Assignment Instructions Scenario: Technical managers are often required to explain technologies and make business cases to

Assignment Instructions

Scenario: Technical managers are often required to explain technologies and make business cases to leadership.  Technology managers need the skills to summarize and assess technical articles and publications.  Then they need to make and pitch a business case to non-technical leadership/executives.  In my experience, managers that are capable of getting buy-in from leadership are more effective.  

Assignment:  

Find a technical article on the web that is related to the course you are studying.  Write 3 independent sections based on the article. (Summary, Assessment, and Business Case).  Each section should be independent from each other.  For example, The business case should not refer to your summary or assessment sections.  Be sure to use headings for each section.   


Summary: 

The first paragraph should summarize the article.


Assessment:
 

The assessment should be focused on what you think/learned about the article. 


Business Case: 

The business case is your business pitch to executive leadership.  This section should be very professional and you should stay away from personal pronouns such as “I” or “you” but instead focus on the company and business objectives. 


Example Structure:  
 

 

Assignment Title:  Article 1
Student Name:  Joe Student
Course/Section:  CTS1163C/Section 001
Paper Due Date:  January 21, 2012

 

Article Title: Windows 7 Updated


Article Author: Phil Stenkowitz


Source/URL:  Network Magazine (online www.networkmagazine.com)


Article Date:     12/10/11


 

(Note: The remainder of the paper should be double spaced)


Summary:
  

See Rubric


Assessment
 

See Rubric


Recommendation:
 

See Rubric

Introduction Sentence

3-5 Points 

Closing Sentence

image1.png

image2.png

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Need this expanded 4Security Recommendations ReportsTung NkengazongSecurity

Need this expanded  4 Security Recommendations Reports Tung Nkengazong Security Recommendations Reports The critical security challenges of BRI require a comprehensive security strategy that is multi-dimensional in approach. In the first place, BRI needs to enhance controls over-identification and authentication. Adoption of multi-factor authentication (MFA) will drastically reduce the likelihood

Please review attachmentsStudent Name: _________________ Program: Project Management Essentials Lesson 12 Assignment Lesson 12 Assignment

Please review attachments Student Name: _________________ Program: Project Management Essentials Lesson 12 Assignment Lesson 12 Assignment Handout Assignment Instructions For this assignment, you will develop a stakeholder register based on the information in the project overview. The project overview and a template table have been provided in the handout below.

100 word response 1 reference due 6/22/2024Emmons Discussion 3-3:

100 word response 1 reference due 6/22/2024 Emmons Discussion 3-3: Compliance within the Remote Access Domain What are some common risks, threats, and vulnerabilities found in the Remote Access Domain that must be mitigated through a layered security strategy?  What risks, threats, and vulnerabilities are introduced by implementing a remote