook system to track for Smith’s current chain of four retail locations in the greater Ohio Valley area. We will develop a system to track information from each location in a database located at the company’s central site in Store #1, located in Wheeling, West Virginia. The other three stores – located in Cumberland, Maryland, St. Clairsville, Ohio, and Washington, Pennsylvania – will have the same tracking application installed in each store. These systems will interface with the central database in Wheeling using the company’s existing network infrastructure.
2.6. Project VisionA-Team Consultants envisions a solution for Smith’s Pharmacy that will provide an automated tracking of pseudoephedrine sales data with a centrally managed database, and management reporting capability. The conversion from manual logs in each site to a single unified online system will provide a means to track pseudoephedrine sales across the chain of stores. The system should include a point of sale entry capability as well as a reporting module to provide statistical information regarding sales and compliance.
2.7. Business Constraints Training schedule may require additional overtime hours for employees. Implementation may require additional pre-deployment testing. Up front budget costs of Development, Systems Implementation (including all necessary
equipment), and Training may influence profitability until ROI is achieved. Willingness or resistance of employees to adapt to the new system might affect initial success of the
new system.
2.8. Technology Constraints Budget will be a consideration in terms of the quality and speed of the equipment.
Faster computer equipment comes at a higher cost.o Information Security Solutions are often expensive.o Budget for database and application development and testing is needed.o Time required to build the database and applications must be considered.
Time to test the new system will be needed to ensure stability and reliability. Implementation of high security measures for the information systems is critical to keep data private
and maintain regulatory compliance.
2.9. Project Strategy Expand existing network infrastructure to house new technology components. Build Database Application to include the following:
o User Interface Data Input Screeno Output Data (Purchase Approval Screen)o Database Reporting Screens
Test Application across WAN infrastructure at all four locations. Go-Live on approved/agreed date.
2.10. Project Documentation and CommunicationWe will document the project via a comprehensive project implementation plan. This plan will outline the details of the development and implementation of the new pseudoephedrine online tracking system. Communication throughout the life of the project will be in writing or in person between A-Team consultants and the client, Smith’s Pharmacy. A-Team will meet with the client once per week to provide progress status updates for the implementation. A-Team will also hold its own meetings once per week to verify progress.
2.11. Project Organization and Staffing ApproachA-Team Consultants will work closely with members of the Smith’s management team to identify business requirements related to the project, and to ensure that the project’s technical solution aligns well with Smith’s strategic business goals. A-Team’s three-member team owns expertise in the fields of Project Management, Network Engineering and Health Information Systems. The project team for A-Team will consist of a project manager and 2 technical consultants. The Smith’s management team will provide two subject matter experts to assist in ensuring that all technical initiatives meet compliance with local, state and federal regulations. We will provide training on the new system to all store managers, cashiers, pharmacists and pharmacy technicians.
3. Project Value Statement
3.1. Background Smith’s Pharmacy has continued to develop a loyal base of customers in Ohio Valley. There is great potential to grow this business in terms of both local customer base and new retail locations, provided the company utilizes the automated and centralized logbook solution. With potential expansion further into the surrounding areas it serves, a project of this nature holds great possibilities for creating a local competitive edge and greater competition with larger retailers such as CVS and Rite Aid. The value provided by the Smith’s chain is at great risk if it violates any local, state or federal laws regarding these products. Violations could negatively affect operations, placing the health of its customers at risk.
3.2. Values Increase logbook compliance through database automation. Increase customer satisfaction through reduced customer wait times. Decrease likelihood of fines and penalties through advanced reporting capability. Help reduce illegal methamphetamine production in the region through better enforcement and
accounting of pseudoephedrine sales within legal limits. Provide better store expansion capability through system scalability.
4. Project Strategy Statement
4.1. Methodology OverviewA-Team consultants will utilize the Waterfall project development model to complete the Electronic Product Sale Logging System project for Smith’s Pharmacy. Noting the original methodology as developed by W.W. Royce, A-Team will follow the prescribed sequential methodology consisting of the following phases as waterfall steps:
1. Requirements2. Design3. Implementation4. Verification5. Maintenance
A-Team will build the requirements phase of the development through information gathered from the client and the business requirements as defined in the business requirements section. Because this methodology incorporates a staged approach to systems development, it will provide a better structure for the development of the Electronic Product Sale Logging System for our client. This method is recommended for situations where the project has a clear objective and solution and resources need to be conserved (CMS, 2005).
4.2. Meeting Frequency
4.2.1. A-Team Project Development MeetingsThe A-Team Consultants will hold staff meetings regularly to review project updates and modifications as necessary. We will conduct weekly project meetings to review milestones for development, testing, and rollout schedule in a manner consistent with the aforementioned waterfall methodology.
4.2.2. Smith’s Pharmacy Client Update MeetingsWe will conduct weekly status meetings with the Smith’s Pharmacy management team, using the client’s preferred meeting method. This may include web conferencing, conference calls or face to face on site. Each meeting will review the project milestones and schedule to keep the project on track for timely delivery of the new system. The project team will report any unanticipated project issues or delays to Smith’s Pharmacy management immediately.
5. System Project Methodology
5.1. Electronic Product Sale Logging System Project MethodologyThe Electronic Product Sale Logging System will use the Waterfall methodology to development of the new systems through each phase of the project and system lifecycles. A-Team will follow the prescribed sequential methodology consisting of five steps. The diagram below shows the standard Waterfall methodology.
Requirements
Design
Implementation
Verification
Maintenance
Figure 2: Development Methodology of the Application of the Electronic Product Sale Logging System
5.1.1. RequirementsWe will build a list of business requirements through close collaboration with Smith’s management team.
5.1.2. DesignBased on business requirements, we will compose logical and physical designs.
The project team will transform the company’s business requirements into a high-level business plan from which we will create the logical plan. The following steps are required:
1. Create Use Cases based on Business Requirements2. Create Data Flow Diagrams to show the flow of information through the model3. Create Data Model from which the physical database can be created
The technical plan for the project will transform business requirements into a physical design. We will use these solutions for several critical design milestones:
1. The design of the application, including the user interface2. The design of the database including all tables, schemas and structures3. Analysis of the existing network LAN/WAN infrastructure to verify data capacity requirements4. The integration of an additional application server running the database and application system
software5. The project planning required for implementation of such solutions
5.1.3. ImplementationBased on the final design and project scheduling, we will present a detailed plan for rollout of the technologies for Smith’s Pharmacy management team. Once the management team has approved such implementation, A-Team Consultants will complete a test of the entire system and all functionality prior to rollout of the system for daily production. The goal of a successful implementation will be to complete the rollout with minimal impact or interruption to business during the process.
5.1.4. VerificationCritical to the success of the rollout for this system will be pre-production testing. The following items are critical to the success of the verification phase:
1. Network capacity testing between all four sites2. Network security testing3. Application/Database testing using sample data files4. Database Management Report Testing
5.1.5. MaintenanceThe solution will utilize regular maintenance windows for the following purposes:
1) Dailya) Database Backup to Tapeb) System OS and Image backups to tapec) Ongoing break/fix maintenance as needed for all hardware, software and applications
2) Quarterlya) Application Upgradesb) Security Patchesc) Regularly Scheduled Database Maintenance d) Network upgrades as required
6. General System Analysis
6.1. Context Model
Electronic LogbookLogbook Database
Store & ReceiveProduct Info
Store & Receive Customer Info
Customer
Seller(Clerkr/Pharmacist )
IT Department
State & Federal Regulators
Store Supervisor
A-Team Consultants
Bar Code Reader
AuthorizationResponse
Approval for Purchase/Return
Request
Manual Customer and Seller Data Input
Purchase Request
Signature/Complete Purchase
Automatic Customer Data Input
Purchase Approval
Response
Updates/Upgrades
Maintenance/Updates
Printer
Output Notice/Alert
Signature Capture Pad
CustomerSignature
Figure 3: Context Model
6.2. Event list1. Add/Update Customer information
2. Add/Remove Product3. Process product returns4. Calculate state and federal limitations of product sale and generate alerts/notices5. Add/Remove Transaction information (date/time, location, clerk name, product name, quantity)6. Product summary reports
6.3. Event dictionaryEvent Name: Add/Update Customer to database
Event ID: 1Description: When a customer wants to purchase a product, the customer’s information must be
entered into the database.Stimulus: Customer wants to purchase a productActivity: If user does not exist in the database, then add a record of that customer into the
database. If customer is purchasing a product, verify whether it is more or less than 60mg of
PSE. If it does not, no signature is required. If it is, generate a printable notice warning.
If Customer is returning a product, adjust transaction record in database.Response: User Added/Updated.Effect: If there are no alerts/notices, the customer is able to continue transaction
Event Name: Add/Remove Product to database Event ID: 2
Description: When a customer wants to purchase a product, the product’s information must be entered into the database.
Stimulus: Customer wants to purchase a productActivity: If the product does not exist in the database, then add a record for that product
into the database. Update product inventory. If customer is purchasing a product, verify that it is available from Product
Inventory. If it is available, verify the quantity being sold and update product inventory.
If Customer is returning a product, add new transaction and update product inventory.
Response: Product recorded.Effect: If there are no alerts/notices, the customer is able to purchase the product.
Event Name: Add Process product returnsEvent ID: 3
Description: After a customer has purchased a product, they can return it using this feature.Stimulus: Seller enters transaction number, name and address in return screen.Activity: The system verifies if the return is valid and requires approval of supervisor. If it is,
then add new transaction and update inventory.Response: Return is processed.Effect: Adjusted Transaction/Product details
Event Name: Calculate state and federal limitations of product sale and generate alerts/notices Event ID: 4
Description: After a customer submits a purchase, this feature verifies if the purchase can complete.
Stimulus: Seller inputs customer and product information on purchase screen.Activity: The system verifies the sale against federal and state regulations. If a violation
occurs, a notice and warning is displayed in a message box. If not violation occurs, the purchase can be completed.
Response: Purchase is processed.Effect: If there are no alerts/notices, the customer is able to purchase the product.
Event Name: Add/Remove Transaction (date/time, location, seller name, product name, quantity) Event ID: 5
Description: When a customer purchases a product a transaction is recorded into the database.
Stimulus: Customer submits purchase request
Activity: Create a record in transaction table with date/time, location, product name and quantity of sale and seller name.
If the customer is making a purchase, verify that customer is eligible and the quantity is within state and federal limitations. If eligible record transaction details in database
If customer is returning a product, mark returned item into transaction database.Response: If there are no alerts/notices, the customer is able to purchase the product.
Event Name: Product summary reports Event ID: 6
Description: Produces reports per query specified by seller, state or federal regulators.
Stimulus: Seller or regulator enters query information into reporting screen.
Activity: Return query results and display in web page for view. The results are adjusted so they are in print format.
Response: Processed Query results.
7. Business Requirements and RulesUse Case Name 1. Process Transaction
Scenario Process new saleTriggering Event Customer attempts to purchase a controlled productBrief Description When the customer wishes to purchase a product controlled by
Methamphetamine law, the sale must be logged and validated against sale restrictions.
Actors Store employeeRelated Use Cases
Stakeholders Customer wants to buy product. Pharmacist wants to sell product. Company wants to remain compliant with applicable laws Regulatory bodies want to control distribution of controlled
productsPre-conditions Customer must exist in audit tool.
Product, Product Category records must exist.Post-conditions Transaction record must be created.
Use Case Name 1. Process Transaction (continued)Flow of Events Actor System
1. Customer goes to pharmacy counter to purchase desired product.
2. Pharmacist identifies product requested by customer.
3. Pharmacist collects government-issued (State or Federal) identification from customer.
4. Pharmacist initiates a new transaction in the existing P.O.S. system.
5. Pharmacist scans or manually enters UPC for desired product.
6. Pharmacist scans or manually enters unique customer identifier from I.D.
7. Pharmacist completes sale per S.O.P.
4.1. P.O.S. begins a new transaction journal entry.
5.1. P.O.S. retrieves item details.5.2. Flag in P.O.S. controller
indicates transaction must flow through real-time audit process.
6.1. P.O.S. system passes Product and Customer parameters to audit program for validation.
6.2. P.O.S. system adds line item to transaction if audit passes.
7.1. P.O.S. logs transaction details to audit system.
Exception Conditions 3.1. If customer cannot provide proper identification, no transaction is performed.
6.3. If customer does not exist, prompt Pharmacist for customer demographic information.
6.4. If customer demographic information is not correct, Pharmacist completes transaction per S.O.P, then invokes 2. Maintain Customer.
7.1. If audit control program flags sale as invalid, P.O.S. system voids line.
Use Case Name 2. Maintain CustomerScenario Update customer demographic data
Triggering Event Customer demographic data needs updated.Brief Description When a customer’s demographic data needs updated, the
Pharmacist must update it via a web portal.Actors Store employee
Related Use CasesStakeholders Company wants to remain compliant with applicable laws
Regulatory bodies want to control distribution of controlled products
Pre-conditions Customer must existPost-conditionsFlow of Events Actor System
1. Pharmacist collects government-issued (State or Federal) identification from customer.
2. Pharmacist logs into web portal
3. Pharmacist enters maintain customer screen.
4. Pharmacist locates existing customer record.
5. Pharmacist updates necessary attributes.
6. Pharmacist saves updates.
1.
Exception Conditions
Use Case Name 3. Add Product CategoryScenario Create a new product category
Triggering Event Legislative changes require new tracking methodBrief Description Applicable laws require sellers to track the sales of certain products
specific ways and limit them specific quantities. Product Categories allow the company to specify business rules that adhere to the appropriate laws any particular location must meet.
Actors Company auditorRelated Use Cases
Stakeholders Company wants to remain compliant with applicable laws Regulatory bodies want to control distribution of controlled
productsPre-conditions
Post-conditions Existing and new Products must be associated with the new Product Category.
Flow of Events Actor System1. Auditor identifies the need
for a new Product Category.2. Auditor identifies the
appropriate constraints/business rules for this Product Category.
3. Auditor logs into web portal.4. Auditor enters add Product
Category screen.5. Pharmacist enters necessary
attributes.6. Pharmacist saves new
Product Category.6.1. System creates a new
Product Category record. The new Product Category is made available for use.
Exception Conditions
Use Case Name 4. Maintain Product CategoryScenario Maintain an existing product category
Triggering Event Legislative changes require modified tracking methodBrief Description Applicable laws require sellers to track the sales of certain products
specific ways and limit them specific quantities. Product Categories allow the company to specify business rules that adhere to the appropriate laws any particular location must meet. This Use Case also represents instances wherein a Product Category is no longer legislated for controlled sales.
Actors Company auditorRelated Use Cases
Stakeholders Company wants to remain compliant with applicable laws Regulatory bodies want to control distribution of controlled
productsPre-conditions
Post-conditions Existing and new Products must be associated with the updated Product Category.
Flow of Events Actor System1. Auditor identifies the need
to modify an existing Product Category.
2. Auditor identifies the appropriate constraints/business rules for this Product Category.
3. Auditor logs into web portal.4. Auditor enters Maintain
Product Category screen.5. Pharmacist modifies
necessary attributes.6. Pharmacist saves updates.
6.1. System updates existing Product Category record.
Exception Conditions
Use Case Name 5. Add ProductScenario Add a product to the audit program
Triggering Event Legislative changes require new tracking method New product received Correction
Brief Description Applicable laws require sellers to track the sales of certain products specific ways and limit them specific quantities. Product Categories allow the company to specify business rules that adhere to the appropriate laws any particular location must meet.
Actors Company auditorRelated Use Cases
Stakeholders Company wants to remain compliant with applicable laws Regulatory bodies want to control distribution of controlled
productsPre-conditions Product Category must exist.
Post-conditionsFlow of Events Actor System
1. Auditor identifies the need for a new Product tracking.
2. Auditor identifies the appropriate Product Category.
3. Auditor logs into web portal.4. Auditor enters add Product
screen.5. Pharmacist assigns desired
Product Category.6. Pharmacist saves new
Product.6.1. System creates a new
Product record. Exception Conditions 5.1. If Product Category does not exist, user pauses this use case
and invokes 3. Add Product Category.
Use Case Name 6. Maintain ProductScenario Maintain an existing product
Triggering Event Legislative changes require modified tracking method Correction
Brief Description Applicable laws require certain products to be tracked in specific ways and limited to specific quantities of sales. Product Categories allow the company to specify business rules that adhere to the appropriate laws any particular location must meet.
Actors Company auditorRelated Use Cases
Stakeholders Company wants to remain compliant with applicable laws Regulatory bodies want to control distribution of controlled
productsPre-conditions
Post-conditionsFlow of Events Actor System
1. Auditor identifies the need to modify an existing Product.
2. Auditor identifies the appropriate changes.
3. Auditor logs into web portal.4. Auditor enters Maintain
Product screen.5. Pharmacist modifies
necessary attributes.6. Pharmacist saves updates. 6.1. System updates existing
Product record. Exception Conditions 1.1. If product has had ingredient changes necessitating change, the
Product Specialist should inactive the existing item code in the company’s P.O.S. system, a new item number created and the U.P.C. linked to the new product. Then, a new Product record should be created via the 5. Add Product Use Case.
Use Case Name 7. Generate Summary ReportsScenario Report needed
Triggering Event Information neededBrief Description Process to generate reports.
Actors Company auditor, or Pharmacist, or Store Management
Related Use CasesStakeholders Company wants to remain compliant with applicable laws
Regulatory bodies want to control distribution of controlled products
Pre-conditionsPost-conditionsFlow of Events Actor System
1. User identifies the desired report.
2. User logs into web portal.3. User enters Reports screen.4. User selects appropriate
report and enters necessary criteria.
5. User views report.
4.1. System queries database, assembles report and displays in web browser.
Exception Conditions
8. Technical Requirements and AssumptionsSmith’s Pharmacy currently owns a networked point-of-sale (POS) sales entry system. The company purchased the system from IBM to improve the checkout process for the organization. A 100Mb LAN connects the POS systems within each of the four locations and a WAN provides e-mail connectivity and internet access across a secured MPLS network from the centralized firewall located in the Wheeling store. A more detailed description of the existing network is provided in the next section.
8.1. Existing LAN and WAN
8.1.1. Network Operating System and Client PC ConfigurationSmith’s Pharmacy uses a small Microsoft Windows Active Directory (AD) Domain running on Windows 2003 Server. This server also provides DNS support required for connectivity of the AD domain, clients and the Microsoft Exchange e-mail server. Clients (Management PC’s) are configured with the Windows XP operating system running Service Pack 2; Microsoft Outlook 2003 is used for e-mail, contact and schedule management.
8.1.2. WAN Infrastructure OverviewSmith’s Pharmacy utilizes a Sprint Multiprotocol Label Switching Wide Area Network (MPLS) consisting of dual T1 connections to each store. The Wheeling store hosts the e-mail server and serves as a central proxy point for Internet Web Browsing. All web browser requests traverse the MPLS to the Wheeling Store where a Checkpoint FW-1 firewall running on a Dell 1850 1U rack-mount server handles packet-forwarding decisions. This firewall limits inbound access to HTTP (Web browsing) and SMTP (e-mail) requests. E-mail traffic also traverses the same MPLS cloud for the remaining stores.
The MPLS WAN provides a controlled secure network environment and protects data traffic between stores from compromise by unauthorized third parties. The diagram below contains a high-level view of the overall WAN network connectivity. The POS System utilizes the LAN for connectivity to a central POS controller in each store. The company utilizes the MPLS to manage all locations’ POS systems using specialized management software.
Figure 4: Existing WAN Architecture
8.1.3. LAN Infrastructure OverviewThe following diagram shows a more detailed view of Smith’s Pharmacy LAN architecture in each store and the physical connectivity of the WAN routers. Note that this diagram also includes one additional Dell server the company will need to purchase for the application and database implementation. This diagram also includes a backup circuit for business continuity. A tape backup system using a single internal mammoth two-tape drive on the Windows 2003 AD domain controller server running EMC Retrospect backup software Data backups are handles data backup. The current daily full system backup has approximately 70% available capacity on the existing tape drive to handle additional data.
Figure 5: Existing LAN/WAN Architecture
Each site is connected to the MPLS via a Dual T1 (bundled) 3Mb connection. The backup (failover) circuit is an ISDN 384k line, with a standard vendor agreement in place for a per-usage based charge. As previously mentioned, the Wheeling site is the primary IT location for server support. Here, the e-mail server handles all e-mail for the stores. A separate, dual T1 configuration handles the Internet Web Browsing requests from all sites.
8.1.4. IT Equipment Rack Diagram This section shows each store’s rack configuration. The single rack configuration in each location provides a simple effective solution that occupies minimal space in the computer room in the back of the each store. An air conditioner cools the room to a constant temperature of 70 degrees Fahrenheit to protect the IT equipment. A-Team consultants will utilize this existing infrastructure to support the Electronic Product Sale Logging System. The MPLS as a means of cross-site communication will provide a secure solution for transfer of the data from all sites to the database located in the Wheeling store.
Figure 6: Rack Configuration
8.2. Point of Sale SystemSmith’s Pharmacy utilizes IBM’s ‘Sure POS 300 Series’ point of sale system. IBM describes the Model 300 system as a “cost effective solution to managing cash register transactions in each of its four locations” (IBM, 2005). Each store’s POS system is capable of operating at the current 100Mbps LAN speed. The systems are thick-client based PCs, running Windows XP Professional with Service Pack 2. The POS terminals are connected to a POS Controller, which tracks transactions and inventory across the LAN. Additionally, the company can remotely audit each controller using IBM’s remote management software. IBM describes this system as having an “open platform with broad operating system support.” This provides a user-friendly computing environment with scalability for future growth of the business. As shown in the diagram below, management can audit all four locations across the MPLS WAN from any other location. Each store location has four terminals in the front of the store checkout area and one terminal to service the pharmacy counter.
Figure 7: Point-of-Sale Architecture and Connectivity
8.3. Technical SupportSmith’s has existing technical support in place for the following systems:
WAN – MPLS via Sprint, the MPLS service provider for the organization’s WAN. LAN – Sprint Business Services, including all Cisco LAN hardware, and PC’s:
(Sprint, 2007) POS – Support contract with IBM on all IBM POS equipment Tape Backup – EMC provides technical support for Retrospect Software. Smith’s Pharmacy store
management in the Wheeling Store handle the changing of daily backup tapes and are trained on the administration of the Tape backup software.
9. Technical Platform and Tools Required
9.1. .Net Framework 2.0We will target Microsoft’s .NET Framework, version 2.0, to facilitate the development of the proposed solution. The framework provides many precompiled software components that implement functionality commonly used by developers, and many available programming languages. Amongst these are user interface elements, web application features and database connectivity. Additionally, the framework facilitates code-reuse and language interoperability, thereby streamlining development time, future maintenance and testing requirements. Our primary advantage of targeting the .Net Framework will allow us to reuse the data connectivity code between the web portal and the point-of-sale system.
9.2. Visual Studio 2005 A-Team Consultants will use Microsoft’s Visual Studio 2005 to create the necessary interfaces for the proposed solution. Visual Studio 2005 targets version 2.0 of Microsoft’s .Net Framework, streamlining application development for a multitude of platforms. It provides support for database connectivity and websites, allowing developers to create all content from one development environment.
9.3. Windows Server 2003We have selected Microsoft’s Windows Server 2003 operating system as the server platform for our solution. It seamlessly integrates .NET Framework 2.0, provides security, reliability and performance benefits and completes the unified system architecture desired for this project. Importantly, Windows Server 2003 includes Internet Information Services 6, allowing the use of ASP.NET applications using .NET Framework 2.0 developed with Visual Studio 2005. It provides a stable and secure host platform for our database management system.
9.4. SQL Server 2005Microsoft’s SQL Server 2005 will provide the back-end data structures and decision logic systems for use in the proposed solution. It provides a comprehensive, integrated data management and analysis package that enables organizations to reliably manage mission-critical information and confidently run today’s increasingly complex business applications. SQL Server 2005 provides scalable product offerings to allow the organization to meet its needs in a cost effective manner. Also, it provides several connectivity options for basic and advanced reporting and analysis features via third-party applications, such as Microsoft’s Access 2007. Clearly, the use of .NET, Visual Studio, Windows Server 2003 and SQL Server 2005 creates a complete and robust architecture that meets the needs of the organization.
9.5. Candidate MatrixCharacteristics Candidate 1 Candidate 2 Candidate 3
Portion of System Computerized
New Client/Server web application logbook system.
Same as Candidate 1. Same as Candidate 1.
Benefits Web application would be independent of all current systems. All technology is available.
Web application is independent of current systems. System framework is already in place, needing only configuration and light visual enhancements.
System would be fully integrated with current (or enhanced) systems. Great Plains Solutions Provider would manage all technical requirement and implementation.
Servers and Workstations
Microsoft Windows 2003 servers and IIS 6.
Microsoft SQL Server 2000/2005.
Workstations use Microsoft Windows 2000/XP OS.
Microsoft Windows 2003 servers and IIS 6.
Oracle 9i.
Workstations use Microsoft Windows 2000/XP OS.
Microsoft Windows 2003 servers and IIS 6.
Microsoft SQL Server 2005.
IBM POS systems integration.
Workstations use Microsoft Windows 2000/XP OS.
Software Tools Needed
Microsoft Visual Studio 2005
.Net Framework 2.0.
Microsoft Visual Studio 2005
.Net Framework 2.0.
Microsoft Visual Studio 2005
.Net Framework 2.0.
Application Software
Custom solution built by IBM products integrated into current IBM POS system.
Custom solution built by Oracle Business Suite products integrated into current IBM POS system.
Custom solution built by the Microsoft products integrated into current IBM POS system.
Method of Data Processing
Client/Server. Same as Candidate 1. Same as Candidate 1.
Output Devices and Implications
Laser and Bar Code printers.
Same as Candidate 1. Same as Candidate 1.
Input Devices and Implications
Keyboard, mouse and bar code reader.
Same as Candidate 1. Same as Candidate 1.
Storage Devices and Implications
Microsoft SQL Server DBMS with 10 GB storage.
Oracle 9i DBMS with 10 GB storage.
Same as Candidate 1.
Figure 8: Candidate Matrix
10. Third-Party NeedsA-Team focuses on delivering a complete range of cost-effective services tending to our customer’s requirements. We provide support prior and post sale support through comprehensive after sale maintenance and support to ensure our client’s investment. A-Team undertakes all software planning and development in-house to maintain the privacy and integrity of our customers. A-Team does not associate with external partners, suppliers or consults.
Smith’s Pharmacy has presented its current systems in place to our team; therefore, A-Team will focus on tailoring software requirements to meet those specifications. Smith’s Pharmacy will need to acquire additional hardware and software for the implementation of the logbook application.
10.1. Vendors
10.1.1. DellDell Inc. (Dell) designs, develops, manufactures, markets, sells and supports a range of computer systems and services that are customized to customer requirements (Reuters, 2007). These include enterprise systems (servers, storage, workstations and networking products), client systems (notebook and desktop computer systems), printing and imaging systems, software and peripherals, and global services. The Company markets and sells its products and services directly to its customers, which include corporate, government, healthcare and education accounts, as well as small-to-medium businesses and individual customers.
10.1.2. MicrosoftMicrosoft Corporation develops, manufactures, licenses and supports a range of software products for computing devices (Reuters, 2007). The Company's software products include operating systems for servers, personal computers (PCs) and intelligent devices, server applications for distributed computing environments, information worker productivity applications, business solution applications, high-performance computing applications and software development tools. The Company has five segments: Client, Server and Tools, the Online Services Business, the Microsoft Business Division, and the Entertainment and Devices Division. The type of licensing for Microsoft Windows Server 2003 and SQL Server 2005 will need to be identified and purchased depending on the needs for the logbook application
10.1.3. IBMInternational Business Machines Corporation (IBM) is an information technology company. IBM also provides business, technology and consulting services. The Company's major operations comprise a Global Services segment, a Systems and Technology Group, a Software segment and a Global Financing segment. (Reuters, 2007) IBM offers five kinds of software solutions. The Company's software offerings include Information Management Software, an advanced database and content management software solutions that enable clients to leverage information on demand; Lotus Software, a collaboration and
messaging software that allows businesses to communicate, collaborate and increase productivity; Rational Software, an integrated tools designed to improve an organization's software development processes and capabilities; Tivoli Software, a software for infrastructure management, including security, change, configuration, job scheduling, storage capability, performance and availability, and Websphere Software, which provides management of a range of business processes using open standards to interconnect applications, data and operating systems.
IBM provides a range of services, which includes Business Performance Services (BPS), Business Transformation Outsourcing (BTO), Consulting and Systems Integration (C&SI), Strategic Outsourcing Services (SO), Integrated Technology Services (ITS), Application Management Services and Applications on Demand (AoD). BTO delivers improved business results to clients through the strategic change and the operation and transformation of the client's business processes, applications and infrastructure. ITS provides service offerings that help clients access, manage and support their technology infrastructures, through a combination of resources, software and IBM's knowledge of business processes. C&SI provides consulting services for client relationship management, financial management, human capital, business strategy and change and supply chain management, as well as application innovation and the transformation of business processes and operations.
10.1.4. SuppliersNo additional will be needed.
10.1.5. ConsultantsNo additional will be needed.
11. Database/ERD Model
Transactions
PK TransactionId CHAR(24)
Timestamp DATETIMEFK2 CustomerId LONGFK1 ProductId LONG
QtySold LONGVoided BIT
Customers
PK CustomerId COUNTER
StateId CHAR(10)State CHAR(2)StreetAddress 1 CHAR(50)StreetAddress2 CHAR(50)City CHAR(30)PostalCode CHAR(10)
Products
PK ProductId COUNTER
UPC CHAR(18)FK1 ProductCategoryId LONG
Size DOUBLE
ProductCategories
PK ProductCategoryId COUNTER
Description CHAR(50)State CHAR(2)TrackSales BITSizeLimit DOUBLE
assigned to
makes
sold on
Figure 9: Entity-Relationship Diagram
12. Data Flow Diagram
Pharmacist
1.Process
Transaction
Pro
cess
Tra
nsac
tion
Sal
e O
k R
espo
nse
Customers
Transactions
Products
Product Categories
2.Maintain
Customer
Changes required
Update Ok
Company auditor
3.Add/update
Product Category
Changes required
Update Ok
4.Add/update
Product
Cha
nges
req
uire
d
Upd
ate
Ok
Figure 10: Data Flow Diagram
13. System Architectural DiagramsThe Electronic Product Sale Logging System will tie into the existing IBM POS System. The diagram below shows a high-level view of the overall system.
Figure 11: Proposed System Architecture
As indicated in the diagram, the POS Controllers will interface with the new database application to provide a real-time ephedrine logging process, which will initiate from the POS terminal. The transaction process will be coordinated between the POS controller and the database to provide approvals, log transactions and track customer specific purchase information to maintain compliance with regulatory officials. Management can use its existing PCs to generate reports via the POS controllers, which will pull data from the database server in Wheeling.
14. Project Risk and Risk ManagementA-Team strives to integrate consistent practical risk management and loss management standards of the highest quality into all our business processes. We firmly believe in our ability to develop strategies to manage and mitigate risk if in case it should arise. The following, are the processes to manage project risks:
Risk Management Planning Risk Identification Qualitative/Quantitative Risk Analysis Risk Response Planning Monitoring and Control
The purpose of these processes is to influence the probability and impact of risks.
14.1. Risk Management PlanningWe have identified possible risks associated with the Electronic Logbook Application and prioritized them whereby the risks with the greatest loss and the greatest probability of occurring are tended to first and risks with a lower probability of occurrence are tended to in descending order.
Risk component
Environmental Variable
Impact Probability Risk Response
Scheduling and Budget Risks
Unrealistic project schedule delays
Moderate High Implement Further Actions to Reduce Risk; Continue Existing Controls; Generate Contingency Plan; Review at least every 3 Months
Unrealistic project budget overrun
Significant High Take Immediate Further Remedial Action to Reduce Risk; Contingency plan on standby; Review at least Monthly
Project canceled prior to completion
Significant Medium Quickly Implement Further Actions to Reduce Risk; Continue Existing Controls; Generate Contingency Plan; Review at least every 2 Months
System Functionality Risks
Developing wrong user interface
Minor Medium Tolerate; Continue existing Simple Control Measures; Review at least every 6 Months
Develop wrong software functions
Minor Low Tolerate; No action: Continue Control if Required; review at least Annually
Real-time performance shortfalls
Moderate Very High Quickly Implement Further Actions to Reduce Risk; Continue Existing Controls; Generate Contingency Plan; Review at least every 2 Months
Requirements Management Risks
Unmet user requirements
Moderate High Implement Further Actions to Reduce Risk; Continue Existing Controls; Generate Contingency Plan; Review at least every 3 Months
Gold Plating Minor Very Low Tolerate; No action: Continue Control if Required; review at least Annually
Continuous requirement changes
Significant Very High Take Immediate Further Remedial Action to Reduce Risk; Contingency plan on standby; Review Continuously
Resource Usage And Performance Risks
Hardware/Software technology upgrades
Minor Very Low Tolerate; No action: Continue Control if Required; review at least Annually
Straining computer science capabilities
Moderate Medium Tolerate; Continue existing Control Measures; Possible Contingency Plan; Review at least every 4 months
Personnel Management Risks
Insufficient expertise and expectations for personnel
Significant Low Tolerate; Continue existing Control Measures; Possible Contingency Plan; Review at least every 4 months
Personnel shortfalls Significant High Take Immediate Further Remedial Action to Reduce Risk; Contingency plan on standby; Review at least Monthly
Project manager’s training/Experience
Significant Very Low Tolerate; Continue existing Control Measures; Possible Contingency Plan; Review at least every 4 months
* The Probability is identified as 'Very Low', 'Low', 'Medium', 'High' and 'Very High’. However, it must be considered that very low probabilities may not be very reliable.
Green - minor, no harm event or near miss, requires no follow-upYellow - moderate event or near miss, requires local management actionRed - significant event or near miss, requires senior management attention
14.2. Qualitative/Quantitative Risk AnalysisQualitative risk analysis is the cost-effective process of assessing the impact and likelihood of identified risk. It prioritizes risks according to their potential effect on project objectives.
Quantitative risk analysis is the process of numerically rating the probability of each risk and its consequence on project objectives.
14.2.1. Risk Response PlanningThis process employs a number of different techniques to reduce and mitigate risk on projects (Stoeller, 2003):
Risk acceptance - project team decides not to change project plan and “accepts” the risk. Active acceptance includes developing a contingency plan. Passive acceptance leaves project team to deal with risk if it occurs.
Risk avoidance - involves changing the project plan to eliminate the risk such that the risk no longer exists.
Risk mitigation - involves a mix of techniques aimed at either reducing the probability or impact of a risk.
Risk transfer - involves transfer of ownership of the risk to another party with the right skills that is available.
Risk reserves are buffers in our schedules and budgets set aside for alligators or puppies.
14.2.2. Monitoring and ControlThis process monitors newly arising risks, and tracks existing risks and trigger conditions during the project lifecycle. Project managers perform this process in order to determine:
Determine if risk responses were implemented as planned. Determine if response actions are as effective as expected. Determine if project assumptions are still valid. Determine if risk exposure has changed. Determine if a risk trigger has occurred. Determine if an unidentified risk has occurred (Holtzman, 2004).
15. Project Costs, Staffing, Resources, Dependencies and Schedule
The Cost Analysis presents the costs for materials, design, development, testing, training, implementation and maintenance for the system to be developed. It is expected that each team member will work a 40 hour week.
For this release the expected budget is $35,555.12.
15.1. BenefitsThe primary projected benefit of the new system is the cost avoidance of the salaries of the pharmacy staff currently doing this effort. The secondary benefit is the efficiency, speed and accuracy of the reports. The system will provide the tracking reports on the first day of the new month rather than inconsistent days into the month as prior. Accuracy in the data stored will vastly improve due to elimination of most manual errors currently entered.
The primary benefit is the current cost to Smith’s of the personnel manually entering data. Per our meetings and reports provided by Smith’s, it’s apparent that about 25% of an employee’s time is spent manually entering data and trying to validate it in-case it isn’t legible. Therefore, we estimate that 75% of the time for each of Smith’s locations would be available for other duties. We anticipate that the proposed solution will eliminate approximately 20% of the current effort. Therefore, the annual cost avoidance of each store will be equal to 20% of the annual cost of an employee’s salary.
Annual Burdened Cost (BC) Cost Avoidance Factor (CA) # of Workers Annual Cost Avoidance
$70,000 0.20 10 $140,000
Figure 12: Annual Cost Avoidance
15.2. Bill of MaterialsThis section provides a bill of materials elements required for Smith’s Electronic Product Logging System.
Component Description Quantity Price
Dell PowerEdge 1950 Server
Dual Core Intel® Xeon® 5148LV, 4MB Cache, 2.33GHz, 1333MHz FSB,ES, Windows Server® 2003 R2, Standard Edition with SP2, Includes 5 CALs
1 $3,537.37
Microsoft Windows Server 2003
Server management operating system. 1 *Free
Microsoft Visual Studio .Net 2005
Development software for applications, websites, service, etc. 1 $0
Microsoft SQL Server 2005 Express
SQL Server Management Studio Express, for easily managing a database. 1 Free
Totals $3,537.37
*Windows Server 2003 is included with Dell PowerEdge 1950 Server
Figure 13: Bill of Materials
15.3. Triple Cost AnalysisThree alternatives were considered for developing, designing and maintaining the new system. The alternatives and their estimated present value costs for a year are as follows.
Minimal Alternative - $26,068. This solution focuses on rapid project delivery date and minimal training costs.
Recommended Alternative - $32,018. This solution focuses on the best project delivery schedule, minimal delays and interference with current work.
Maximum Alternative - $55,959. This solution focuses on maximum benefits for the new system with an extended schedule life.
Figure 14: Life Cycle Costs
Life Cycle Costs of Project Alternatives
MinimalAlternative
RecommendedAlternative
MaximumAlternative
Define Requirements $1,928 $2,689 $7,035
Designs Costs $4,459 $6,139 $10,400
Development Costs $8,660 $9,740 $12,640
Testing Costs $4,988 $5,698 $12,480
Training costs $1,768 $1,829 $4,440
Implementation Costs $4,265 $5,924 $8,964
Warranty Costs $0 $0 $0
Total Life Cycle Costs $ 26,068 $32,018 $55,959
15.4. Return on Investment Analysis
Figure 15: ROI Analysis
15.5. Project Schedule1. Requirements
1.1. Document Requirements1.2. Requirements Review1.3. Approve Requirements1.4. Milestone: Requirements Defined
2. Design2.1. Develop Design2.2. Design Review2.3. Approve Design2.4. Milestone: Completed Design
3. Development3.1. Develop Database Components3.2. Develop Web Components3.3. Develop POS Terminal Components3.4. Unit Testing3.5. Code Review3.6. Milestone: Development Complete
4. Testing4.1. Write Test Scripts4.2. Test Script Review4.3. Approve Test Scripts4.4. Milestone: Test Scripts Developed4.5. Setup Test Environment4.6. Perform Functional Testing4.7. Review Results4.8. Approve Results4.9. Milestone: Testing Complete
5. Training5.1. Reset Testing Environment5.2. Develop Training Plan5.3. Train Plan Review5.4. Approval Training Plan5.5. Milestone: Training Plan Document5.6. Perform Training5.7. Training Teachback5.8. Milestone: Training Complete
6. Implementation6.1. Hardware Installation
6.1.1.Procurement6.1.2.Configuration6.1.3.Test6.1.4.Milestone: Hardware Installed
6.2. Software Installation6.2.1.Install SQL Server 20056.2.2.Install IIS
6.2.3.Update POS Terminals6.2.4.Perform Smoke Test
6.3. Milestone: Installation Complete7. Warranty Contingency8. Milestone: Project Complete
15.6. Project StaffingPosition No. of
PositionsDuties Answers to
Smith’s Management
1 Monitor the overall operation and plan for future opportunities.
Smith’s President
Pharmacist 1 Manage the day-to-day operations of the electronic logbook system.
Smith’s Manager
Project Manager 1 Manage/Monitor the Information Systems needs of the operation.
A-Team Consultants Management
Software Engineer 1 Develop/Maintain system Project Manager
Systems Architect 1 Develop/Maintain system Project Manager
Network Engineer 1 Develop/Maintain system Project Manager
QA Tester 1 Test system Project Manager
Figure 16: Project Staffing
16. Integration of Internal/External SystemsThe integration of the new Ephedrine product database with Smith’s existing IT infrastructure requires some additional application programming to create a web services environment that will communicate with the existing IBM 300 series POS system. The goal is to invoke the database application using the existing POS so that the existing system is enhanced, not replaced.
The Electronic Product Sale Logging System will tie into an existing IBM POS300 Point of Sale System currently in operation at Smith’s Pharmacy. The application system will be installed on each POS controller to tie in with the existing POS software.
Based on the DBMS structures and stored procedures, a web server will connect to the DBMS to execute the stored procedures. The website will expose some web services than the POS system will consume. The POS system will send parameters to the web service and handle the response activity for the POS terminal.
Figure 17: Integration of Internal and External Systems and Services
17. System Administration, Security, Backup and Recovery
17.1. PolicySmith’s Pharmacy secures its I.T. assets to protect corporate information and protect the privacy of such information. With the integration of the new online logbook tracking system, the integrity of this secure environment must be maintained. All networked computer and POS data is considered confidential and property of Smith’s Pharmacy, Inc.
17.2. Account ManagementInternal accounts are maintained for e-mail and management of the POS system. Managers are equipped with a laptop for management purposes. This laptop contains a Windows domain account, which is maintained on an Active Directory domain server in Wheeling. In addition, each POS terminal contains a logon capability for each cashier. All Cashiers (Including Pharmacists) have a user account maintained in the domain controller for logon to the POS terminals.
17.3. AdministrativeTo ensure all Administrative accounts with elevated access privileges on computers, network devices, and other critical equipment (example: accounts used by system administrators and network managers) are used only for their intended administrative purpose, all authorized Users must be made aware of the responsibilities associated with the use of privileged special access accounts and comply with all associated policies, standards, and /or procedures established by the company.
17.4. Backup Recovery of Network Servers and DataThe Wheeling, West Virginia site has a small tape backup system consisting of a single tape drive (installed within a single Dell 1850 rack mounted server). The tape drive’s daily data backup routine is managed using an EMC product called “Retrospect.” This tape management software product is geared toward small and medium sized business. As a part of the daily backup routine, store managers are responsible for changing the data tapes. Tapes are rotated offsite in a 3-week rotation. A single week’s tapes (five tapes), 2 weeks out of rotation are stored offsite with a local tape archive company in a controlled environment to protect the physical integrity of the tape. These tapes may be recalled at any time for any reason should the need arise to restore lost files.
Figure 18: Tape Backup Rotation
The current backup system protects e-mail, files from the POS controllers and user account information for the local area network. The new logbook system will require backup of database information stored in the new Microsoft SQL database. The current capacity of the tape will support the additional data, but as the size of the database grows, future consideration might be made to expand the tape backup capability by adding an additional tape drive and expanding the terms of the contract for offsite storage to accommodate the additional tapes. As shown in the diagram below, the Exchange e-mail server mailboxes, POS controller data and network directories are backed up. The SQL database backup will be added to the daily data backup prior to go-live for the new application.
Figure 19: EMC Retrospect Configuration
17.5. Microsoft SQL Server 2005 BackupTo provide a complete disaster recovery option for the new application, a proper backup of the Microsoft SQL database must be performed. Microsoft’s specific recommendations for backup (and restore) of the SQL 2005 database can be found at http://technet.microsoft.com/en-us/library/ms187048.aspx and http://technet.microsoft.com/en-us/library/ms186289.aspx.
17.6. Computer Virus PreventionSmith’s runs a licensed multi-site copy of McAfee Anti-Virus. This is used to protect servers and workstations. IBM sold this software to Smith’s when the POS system was purchased. The agreement was extended to provide coverage for the pc’s, DNS and Exchange server equipment. A Checkpoint FW-1 firewall is used to further mitigate the potential for virus activity from the Internet.
17.7. Incident ManagementIncidents involving computer security will be reported as required by State or Federal Law. To ensure that each incident is reported, documented and resolved in a manner that restores operation quickly while meeting the statutory requirements for handling of evidence.
17.8. Internet UseSmith’s provides internet access to management personnel through a proxy-based firewall system at the Wheeling location. This centralized method of access enhances security by decreasing the number of possible intrusion points in the network. WWW requests are sent across the secured MPLS WAN to each of the remote locations. The Internet is access from the Wheeling office via a dual T1 circuit. Sprint Business Services manages the firewall and provides active monitoring for Intrusion Detection at all four locations.
17.9. PasswordsSmith’s Pharmacy enforces a strong password policy. This policy was implemented for Smith’s as a part of their ongoing agreement with Sprint Business Services. Under the company policy, users must change their password every 90 days, and all passwords must contain some combination of the following:
At least one uppercase letter At least one number. At least one special character, such as: !, @, #, $ or %.
17.10. Physical AccessSmith’s currently policy allows only store managers and Sprint and IBM technicians to access the company computer systems. This security provides a higher level of accountability while protecting non-management employees from unnecessary liability. The new database application servers will become part of this same policy when they are implemented.
18. ReferencesCMS. (2005). Selecting a Development Approach. Office of Information Services.
Holtzman, J. (2004). A Guide to the Project Management Body of Knowledge. Newtown Square, Pennsylvania: Project Management Institute.
IBM. (2005). IBM SurePOS 300 Series.
Reuters. (2007). Dell. Retrieved October 3, 2007, from Reuters Stocks Overview: http://stocks.us.reuters.com/stocks/overview.asp?symbol=DELL.O
Reuters. (2007). IBM. Retrieved October 9, 2007, from Reuters Stocks Overview: http://stocks.us.reuters.com/stocks/overview.asp?symbol=IBM.O
Reuters. (2007). Microsoft. Retrieved October 3, 2007, from Reuters Stocks Overview: http://stocks.us.reuters.com/stocks/overview.asp?symbol=MSFT.O
Sprint. (2007). Managed Network Services. Retrieved October 2, 2007, from Sprint Business: http://www.sprint.com/business/products/products/managedNetworkServices_enterprise_tabC.html
Stoeller, W. (2003, September 23). Risky Business: Risk Management for Localization Project Managers. Retrieved October 3, 2007, from Translation Directory: http://www.translationdirectory.com/article462.htm