rfp response proof 8
DESCRIPTION
Response to Request for Proposal of Central Florida Aircraft Overhaul - School ProjectTRANSCRIPT
TABLE OF CONTENTS
Company Background ……………………………………………………………………
Company Mission Statement ……………………………………………………………..
Company Objectives ……………………………………………………………………..
Company Value Statements ………………………………………………………………
Executive Profiles
Ainsley Robson, Chief Executive Officer ……………………………………….
Ian Myers, Chief Operations Officer ……………………………………………..
Jon Wiesberg, Chief Financial Officer …………………………………………..
Vishal Narayan, Chief Information Officer ………………………………………
Priyesh Patel, Chief Technology Officer ………………………………………..
Sanjay Naidoo, Chief Security Officer …………………………………………..
System Selection
Basic Hardware Selection ………………………………………………………..
Selection By Department …………………………………………………………
Basic Software Selection ……………………………………………………...…
Warranty Information ……………………………………………………………
Budgeting Information
Base Project Budget ………………………………………………………………
Continuing Future Budget Information …………………………………………..
Cost Explanation …………………………………………………………………
Project Timeline …………………………………………………………………………..
Network Set-up Overview ………………………………………………………………..
Individual Office/Building Networks
Administration …………………………………………………………………..
Zone 1 (FAA Liaison/ Customer Liaison/ Engineering/ Maintenance)….
Zone 2 (Accounting/ Human Resources/ IT/ Marketing/ Publications &
Regulatory Data/ Sales & Contracts) …………………………………….
Zone 3 (Vice Presidents Offices/ President Office)……………………….
Maintenance Facility ……………………………………………………………..
Information Technology Policies
Introduction ……………………………………………………………………...
Acceptable Use Policy ...………………………………………………………….
Internet Usage Policy ……………………………………………………………..
Anti-Spam Policy ………………………...……………………………………….
Instant Message Policy …………………………..……………………………….
Software Installation Policy …………………………..…………………………..
Training Program
Introduction …………………………………………..…………………………..
Training Outline - Microsoft Office 2007 ……………………………………….
Training Outline - Corridor Application ………………………………………...
Training Outline - Catea Application ……………………………………...…….
Training Outline - Information Technology Support …………………………….
Appendix
RFP Checklist ……………………………………………………………………
Equipment Screenshots ………………………………………………………….
1
2
2
3
5
9
13
15
17
18
23
24
27
28
29
29
30
33
43
45
46
48
53
55
57
58
60
62
63
64
65
67
68
68
69
71
79
COMPANY BACKGRAOUND AND WHO WE ARE
Titian Technologies Consulting began 5 years ago through providing small “mom and
pop” businesses with Information Technology Systems in order to facilitate their growth. Since
our beginning, we have always felt that it is important to provide personalized IT services that
mold perfectly to the desired business model and needs of our clients.
Today, our company has grown in size from its initial offering of services to small
“mom and pop” business to serving mid-size companies in a similar manner. Our company
growth has sparked excitement throughout the company and further boosts our confidence in
what we do for the people we love.
It is our profound dedication to serving clients exceptionally well that has continually
set us above our competitors. In our commitment to stay true to our past, we have provided each
of our clients with a personal consultant who is designated to finding, serving, and sustaining
the needs of our clients. Furthermore, our personal consultants act as the gatekeeper of
information between clientele needs during the project’s beginning and throughout its
longevity.
The personal consultant is an experienced and highly qualified individual in customer
service and project management. Like out dedication to serving our clients, it is our well
qualified consultants that set us aside from our competitors. Under this personal consultant
(project manager), we provide a team of individuals who specialize in technologies and sales
and marketing who further facilitate the business needs of our clientele.
As a part of our commitment to the client, we analyze the individual needs of the overall
client and, for example, provide catered services such as offering a department who needs
mobile technology, mobile technology. It is a simple methodology that works well and makes
you, the customer, feel good about your decision to use us as your consultant.
We also strive to provide for the economic and social responsibilities that are important
in today’s society. For instance, each piece of hardware that we equip within a building is
energy-efficient which benefits the customer two-fold: reduces expenses and protects the
environment. Also, we participate in the “Build-a-Forest” program where we plant a tree for
each computer we install for our clients.
Now that you know a little about our history and who we are, feel free to contact us for
more information via email or on one of our toll-free lines.
1
MISSION STATEMENT
To provide personalized, quality IT
consultation for organizations that need to
advance their IT solutions.
OBJECTIVE
Provide each of our customers with an in-house
consultant specific to each client. In addition,
to provide 365-7-24 technical support.
Offer quality consulting based IT services
personalized to each department/division of the
department
To return an annual investment of 12% profit
To interact in local community volunteer
programs, such as the Special Olympics and
“Build-a-Forest” Program.
Provide our customers with energy-efficient
“green” products. 2
VALUES
STATEMENT
Winning Attitudes
One-on-One Service
Integrity
Loyalty
Socially Responsible
Teamwork
3
EXECUTIVE TEAM MEMBERS
Ainsley Robson
Chief Executive Officer
Project Manager
Areas of Expertise:
Customer Service; Project Management; Public Relations
It is my pleasure to introduce my self as the Chief Executive Officer (CEO) for Titian
Technologies Consulting. As the CEO of this company it is my responsibility to set the
direction for the company and encourage my employees to perform to the maximum of their
abilities.
For each of our clients my staff and I continue to work towards holding true to the ideals
that the company was founded upon and ensure that the client is the number one priority. In
ensuring this I also have often taken part in the consulting process with maintaining my own
client role as a project manager.
As a proud graduate of Embry Riddle Aeronautical University with both my Bachelor of
Science in Safety Science and Master of Business Administration, I continue to work toward
excelling to the highest potential that can be meet.
5
6
7
EXECUTIVE TEAM MEMBERS
Ian Myers
Chief Operations Officer
Areas of Expertise:
Financing; Budgeting; Project Management
As the Chief Operating Officer (COO) for Titan Technologies Consulting, I
oversee the day-to-day operations of the company as well as coordinate the strategic planning
for our future operations. In addition to the latter business functions, I aid in the implementation
of services to our customers by ensuring the delivery of our products/services meets the needs,
expectations, and wants of our clientele. I’ve been with the company since its incorporation
and, as a member of this company, have helped the company grow to its outstanding reputation
within the IT consulting industry.
9
10
11
EXECUTIVE TEAM MEMBERS
Jon Weisberg
Chief Financial Officer
Areas of Expertise::
Customer Service; Project Management; Sales
As the Chief Financial Officer (CFO) for Titan Technologies Consulting, I am
responsible for the company’s corporate finance, financial planning, tax, accounting, investor
relations, personal auditing, and risk management. My obligations as CFO is to provide your
company with the best possible financial plan to save you money as well as receive the best
possible service possible. To do this, we will meet constantly to develop a budget and plan that
meets your financial needs. With a staff including certified C.P.A’s as well as C.F.A’s, we
continually work towards supporting the mission of the company by maintaining balanced
budgets and find ways to save money.
Personally, I am a graduate of Embry Riddle Aeronautical University with a Master of
Business Administration with a specialization in Finance. Through numerous jobs and
positions within the Financial aspect I have worked up the ranks to become CFO for Titan
Technologies Consulting.
13
14
EXECUTIVE TEAM MEMBERS
Vishal Narayanaswamy
Chief Information Officer
Areas of Expertise::
Project Management; Information Technology
Information has always proven to serve as the backbone to a company and its success. It
is my job as the Chief Information Officer (CIO) for Titian Technologies Consulting to main-
tain the Information Technology Systems and its long-term requirements. As the company’s
CIO, it is my responsibility to oversee all uses on information technology and to ensure the stra-
tegic alignment of IT with our business goals and objectives.
Together, with my team and fellow Executive Officers, we continually strive to have
both the most suitable technology and to have updated information at Titian Technologies Con-
sulting as well as the latter for our clientele base. Furthermore, it is my personal privilege to en-
sure that the delivery of all IT projects is on time and within budget.
15
16
EXECUTIVE TEAM MEMBERS
Priyesh Patel
Chief Technology Officer
Areas of Expertise::
Financing; Budgeting; Information Technology
It is my pleasure to serve as the Chief Technology Officer (CTO) for Titian
Technologies Consulting. In this position I work on using my knowledge of Information
Technology Systems to ensure that the throughput, speed, accuracy, availability, and reliability
of our organizations systems are working at their peak efficiency and effectiveness in order to
adequately provide customer service to each of our clients. Also, my department works on
continually updating our systems database on available technology for on-time, available
clientele use.
17
18
EXECUTIVE TEAM MEMBERS
J. Sanjay Kiran Naidoo
Chief Security Officer
Areas of Expertise::
Computer Software; Engineering
In the world of Information Technology, one of the biggest threats to an organization is
the security of the IT system. It is my responsibility as the Chief Security Officer (CSO) to
ensure that all systems that are installed within our company and our clients have security
strategies and IT safeguards to protect the systems from hackers and viruses. Within my office,
we continually monitor the integrity of the system, develop policies to protect the systems, and
obtain the most up-to-date anti-viral and spyware software available in the marketplace.
19
20
21
HARDWARE SYSTEM SELECTION
Basics
23
Hardware
Category Item Description Quantity Price per
Item Total Price
Workstation Precision T1500 28 1,548.00 43,344.00
Workstation Optiplex 380MT 198 1,140.00 225,720.00
Laptop Toughbook 52 16 2,241.99 35,871.84
Laptop HP EliteBook 8440w Moblie Workstation 5 1,649.00 8,245.00
Printer HP LaserJet P2055dn (B&W) 18 399.00 7,182.00
Printer HP LaserJet M1522 (multi-function) 18 349.99 6,299.82
Plotter HP Designjet T620 Printer series 1 2,450.00 2,450.00
Server Dell PowerEdge T710 7 9,819.00 68,733.00
Storage Array Power Vault 1 11,945.00 11,945.00
Tape Drive Q1538A HP Storage Works Ultrium 960 1 2,666.53 2,666.53
Tape Media C8014A HP LTO Ultrium x20-200GB 30 1,061.66 31,849.80
48 port Switch WS-C2960-48TT-L Cisco Caralyst 2960-48TT 7 1,372.25 9,605.75
24 port Switch WS-C2960-24TC-L Cisco Caralyst 2960-24TC 4 1,372.25 5,489.00
UPS HP UPS T1500 G3-UPS-95 Watt 1400VA 8 494.99 3,959.92
Network Cable Cables to Go network cable kit 6 146.99 881.94
Cable Connec-
tors RJ-45 Belkin Network Connectors (100 pcs) 17 23.99 407.83
Router Cisco 1941 Intergrated Service Router 2 1,294.62 2,589.24
WIFI Access D-Link Xtreme N Duo Wireless-N Bridge/
Access Point 8 99.99 799.92
Barcode Scanner Datalogic Quickscan 6500BT Scanner 4 437.90 1,751.60
Card Scanner 21088045 MagTek Stripe Reader Card Scanner 4 180.00 720.00
Switch Cisco Catalyst 4900M 1 10,080.00 10,080.00
Router Cisco 3945 Integrated Service Router 1 7,953.33 7,953.33
Firewall D-Link DFL 210 NetDeffend 4-Port 1 354.99 354.99
Surge Protectors Model SS7619-15 18 99.00 1,782.00
Totals 490,682.51
By Department
Department Hardware Quantity Price Per Unit Total Costs
FAA Liasion Workstations 4 1,548.00 6,192.00
24 Port Switch 1 1,372.25 1,372.25
Wireless Access Point 1 99.99 99.99
Black & White Printer 1 399.00 399.00
Engineering Workstations 16 1,548.00 24,768.00
Black & White printer 2 399.00 798.00
Multi-Function printer 1 349.99 349.99
Plotters 1 2,450.00 2,450.00
24 Port Switch 1 1,372.25 1,372.25
UPS 1 494.99 494.99
Server 1 9,819.00 9,819.00
Maintenance Planning and
Control
Workstations 25 1,140.00 28,500.00
Black & White printer 3 399.00 1,197.00
Wireless Access Point 1 99.99 99.99
Multi-Function printer 1 349.99 349.99
48 Port Switch 1 1,372.25 1,372.25
Customer Liaison Workstations 6 1,140.00 6,840.00
Black & White printer 1 399.00 399.00
Multi-Function printer 1 349.99 349.99
Accounting Workstations 20 1,140.00 22,800.00
Black & White printer 2 399.00 798.00
Multi-Function printer 1 349.99 349.99
48 port switch 1 1,372.25 1,372.25
Server 1 9,819.00 9,81900
UPS 1 494.99 494.99
Information Technology Workstations 12 1,140.00 13,680.00
Servers 4 9,819.00 39,276.00
UPS 5 494.99 2,474.95
Storage Array 1 11,744.00 11,744.00
Black & White printer 1 399.00 399.00
Wireless Router 1 1,294.62 1,294.62
Multi-Function printer 1 349.99 349.99
48 port switch 1 1,372.25 1,372.25
Storage Array 1 11,945.00 11,945.00
Tape Media 30 1,061.66 31,849.80
Tape Drive 1 2,666.53 2,666.53
Network Switch 1 10,080.00 10,080.00
Network Router 1 7,953.33 7,953.33
24
Department Hardware Quantity Price Per Unit Total Costs
Publications & Regulatory
Data
Workstations 8 1,140.00 9,120.00
Multi-Function printer 1 349.99 349.99
Black & White Printer 1 399.00 399.00
24 Port Switch 1 1,372.25 1,372.25
Human Resources Workstations 12 1,140.00 13,680.00
Black & White Printer 1 399.00 399.00
Multi-Function printer 1 349.99 349.99
48 port switch 1 1,372.25 1,372.25
Marketing Workstations 24 1,140.00 27,360.00
Black & White printer 3 399.00 1197.00
Multi-Function printer 1 349.99 349.99
48 port Switch 1 1,372.25 1,372.25
Sales & Contracts Workstations 20 1,140.00 22,800.00
Black & White printer 3 399.00 1,197.00
Multi-Function printer 1 349.99 349.99
48 port Switch 1 1,372.25 1,372.25
Hangar 1 Workstations 12 1,140.00 13,680.00
Laptops 4 2,241.99 8,967.96
Wireless Access Point 1 99.99 99.99
Multi-Function printer 1 349.99 349.99
Server 1 9,819.00 9,819.00
UPS 1 494.99 494.99
Wireless Access Point 1 99.99 99.99
Hangar 2 Workstations 8 1,140.00 9,120.00
Laptop 4 2,241.99 8,967.96
Multi-Function printer 1 349.99 349.99
Wireless Access Point 1 99.99 99.99
Hangar 3 Workstations 8 1,140.00 9,120.00
Laptop 4 2,241.99 8,967.96
Multi-Function printer 1 349.99 349.99
Wireless Access Point 1 99.99 99.99
Hangar 4 Workstations 8 1,140.00 9,120.00
Laptop 4 2,241.99 8,967.96
Multi-Function printer 1 349.99 349.99
Wireless Router 1 1,294.62 1,294.62
V.P. Maintenance Operations Workstations 8 1,548.00 12,384.00
Multi-Function printer 1 349.99 349.99
Wireless Access Point 1 99.99 99.99
Laptop 1 1,649.00 1,649.00
48 Port Switch 1 1,372.25 1,372.25
25
Department Hardware Quantity Price Per Unit Total Costs
V.P Human Resources Workstations 6 1,140.00 6,840.00
Laptop 1 1,649.00 1,649.00
Multi-Function printer 1 349.99 349.99
V.P Marketing Workstations 9 1,140.00 10,260.00
Multi-Function printer 1 349.99 349.99
24 Port Switch 1 1,372.25 1,372.25
Laptop 1 1,649.00 1,649.00
V.P Accounting & Finance Workstations 8 1,140.00 9,120.00
Laptop 1 1,649.00 1,649.00
Multi-Function printer 1 349.99 349.99
President Workstations 12 1,140.00 13,680.00
Laptop 1 1,649.00 1,649.00
Wireless Access Point 1 99.00 99.00
Multi-Function printer 1 349.99 349.99
MISC Network Cable Kit 6 146.99 881.94
RJ-45 Connectors (100pcs) 17 23.99 407.83
Surge Protectors 18 99.00 1,782.00
Barcode Scanner 4 437.90 1,751.60
Card Scanner 4 180.00 720.00
26
SOFTWARE SYSTEM SELECTION
27
* Note:
All programs having a monthly fee have no set-up or purchase costs associated with them.
Software
Category Item Description Quantity Total Price
Operating System Windows 7 Professional 247 included
Office Applications Microsoft Office 2007 Small Business Edition 247 included
Outlook; PowerPoint Presentation; Excel;
Word; Publisher
Scheduling Schedule Anywhere 500 monthly fee*
Project Management ProjectManagement.com 500 monthly fee*
Internet Service New Edge Network 1 monthly fee*
Enterprise T1 1.5 - Core Coverage 3YR
Maintenance Corridor (minus the annual fee) 45 138,769.00
Database Management Oracle Database Standard Edition
(plus first year support) 1 21,350.00
CAD Catia 1 8,857.00
Computer Logon Novell Secure Logon (total for 500 logons) 38,568.15
Total 207,544.15
WARRANTY INFORMATION
Hardware Support Manufacturer
Dell PowerEdge T710 3 Yr ProSupport for IT and Mission Critical 2hr
7X24 Onsite Pack, 5Hr Repair
Dell
Dell Precision T1500 3 Yr ProSupport for end users and 3 Yr NBD
On-site Service
Dell
Optiplex 380MT 3 Yr ProSupport for end users and 3 Yr NBD
On-site Service, 3 year Complete Care
Accidental Damage Protection
Dell
HP Storage Works Ultrium 960 3 Years Warranty HP
HP LTO Ultriumx 20- 200GB
Storage Media
Limited Life time Warranty HP
Cisco 48 Port Switch Limited Life time Warranty Cisco
Cisco 24 Port Switch Limited Life time Warranty Cisco
UPS 3 Years Warranty HP
PowerVault MD3000 3 Yr ProSupport for end users and NBD On-site
Service
Toughbook 52 Protection Plus 3yr Accidental Damage
EliteBook 8440w Mobile
workstation
Limited 3-year standard parts and labor onsite,
7x24 hardware technical phone support, 1 yr
limited warranty on battery
HP
Tripp-Lite Surge Protectors Life time warranty Tripp-Lite
1941 Integrated service router 90 Day warranty, 10 Day replacement period Cisco
Wifi Access Point Best buy
Black & White Printer 1 Year warranty HP
Multi-Function Printer 1 Year Warranty HP
28
BASE PROJECT BUDGET
COMPANUY FUTURE BUDGET INFORAMTION
29
Item Description Monthly Rate Yearly Rate
Internet Service (New Edge Network) 289.00 3,468.00
Project Management 1,865.00 22,380.00
Scheduling (Schedule Anywhere) 257.45 3,089.40
Oracle Annual Support 1,100.00
Catia Annual Service Fee 1,563.00
Consulting Team & IT Support Fee 30,000.00
Annual Totals 61,600.40
Category Item Description Quantity Rate Total Price
Consultant Fee Titian Technology Consultation Team 1 200,000 $ 200,000.00
Installation Fee Installation/Test Employee (10 man team per
week) 6 9,000 54,000
Installation Fee Site Supervisor (1 individual) 6 1,200 7,200
Training Fee Microsoft Office 2007 Training (per employee) 500 50 25,000
Training Fee Corridor Application (per employee) 500 100 50,000
Training Fee Catia Application (per employee) 16 100 1,600
Training Fee IT System Solutions (per employee) 12 100 1,200
Sub-total 339,000
Hardware Total Product Price 637,425.78
($472,154.19 + 20% Markup)
Sofware Total Product Price 207,544.15
First Year of Annual Fees (minus the consultant and IT support
fees) 31,600.40
Bid Price 1,183,969.93
Budget 1,500,000.00
Remaining Funds 316,030.07
COST EXPLAINATION
30
Service Cost
Titan Technologies Consulting provides a personal consulting team to CFAO. For the
full-time services of our team, we are charging a flat fee of $200,000. This price includes a full
-time lead or Project Manager, which is exclusive to the individual client. Also the price covers
the team of experts that are under the Project Manager which includes a Financial Consultant
and a Information Technology Consultant. Together they work to provide the best IT solution
for their client. Through our research this price is inline with the industry average range for this
consulting service and structure.
The installation and testing of your enterprise architecture will take a total of 6 weeks;
we equate this installation to a cost of $61,200. The team is constructed of a 10 individual team
and a site supervisor to ensure quality control and task management. By taking the average
annual income for a single worker with this type of job description it works out to be $900.00
for each individual worker a week. For the site supervisor we included a $300.00 increase over
the workers, due to the added responsibilities that this individual holds in creating and testing
the IT systems.
The total fees for your training amount to $77,800. For Microsoft Office training, the
cost was figured out by charging all 500 CFAO employees at a rate of $50 per employee. For
Corridor Applications, the cost was figured out by charging all 500 CFAO employees at a rate
of $100 employee. For Catia Applications, the cost for the 16 engineers is at a rate of $100
employee. For IT Systems Solutions, the cost for the 12 employees at a rate of $100 employee.
These rates are able to be accomplished through the concept that we do off-site training at a
location which is owned and operated by Titian Technologies. The reason for the price differ-
ence in the trainings is due to the difference in length of time and the technology systems that
are required for each training evolution.
Hardware Cost
We chose the hardware presented above because it fits into Titan Technologies Consulting’s
core philosophy. The following are the main reasons why we choose the hardware:
Eco-friendly aspects of the hardware (including Energy Efficiency)
Competitively priced High quality of the equipment that is purchased
Titian Technology Consulting Calculations
When we were researching our opportunities for creating a profitable situation for our
company, it was discovered that in order to remain competitive that we should look at a 30
percent markup on products offered. The average for contractors (according to contractor-
talk.com) is to have a 30 to 40 percent markup on services offered. What we have decided on
doing to create out profit is to mark up the physical hardware product that is purchased with a
30 percent markup.
31
Hardware 130%
Category Item Description Total Price Markup
Price
Workstation Precision T1500 43,344.00 56,347.20
Workstation Optiplex 380MT 225,720.00 293,436.00
Laptop Toughbook 52 35,871.84 46,633.39
Laptop HP EliteBook 8440w Moblie Workstation 8,245.00 10,718.50
Printer HP LaserJet P2055dn (B&W) 7,182.00 9,336.60
Printer HP LaserJet M1522 (multi-function) 6,299.82 8,189.77
Plotter HP Designjet T620 Printer series 2,450.00 3,185.00
Server Dell PowerEdge T710 68,733.00 89,352.90
Storage Array Power Vault 11,945.00 15,528.50
Tape Drive Q1538A HP Storage Works Ultrium 960 2,666.53 3,466.49
Tape Media C8014A HP LTO Ultrium x20-200GB 31,849.80 41,404.74
48 port Switch WS-C2960-48TT-L Cisco Caralyst 2960-48TT 9,605.75 12,487.48
24 port Switch WS-C2960-24TC-L Cisco Caralyst 2960-24TC 5,489.00 7,135.70
UPS HP UPS T1500 G3-UPS-95 Watt 1400VA 3,959.92 5,147.90
Network Cable Kit Cables to Go network cable kit 881.94 1,146.52
Cable Connectors RJ-45 Belkin Network Connectors (100 pcs) 407.83 530.18
Router Cisco 1941 Intergrated Service Router 2,589.24 3,366.01
WIFI Access D-Link Xtreme N Duo Wireless-N Bridge/Access
Point 799.92 1,039.90
Barcode Scanner Datalogic Quickscan 6500BT Scanner 1,751.60 2,277.08
Card Scanner 21088045 MagTek Stripe Reader Card Scanner 720.00 936.00
Switch Cisco Catalyst 4900M 10,080.00 13,104.00
Router Cisco 3945 Integrated Service Router 7,953.33 10,339.33
Surge Protectors Model SS7619-15 1,782.00 2,316.60
Totals 490,327.52 637,425.78
Below are the markup calculations for the product which is proposed for purchase with this
RFP.
Titian Technologies Consulting’s profit for this project would be $147,098.26.
PROJECT TIMELINE
33
GANTT CHART FOR PROJECT
34
35
36
37
38
39
40
41
NETWORK SET-UP OVERVIEW
43
INDIVIDUAL OFFICE/BUILDING NETWORKS
Administrative Facility
Zones for easy reference to office location
Zone 1
Zone 2
Zone 3
45
Zone 1
FAA Liaison/ Customer Liaison/ Engineering/ Maintenance
46
47
Zone 2
Accounting/ Human Resources/ IT/ Marketing/ Publications & Regulatory Data/
Sales & Contracts
48
49
50
51
52
Zone 3
Vice President Office/ President Office
53
Maintenance Facility
55
INFORMATION TECHNOLOGY POLICIES
Introduction
This section is a conglomerate of Information Management Policies that Titian Technologies
Consulting suggests for all clients to adopt into their information enterprise architecture. The
purposes of these policies are to ensure the appropriate usage of the systems and the
protection of the systems that Titan Technologies Consulting, Inc. provides its clients.
All policies should be reviewed by the Chief Information Officer (CIO) or another senior
executive to remain within compliance standards of each policy and to enact appropriate
changes where necessary. Furthermore, if necessary, it is suggested that the CIO partner with
executive peers in order to create changes to the policies.
The policies that Titian Technologies Consulting suggests are:
Acceptable Use Policy
Internet Usage Policy
Anti-spam Policy
Instant Message Policy
Software Installation Policy
In order to effectively ensure that all policies are followed, it is best practice to guarantee that
every employee is aware of these policies. In addition, it is Titian Technologies Consulting
suggestion that the latter policies be placed in an employee handbook and stored for future
reference.
References:
http://www.sans.edu/resources/student_projects/200711_002.pdf
www.theiia.org/download.cfm?file=77275
57
Acceptable Use Policy
Central Florida Aircraft Overhaul Inc. will provide access to the computer Network, Internet
and email. Your cooperation with all listed rules and recommendations and general etiquette
are required for this access to be continued. If you have any questions or concerns regarding
the provisions of this Policy in general or pertaining to you, please contact the Office of Human
Resources.
You are forbidden to provide any person details of your account information without prior ap-
proval on a per incident basis from your in house implementation officer.
If you violate this policy, your access may be limited or withdrawn. In addition, you may be
subject to disciplinary action, up to and including termination.
1. Your commitment to and responsibilities
By using or accepting your account password and related information, you agree to adhere to
this policy document. You also agree to report any Network, Internet or email misuse to the in
house implementation officer. Misuse includes Policy violations listed or unlisted which harm
any person or the company or which compromise data.
2. Intended period of Usage
Network, Internet and email access extends throughout the term of your contract and employ-
ment, provided you do not violate the Acceptable Usage Policy. Note: The company may sus-
pend access at any time without notice or reason.
3. Purpose of provison of computer privilege.
The company offers access to its Network Internet and email system for business purposes only.
If you are unsure consult the in house implementation officer.
4. Netiquette (Etiquette for the net)
All users are required to maintain the rule of Network etiquette, or Netiquette. You must be
considerate, comply with the acceptable ethics and code of conduct and use the Network, Inter-
net and email appropriately and legally. The company will determine what materials, files, in-
formation, software, communications, and other content and activity are permitted or prohib-
ited, as outlined below.
5. Banned/ Unacceptable Activities
The following activities violate the Company’s Computer Network, Internet and email Accept-
able Usage Policy.
5.1. Sending or receiving offensive, abusive, vulgar or defamatory content.
5.2. Sending or receiving ethnic, sexual-preference, or gender-related slurs or jokes.
5.3. Sending or receiving confidential information about clients or colleagues.
5.4. Conducting unauthorized business.
5.5. Viewing, transmitting, downloading, or searching for pornographic or illegal materials.
5.6. Accessing others’ folders, files, work, networks, or computers.
5.7. Using software that is not licensed or approved by the company.
It is understood that you could receive banned material through no fault of your own. It is ex-
pected that you report this on immediate receipt to the in house implementation officer. If the
in house implementation officer is not available then you should report it to the person of 58
nearest authority available and leave word for the in house implementation officer to contact
you urgently on her/ his return.
6. Respect for all confidential information
Some employees may have access to confidential information pertaining to clients, the com-
pany, employees or management. This information should be shared with caution and on a
need to know basis. If in doubt please consult the in house implementation officer.
7. Email Exists for Business Purposes
The company allows email access primarily for business purposes. Employees are prohibited
from using personal email software (Hotmail, etc) for business or personal communications at
the office other than with permission on a per incident basis from the in house implementation
officer.
8. Authorized Personal Use of Email
Employees may use (if requested of and permitted by the in house implementation officer)
email to communicate with family members. Employees’ personal use of email is limited to
lunch breaks and work breaks only. Employees may not use email during otherwise productive
business hours. Employees are prohibited from using email to operate a business, conduct an
external job search, solicit money for personal gain, campaign for political causes or candidates,
or promote or solicit funds for a religious or other personal cause.
9. Privacy
Network, Internet access and email are provided as a tool for our organization’s business. The
computer system is the property of CFAO. CFAO has the legal right to monitor usage of the
Network, Internet and email. Employees have no reasonable expectation of privacy when using
CFAO’s computer system, Network, Internet or email.
10. Violations and consequences
These guidelines are intended to provide CFAO employees with general examples of acceptable
and unacceptable use of the Company’s computer system. A violation of this policy may result
in disciplinary action up to and including termination.
Acknowledgement
If you have any questions about the above policies and procedures, address them to the in house
implementation officer before signing the following agreement.
I have read the company’s Network, Internet and Email Acceptable Usage Policy and agree to
abide by it. I understand and accept that a violation of any of the above policies and procedures
may result in disciplinary action, up to and including my termination.
User Name
User Signature
Date
59
Internet Usage Policy
Introduction
Central Florida Aircraft Overhaul, Inc. aims to provide you with accessible, up-to-date and reli-
able information to support you in your work. This goal requires us to provide access to the vast
information resources of the Internet to help you do your job and be well-informed. The Inter-
net is a business tool for Central Florida Aircraft Overhaul, Inc., and is provided to you at a sig-
nificant cost. Users must understand that this access is for the purpose of increasing productiv-
ity and not for non-business activities. Users must also understand that any connection to the
Internet offers an opportunity for non-authorized users to view or access corporate information.
Therefore, it is important that all connections be secure, controlled, and monitored to provide
you with accessible, up-to-date and reliable information and learning technology to support you
in your work, research, and studies
Authorized use
Central Florida Aircraft Overhaul, Inc.'s Internet connection is intended primarily for business
use. That means we expect you to use your Internet access primarily for business-related pur-
poses, i.e., to communicate with customers and suppliers, to research relevant topics, and to ob-
tain useful business information. The following are specific provisions regarding authorized use
of Central Florida Aircraft Overhaul, Inc.'s internet connection:
Internet use should be restricted to sites and materials such as news or information that
might be considered reasonable if read as a text publication in an office environment.
Occasional and reasonable personal use should not interfere with the performance of
work duties and responsibilities.
Unauthorized use
Users shall not use this company's Internet or e-mail services to view, download, save, receive,
or send material related to the following:
Offensive content of any kind, including pornographic material.
Propagate a virus, worm, Trojan horse, or trap-door program code.
Circumvent any system intended to protect the privacy or security of another user.
Visiting Web sites that promote threatening or violent behavior.
Using the Internet for Illegal activities.
The above list of prohibited actions is by way of an example only and is not intended to be ex-
haustive.
User accountability
Users are responsible for their Internet use and are accountable for the following:
Honoring acceptable use policies of networks accessed through the organization’s
Internet services.
Abiding by existing federal, state, and local telecommunications and networking laws
and regulations.
Following copyright laws regarding protected commercial software or intellectual
property.
Privacy and monitoring
Central Florida Aircraft Overhaul, Inc. has software and systems in place to monitor and record 60
all Internet usage. Our security systems are capable of recording each Web site and e-mail mes-
sage into and out of our internal networks. We reserve the right to do so at anytime. No em-
ployee should have any expectation of privacy as to his or her Internet usage. Our managers
will review Internet activity and analyze usage patterns, and they may choose to publicize this
data to assure that Central Florida Aircraft Overhaul, Inc. Internet resources are devoted to
maintaining the highest levels of productivity. We reserve the right to inspect any and all files
stored in private areas of our network in order to assure compliance with this policy.
Accidental/unintended violations
Central Florida Aircraft Overhaul, Inc. uses independently-supplied software and data to iden-
tify inappropriate or sexually-explicit Internet sites. We may block access from within our net-
works to all such sites. If you find yourself connected accidentally to a site that contains sexu-
ally explicit or offensive material, you mush disconnect from that site immediately, regardless
of whether that site had been previously deemed acceptable by any screening or rating program.
A user who accidentally accesses a prohibited site is encourage to report the incident to the
company's IT Department without the threat of incurring a violation penalty.
Violation penalties
Violations will be reviewed on a case-by-case basis. If it is determined that a user has violated
one or more use regulations, that user will receive a reprimand from his or her supervisor and
his or her future Internet use will be closely monitored. If a gross violation has occurred, man-
agement will take immediate action. Such action may result in losing Internet privileges, severe
reprimand, or termination of employment.
Reporting
When clear violations of this Internet Usage Policy occur, appropriate IT department staff, the
offender’s managing supervisor, and a company's Human Resource representative will be for-
mally notified. First time offenders will be notified their Internet usage will be closely moni-
tored and IT staff may review the employee’s communications for a period of 3 months. If the
user's Internet usage is deemed appropriate during that time, then no further action will be
taken. If other abuses of this Internet Usage Policy occur during this probationary period, man-
agement and a Human Resources representative will be notified to take appropriate action as
indicated in the Violation Penalties section of this document.
Central Florida Aircraft Overhaul, Inc. intends to enforce this policy, but reserves the right to
change it at any time as circumstances may require. Chief Informational Officer is responsible
for administering this policy and should be contacted should you have any questions or com-
ments concerning this policy.
The employee may not access the Internet via the Central Florida Aircraft Overhaul, Inc.'s net-
work at any time, through any device, unless he/she has read this policy.
61
Anti-Spam Policy
Central Florida Aviation Overhaul Inc. has a no tolerance spam policy. Central Florida Aviation
Overhaul Inc. customer support actively monitors large import lists and emails going to a large
number of contacts. Any customer found to be using Central Florida Aviation Overhaul Inc. for
spam will be immediately cut-off from use of the product. If you know of or suspect any viola-
tors, please notify us immediately at [email protected]
Every email contains a mandatory unsubscribe link - those individuals who try to remove this
link will be warned that they are doing so. If the link is removed or de-activated in any way,
Central Florida Aviation Overhaul Inc. will terminate the customer's account.
What is Spam? Spam is unsolicited email also known as UCE (Unsolicited Commercial Email). By sending
email to only to those who have requested to receive it, you are following accepted permission-
based email guidelines.
What constitutes a Preexisting business relationship?
The recipient of your email has made a purchase, requested information, responded to a ques-
tionnaire or a survey, or had offline contact with you.
What constitutes consent?
The recipient of your email has been clearly and fully notified of the collection and use of his
email address and has consented prior to such collection and use. This is often called informed
consent.
Isn't there a law against sending Spam? The federal anti-spam law went into effect on January 1st, 2004 and preempts all state laws.
While this new law will not stop spam, it does make most spam illegal and ultimately less at-
tractive to spammers. The law is specific about requirements to send commercial email and em-
powers the federal government to enforce the law. The penalties can include a fine and/or im-
prisonment for up to 5 years.
How to protect yourself from Spam: Take the Spam Test
1.Are you importing a purchased list of ANY kind?
2.Are you sending to non-specific addresses such as:
[email protected], [email protected], [email protected],
[email protected], or other general addresses.
Are you sending to distribution lists or mailing lists which send indirectly to a variety
of email addresses?
Are you mailing to anyone who has not explicitly agreed to join your mailing list?
Have you falsified your originating address or transmission path information?
Have you used a third party email address or domain name without their permission?
Does your email's subject line contain false or misleading information?
Does your email fail to provide a working link to unsubscribe?
Are you failing to process any unsubscribe requests that come to you via a reply to
your email within 10 days or the request?
62
Instant Message Policy
If you have answered YES to ANY of the above questions you will likely be labeled a SPAM-
MER. For more information visit The Coalition Against Unsolicited Email (www.xauce.org)
or contact Constant Contact Customer Support ([email protected])
The use of Instant Messaging technology is limited to the capabilities provided by Central Flor-
ida Aircraft Overhaul, Inc. on internal network services. Workforce members must use the In-
stant Messaging service provided in a manner that protects company assets and Confidential
Information and abide by the rules subject to the policy as outlined below.
Rules
1. Employees are prohibited from downloading and using personal, consumer-grade IM
software (e.g., AOL Instant Messenger, Yahoo!, or MSN) to transmit messages via the
public Internet. Employees who violate this rule are subject to termination.
2. All IM communications and information transmitted, received, or archived in the com-
pany's IM system belong to the company.
3. Employees have no reasonable expectation of privacy when using the company s IM
system. The company reserves the right to monitor, access, and disclose all employee
IM communications.
4. The IM system is intended for business use only. Employees are prohibited from wast-
ing computer resources, colleague’s time, or their own time sending personal instant
messages or engaging in unnecessary chat related to business.
5. Treat IM messages as business records that may be retained and used as evidence in liti-
gation, audits, and investigations.
6. Employees are required to retain all business-related instant messages and delete nones-
sential messages in accordance with the company s written IM retention and deletion
schedule. Please talk to Central Florida Aircraft Overhaul, Inc. compliance officer or
chief information officer if you need a copy or have questions about Central Florida Air-
craft Overhaul, Inc.’s IM retention and deletion policies, practices, and procedures.
7. Always use professional and appropriate language in all instant messages. Employees
are prohibited from sending abusive, harassing, threatening, menacing, discriminatory,
pornographic, disrespectful, or otherwise offensive instant messages.
8. Employees are prohibited from sending jokes, rumors, gossip, or unsubstantiated opin-
ions via IM. These communications, which often contain objectionable material, are
easily misconstrued when communicated electronically.
9. Employees may not use IM to transmit confidential, proprietary, personal, or potentially
embarrassing information about the company, employees, clients, business associates, or
other third parties.
10. Employees may not share confidential, proprietary, or potentially embarrassing business
-related or personal IMs with the media, competitors, prospective employers, or other
third parties.
11. Employees are to share their IM usernames with colleagues strictly on a need-to-know
basis. If you have any questions about the above policies, address them to the compli-
63
Software Installation Policy
Overview
Allowing employees to install software on company computing devices opens the
organization up to unnecessary exposure. Conflicting file versions or DLLs which can
prevent programs from running, the introduction of malware from infected installation
software, unlicensed software which could be discovered in an audit, and programs which
can be used to hack the organization’s network are examples of the problems that can be
introduced when employees install software on company equipment.
Purpose
To minimize the risk of loss of program functionality, the exposure of sensitive
information contained within Central Florida Aircraft Overhaul, Inc. computing network, the
risk of introducing malware, and the legal exposure of running unlicensed software.
Scope
This policy covers all computers, servers, PDAs, smartphones, and other computing
devices operating within Central Florida Aircraft Overhaul, Inc...
Policy
Employees may not install software on Central Florida Aircraft Overhaul, Inc. computing de-
vices operated within the Central Florida Aircraft Overhaul, Inc. network. Software requests
must first be approved by the requester’s manager and then be made to the Information Tech-
nology department or Help Desk in writing or via email. Software must be selected from an ap-
proved software list, maintained by the Information Technology department, unless no selection
on the list meets the requester’s need. The Information Technology Department will obtain and
track the licenses, test new software for conflict and compatibility, and perform the
installation.
Enforcement
Any employee found to have violated this policy may be subject to disciplinary action, up
to and including termination of employment.
Definitions
DLL: Dynamically Linked Library. A shared program module used by one or more pro-
grams, often installed as part of a program installation. If the current version of a
DLL is overwritten by a newer or older version, existing programs that relied upon the
original version may cease to function or may not function reliably.
Malware: A wide variety of programs created with the explicit intention of performing mali-
cious acts on systems they run on, such as stealing information, hijacking functionality, and
attacking other systems.
PDA: Personal Digital Assistant. A portable, hand held computing device capable of run-
ning software programs. It may connect to host computers or to wired or wireless networks.
Smartphone: A cellular phone with qualities of a computer or PDA. It is capable of running
software programs and connecting to computer networks.
64
TRAINING PROGRAM
In House Training Program
Training for your new enterprise architecture will be conducted by one of our selected in-house
training teams. We choose not to outsource this important facet of your new endeavour because
we feel our services end not at providing your company tailored products but exist indefinitely
throughout the longevity of your needs. Furthermore, since our analysis of your company
guided us to provide you with the ultimate personalized architecture, we feel it is our duty to
ensure you know how to use it from the people who provided it to you.
Note from the graph below shows that 55% of companies use departments within themselves to
provide IT training. It is our belief that these companies are underutilizing the potential to ade-
quately train their employees through utilizing their own sources. Although this may provide
more comfort and perceived control for a company, the lack of know-how and lack of true com-
petitive advantage poorly transcends throughout the company and, ultimately, hurts the bottom
line. Therefore, we are proud to be a considered within the 13% of companies who utilize out-
side sources for their training.
Training will be held at an off cite training facility that we set up to provide classroom/
simulator training for your employee’s. We will supply the computers and training materials
(e.g. projectors, printers, and so on) and each class will consist of no more than a third of each
of the department’s workforce.
http://articles.techrepublic.com.com/5100-10878_11-1049089.html?tag=content;leftCol
65
Several benefits of training offsite:
Improves focus on learning tasks instead of work
Allows employees to absorb more information
Promotes collaboration and interaction between employees
Psychologically beneficial through an environmental change
Creates less disruption of the operation at the primary location
Allows “folks” to get out of the office and have fun
Our Training Program Goals:
Provide real world training instead of just application training – task oriented
Address specific skills relative to the employee’s specific job
Administer continual training throughout the longevity of employee’s tenure
Identifying the Training Needs of the Company:
The following section outlines how we identified the training needs of your company. We feel
it is integral to understand the training needs of the company and tailor a training program that
fits those needs.
Executive input – We seek the input regarding the training requirements and goals from execu-
tives within the consultee organization. This enables our training program to be catered to the
goals and requirements of the company and remain in line with the strategy of the company.
Employee assessment – An employee assessment is important to understand the exact needs of
different departments within the company. We understand that each department has specific
needs and wants, therefore and employee analysis is conducted before the training program be-
gins to better understand our clients.
Indentify current help-desk trends – We consult with the current IT solutions or help-desk
within the company to further understand the recurring problem within in order to develop a
training plan resolves such problems.
Poll the students – As a post training evaluation, our trainers survey a sample of trainees to
evaluate the training program to ensure proper, real-world knowledge was absorbed during the
training program. This evaluation serves as a metric for your company and allows us to better
understand how our program can more effectively serve your needs in the future.
Specific training classes:
Microsoft Office 2007 Class
Corridor Operations Class
Catia Operations Class
New Hire Class
Luncheon – ask the expert “continual” training classes (Held after initial training)
66
Training timeline:
Timeline - August 23, 2010 through November 19, 2010
Days and time – Training per employee will be anywhere between 6 to 20 hours. Classes will
be held Monday through Friday where employees will spend no more than 6 hours a day (not
including breaks).
Continual training – We understand the importance of time to your employees; therefore our
continual training program isn’t as dynamic as the initial training program. For the reason of
time, and an assumption that employees will have the proper knowledge after initial training,
our continual training program is very relaxed and more geared toward answering unique ques-
tions and problems not discussed in initial training. Our continual training program consists of
selected IT employee s that will hold a luncheon every two weeks.
Course Outline - Microsoft Office 2007 Training
*Note- All employees of CFAO will participate in Microsoft Office Training. They will be
split up into 3 evenly groups consisting of: Engineering, Maintenance Planning & Control, Ac-
counting, Information Technology, Human Resources, Marketing, Sales & Contracts
Objectives:
To properly evaluate employees current knowledge of Microsoft Office Software
To transition the employees of CFAO from Microsoft Office 2003 to Microsoft Office
2007
To train employees at a steady pace so that the information is not too overwhelming.
Training Schedule:
Group A Schedule:
August 23rd - 6 hour session on fundamentals of Word, Excel, and PowerPoint
August 24th - 6 hour practical case study
Group B Schedule:
August 25th - 6 hour session on fundamentals of Word, Excel, and PowerPoint
August 26th - 6 hour practical case study
Group C Schedule:
August 30th - 6 hour session on fundamentals of Word, Excel, and PowerPoint
August 31st - 6 hour practical case study
67
Course Outline - Corridor Application
*Note– All employees of the company will participate in the week long training.
Objectives:
To properly evaluate the Maintenance Planning & Control department’s current knowl-
edge of aviation service providers.
To train engineers at a steady pace so that the information is not too overwhelming
Group A Schedule:
September 6th - 6 hour session of Corridor services
September 7th - 6 hour session of Corridor services
September 6th - 6 hour session of Corridor services
September 8th - 6 hour practical case study
Group B Schedule:
September 13th - 6 hour session of Corridor services
September 14th - 6 hour session of Corridor services
September 15th - 6 hour session of Corridor services
September 16th - 6 hour practical case study
Group C Schedule:
September 20th- 6 hour session of Corridor services
September 21st - 6 hour session of Corridor services
September 22nd - 6 hour session of Corridor services
September 23rd - 6 hour practical case study
Course Outline - Catia Application
*Note- Only the Engineering Department will participate in the week long training
Objectives:
To properly evaluate the engineering department’s current knowledge of Catia.
To train engineers at a steady pace so that the information is not too overwhelming.
Group A Schedule:
October 4th - 6 hour session of Catia Fundamentals
October 5th - 6 hour session of Catia Programming
October 6th - 6 hour session of Catia Programming & Design
October 7th - 6 hour session of Catia Design
October 8th - 6 hour practical case study
68
References:
http://articles.techrepublic.com.com/5100-10878_11-1036375.html?tag=content;leftCol
http://articles.techrepublic.com.com/5100-10878_11-5032139.html?tag=content;leftCol
http://articles.techrepublic.com.com/5100-10878_11-1049089.html?tag=content;leftCol
Group B Schedule:
October 11th - 6 hour session of Catia Fundamentals
October 12th - 6 hour session of Catia Programming
October 13th - 6 hour session of Catia Programming & Design
October 15th - 6 hour session of Catia Design
October 15th - 6 hour practical case study
Group C Schedule:
October 18th - 6 hour session of Catia Fundamentals
October 19th - 6 hour session of Catia Programming
October 20th - 6 hour session of Catia Programming & Design
October 21st - 6 hour session of Catia Design
October 22nd - 6 hour practical case study
Course Outline - Informational Technology Support
*Note- Only the IT Department will participate in the week long training
Objectives:
To properly evaluate the IT department’s current knowledge of IT solutions
To train IT technicians at a steady pace so that the information is not too overwhelming.
Group A Schedule:
November 1st - 6 hour session of Networking Solutions
November 2nd - 6 hour session of Reviewing the Programs in Use at Company
November 3rd - 6 hour session of Troubleshooting Solutions
November 4th - 6 hour session of Troubleshooting Solutions/ System Administrator Training
November 5th - 6 hour practical case study
Group B Schedule:
November 8th - 6 hour session of Networking Solutions
November 9th - 6 hour session of Reviewing the Programs in Use at Company
November 10th - 6 hour session of Troubleshooting Solutions
November 11th - 6 hour session of Troubleshooting Solutions/ System Administrator Training
November 12th - 6 hour practical case study
Group C Schedule:
November 15th - 6 hour session of Networking Solutions
November 16th- 6 hour session of Reviewing the Programs in Use at Company
November 17th - 6 hour session of Troubleshooting Solutions
November 18th - 6 hour session of Troubleshooting Solutions/ System Administrator Training
November 19th - 6 hour practical case study
69
APPENDIX A
SYSTEM REQUIREMTS PROPOSAL WORKSHEET
Overall System Requirements:
4 The bidder's products must execute in a dynamic, secure environment and all company
computers will use the Windows operating system.
The operating system that will be used is Windows 7 Professional Edition. All workstations
will be protected by Trend Micro Internet Security software for 15 months. SUSE Linux
Enterprise server 10 will be used as operating software for all integrated servers.
4 All computers and associated peripherals will be networked.
All elements of the network will be integrated using CAT5e cables and Wi-Fi.
Overall Software Requirements:
4 Network all company computers using a Windows-based operating system.
All workstations and laptops are networked with each other using Windows 7 Professional
Edition as an operating system
4 Establish a company-wide intranet.
All networked elements will have access to company-wide intranet. Every employee will
have their own username and password provided by the network administrator to allow se-
cure access to the intranet.
4 Provide secure Internet access for all users.
All the workstations will be connected to the internet. The internet service will be provided
by New Edge Networks with a 1.5M T1 connection. New Edge Network guarantees net-
work availability of 99.9% or better. Secured Wi-Fi access will be provided throughout both
facilities.
4 Use technologies such as fiber, satellite, the Internet, etc., as appropriate.
The network will utilize CAT5e cables, switches, Wi-Fi routers, Wi-Fi Access Points to
connect all workstations and peripherals. A T1 router modem will be used to gain broad-
band access to the internet.
Office and Productivity Software Requirements:
4 Word processing
Microsoft Word 2007 will be used as the word processing software. This version enables
communication more effectively with SmartArt diagrams and new charting tools. Word
2007 helps information workers create professional looking content quickly. A host of new
tools enable the user to construct documents from pre-defined parts and styles that allow
workers to increase productivity efficiently.
4 Spreadsheets
Microsoft Office Excel 2007 allow users to create and format spreadsheets. It is also used to
analyze and share information to make more informed business decisions. Excel 2007 al-
lows users to share sensitive business information more broadly with enhanced security
among work groups.
4 Database management
Oracle Database Standard Edition is a full featured database for servers with up-to 4 sock-
ets. The software manages all data types and enables all the business applications to take
advantage of the performance, reliability, security and scalability.
71
Office and Productivity Software Requirements:
4 Presentation graphics
Microsoft Office PowerPoint 2007 enables users to quickly create high impact dynamic
presentation by integrating workflow and ways to easily share information. Integration with
Windows Media Player allows users to integrate audio and video into a slideshow.
4 Email
Microsoft Outlook 2007 provides an integrated solution for managing time and information,
connecting across boundaries, and remaining in control of the information that needs to be
reached to the user. Key features include automatic grouping of messages, junk e-mail han-
dling and improved reading views and also allows users to flag messages.
4 Scheduling
In addition to e-mail abilities, Microsoft Office Outlook 2007 also provides solutions for
scheduling. Outlook 2007 delivers innovations in order to manage daily priorities by using
the "To-Do" bar. The "To-Do" bar provides a consolidated view of upcoming events, tasks,
calendar, making it easy to act on information. ScheduleAnywhere is also going to be used.
This is an internet based scheduling software that allows employees to access their schedule
from anywhere.
4 Project management
ProjectManager.com will be providing all the solutions for project management. They offer
a wide range of services that include project planner, tracking, sharing, and reporting.
Teams can be managed online from any geographic location.
4 CAD
CATIA is a multi-platform CAD/CAM/CAE commercial software suite developed by Das-
sault Systems. CATIA supports multiple stages of product development from conceptualiza-
tion, design, manufacturing and engineering.
4 Internet browser
Internet Explorer 8 is faster, safe and easier to use than the previous versions. With visual
suggestions and accelerators, Internet Explorer 8 is easy to navigate and fast. The browser
also protects users from Malware threats. Many new features such as an automatic crash
recovery, content filtering and smart screens protect the user's internet experience.
4 Network operating system
SUSE Linux Enterprise Server 10 is the network operating system of choice for applica-
tions, web services and infrastructure delivering high reliability and performance and supe-
rior business value. This software is highly reliable, scalable and secure server operating
system, built to power both physical and virtual mission critical workloads. Linux Enter-
prise Server is designed to work with Windows and other operating systems making it the
ideal choice for a mixed environment.
Maintenance Software Requirements:
4 Provide maintenance software (from vendors) that allows for planning and control of air-
craft maintenance on large (including wide-body) aircraft.
Corridor Workgroup Edition was selected to satisfy the maintenance software requirements.
corridor eliminates manual efforts, reduces redundancies, lowers costs, improve speed and
empowers employees to perform higher levels of direct service. Corridor's module set al-
lows for customization of software to suit company's specific needs
72
License QTY
Corridor Work Group Edition* 45
Annual Support** 45
Oracle License (1 Processor) 1
Oracle Support (Annually – 1 Processor) 1
Installation & Implementation 1
Maintenance Software Requirements:
4 Hardware proposed will support maintenance software.
Datalogic QuickScan 6500 BT Scanner, a RS232 protocol compliant device, fully decoded
and reads track 1 and 2 will be acquired to support the maintenance software. MagTek
Stripe Reader Card Scanner, PS232 protocol with serial port will also be provided.
4 Use Continuum Corridor software per the quote provided by CFAO. You will need the nec-
essary number of Work Group Edition applications, annual support, one Oracle license,
Oracle support and installation & implementation.
Maintenance Software Requirements (cont.)
4 Maintenance software will include work order, work order quote, line sales & management,
inventory, rotable management, account integration, sales order quote, sales order, aircraft,
regulatory compliance, company database, purchase request, purchase order, and shipping
& receiving.
Corridor Software includes all of the above mentioned modules
4 Provide regulatory software as appropriate to large aircraft (must include Airworthiness Di-
rectives, Service Letters, Service Bulletins, etc.).
"The aviation regulatory library system by Aviation DataSource, Inc will be used as the
company's regulatory software. This system is an internet based single source electronic
aviation regulatory library database that includes all airworthiness directives for large and
small aircraft, type certification data sheets, FARS, CARS, and JARS. Over 350000 files
are in the system and are available by request.
The system should include utilities for:
4 Installation
SUSE Linux Enterprise Server 10 ships with a unique set of server administration, configu-
ration and deployment tool called YaST. This allows administrators to easily install and up-
grade software and operating systems from a central location.
4 Recovery
All the servers are factory equipped with Symantec Backup Exec system Recovery 2010
Server Edition. The software is a simple, cost effective back-up and recovery solution for
businesses that help minimize down time and avoid disaster by easily recovering individual
data, files, folders or complete windows system in minutes, even to different hardware, vir-
tual environment or remote locations.
4 Back-up
All the servers are factory equipped with Symantec Backup Exec system Recovery 2010
Server Edition. The software is a simple, cost effective back-up and recovery solution for
businesses that help minimize down time and avoid disaster by easily recovering individual
data, files, folders or complete windows system in minutes, even to different hardware, vir-
tual environment or remote locations.
73
The system should include utilities for:
4 Security
All workstations come equipped with Trend Micro Internet Security. The software protects
against viruses and defends personal information with a anti-spyware technology. A per-
sonal firewall defends against attacks through the internet.
4 On-line help and documentation
Titan Technologies will provide all the documentation and help on-line through its website.
Titan Technology will acquire all necessary documents from different vendors and offer
them at one website for our customers at www.titantech.com.
Workstation Components:
4 Make and model:
Low End Workstations : Dell OptiPlex 380 MT
High End Workstations : Dell Precision T1500
Hangar Laptops : Panasonic Toughbook 52
Executive Laptops : HP EliteBook 8440W Mobile Workstation
4 Processor, processor speed
Dell OptiPlex 380 MT - Intel Core 2 Duo (2.93 GHz, 1066 MHz FSB)
Dell Precision T1500 - Quad Core Processor CORE i5 (2.64 GHz, 8MB)
Panasonic Toughbook 52 - Intel Core 2 Duo P8400 2.26GHz (Centrino)
HP EliteBook 8440W Mobile Workstation - Intel Core i7-620M 2.66GHz, 4MB L3 Cache
4 Amount of RAM
Dell OptiPlex 380 MT - 2GB DDR 3 Non-ECC SDRAM, 1066 MHz (2 DIMM)
Dell Precision T1500 - 2GB DDR 3 Non-ECC SDRAM, 1066 MHz (2 DIMM)
Panasonic Toughbook 52 - 2GB
HP EliteBook 8440W Mobile Workstation - 4GB, 1333MHz DDR3 SDRAM
4 Hard drive size
Dell OptiPlex 380 MT - 320 GB SATA 3.0 GB/s and 16MB DataBurst Cache
Dell Precision T1500 - 320 GB SATA 3.0 GB/s 7200 RPM and 16MB DataBurst Cache
Panasonic Toughbook 52- 160GB
HP EliteBook 8440W Mobile Workstation - 320GB, 7200RPM SATA II
4 Other drives
Dell OptiPlex 380 MT - 16x DVD-ROM, Cyberlink Power DVD
Dell Precision T1500 - 16x DVD-ROM, Cyberlink Power DVD
Panasonic Toughbook 52 - 8x DVD+/-R/RW with double layer support
HP EliteBook 8440W Mobile Workstation - DVD+/-RW SuperMulti DL LightScribe
4 Printer make and model (networked and/or stand-alone)
Black and White : HP LaserJet P2055dn
Multifunction : HP LaserJet M1522
Plotter : HP Designjet T620 printer
4 Monitor make, model and size
Dell OptiPlex 380 MT - Dell E Series E1910H 18.5in wide monitor, VGA only
Dell Precision T1500 - Dell Professional 1909W 19in wide monitor, VGA/DVI
Panasonic Toughbook 52 - 15.4in wide screen display
HP EliteBook 8440W Mobile Workstation - 14in diagonal backlit HD+ antiglare
74
Workstation Components:
4 Any network or telecommunication devices
Dell OptiPlex 380 MT - PCIE 10/100/1000
Dell Precision T1500 - PCIE 10/100/1000
Panasonic Toughbook 52 - PCIE 10/100/1000.
Wireless - 802.11 A/B/G/N
HP EliteBook 8440W Mobile Workstation - PCIE 10/100/1000.
Wireless - Intel Centrino Ultimate-N 6300, 802.11 A/B/G/N, Bluetooth 2.1
4 Any necessary audio hardware
There are no necessary audio hardware required. However, the laptops come equipped with
integrated speakers.
Other Hardware:
4 Servers
Dell PowerEdge T710
Processor : (x2) Intel Xeon E5630 2.53GHz, 12M Cache, Turbo HT, 1066MHz
RAM : 12GB (6 x 2GB), 1333MHz Dual Ranked RDIMMs
Hard drive : 300GB 10K RPM Serial-Attach SCSI 6GBPS
Monitor : 17in LCD
Networking: Broadcom 5709 Dual Port 1GBE NIC W/TOE iSCSI, PCIe-4
4 Storage array
Dell PowerVault MD 3000
Hard drive: 2X 2TB 7.2K RPM universal SATA 3.5in
4 Firewall
Microsoft Windows 7 Professional edition already has inbuilt firewall capabilities. In addi-
tion all the routers are integrated with inbuilt firewall. The Cisco Catalyst switch offers inte-
grated security that includes network admission control, advance quality of service.
4 Connection (NIC or Modem)
The connection between the network components and to the internet will be through the
NIC port. This connection will enable the component to receive and exchange data and ap-
plications. The network is connected to the internet via a T1 router provided by the ISP.
4 Cables (estimate an average of 10 yards per connection if used)
CAT5e cables are going to be used to connect all the network components. It can support
speeds up to 100Mbps. Cables to go network cable kit will be used to network the system.
The kit includes 1000ft of CAT5e cable, 50 pack of RJ45 connectors, RJ45 crimp tool and
cable continuity tester using an estimate of 30ft/connection we estimate that we require 10
kits.
4 Hubs, repeaters, bridges, switches or routers
Cisco Catalyst 2960-24TC- 24 port switch
Cisco Catalyst 2960-48TT- 48 port switch
Cisco 1941 integrated service router
D-Link - Xtreme N Duo Wireless-N Bridge/Access point
4 Server racks
Not required since the servers use tower chassis
4 UPS
HP UPS T1500 G3-950WATT-1400VA. Only the servers, storage array and the database
are connected to the UPS.
75
Minimum Hardware Requirements:
4 2 GB of RAM per workstation
4 100 GB of hard drive space per workstation
4 2 GHz processor speed
4 4 TB storage capability for entire network (storage array, server, etc.)
4 Total back-up capability including all data and applications (preferably offsite)
HP StorageWorks Ultrium 960-TapeDrive- LTO Ultrium - SCSI
Storage Media - HP LTO Ultrium x 20 - 200GB
The system should allow for:
4 User ID and password protection.
Novell SecureLogin simplifies the enterprise single Sign-on implementation. Novell Se-
cureLogin effectively reduces the number of password reset calls to the helpdesk.
4 Security administration that is centrally controlled on-site.
The YaST tools in SUSE Linux Enterprise Server 10 allows administrators to automatically
and transparently configure, update and troubleshoot workstations from wherever they are
without having to physically visit each device. Using policies, administrators can generate
and maintain work environments with content and applications according to the personal
needs of each user. As a result, users access their work environments and applications in a
simple, consistent way from any device, at any location. Novell Identity Manager provides
capabilities such as identity lifecycle management, Access Management, Enterprise Single
Sign-on, Password Management.
4 Complete archival capability to meet FAA and other regulatory requirements.
SUSE Linux Enterprise Server 10 enables IT administrators to simplify storage manage-
ment. Without an effective storage-management solution, the risks could range from lost
data to more serious threats like litigation or negative audit findings. SUSE Linux 10 helps
minimize these risks with automated policy management, ensuring compliance with corpo-
rate and government regulations for secure data storage.
The aircraft maintenance planning and tracking system should provide for:
4 Flexible reporting capacity.
As many aircrafts as needed can be added to the reports
4 Easily modified standard reports.
Standard reports can be easily modified by adding or excluding fields of information.
4 Ability to write special reports.
Any report can be customized
4 Trend reporting.
It is a part of "Reliability Report"
4 Linkage/download into other software (e.g. spreadsheets, word processing, database, etc.)
Corridor integrates with all Microsoft Office Programs
4 Be menu-driven to lead inexperienced users through the system.
Users inexperienced with the system can easily use the system by the menus provided
4 Allow an experienced user to by-pass menus.
Shortcuts provide direct access to most commonly accessed information for an experienced
user to by-pass the menus
76
Network Management and Administration:
4 Provide easy-to-read documentation, including both technical and user manuals.
All documentation will be provided by the software and hardware vendors
4 Provide an IT policy manual which includes a recommended employee computer-use
policy, security processes, sanctions for misuse, etc.
All IT policies that Titian Technologies Consulting recommend to be adapted by a client for
their system are available from the consulting team or through the client section of our web
page.
4 Include network management policies such as maintenance rules, software installation, indi-
vidual data back-up, etc.
All IT policies that Titian Technologies Consulting recommend to be adapted by a client for
their system are available from the consulting team or through the client section of our web
page.
Installation:
4 Installation assistance.
Installation of the system will be either taken care of by a team of Titian Technology Con-
sulting employees, or is included in the price of the equipment. All outside installation is
limited to specific software applications.
4 Implementation assistance.
Implementation assistance will be part of Titian Technology Consulting’s services provided.
4 Is a qualified technical representative provided on-site to install the system? If not, describe
installation alternatives and the level of technical knowledge required.
Yes, there will be a team of Titian Technology Consulting employees who will be installing
and testing the network. They workers will be supervised by a site supervisor who will be
there when company employees are working.
4 Describe how the bidder ensures that newly installed systems are adequately tested.
Titian Technologies has an intensive 3 week testing process that will be conducted along
with a quality control measures inspection, that will be conducted by the site supervisor.
Training:
4 Technical training (IT support staff).
During the training evolution part of this project there will be IT support training, the dates
for this training will be November 1, 2010 though November 19, 2010
4 End-user training.
There are three different elements of training for this project. There will be Microsoft Of-
fice and Corridor Training for all employees. The dates for this training will be August 23,
2010 through August 31, 2010 and September 6, 2010 through September 23, 2010 respec-
tively.
4 Helpdesk counselor training.
Titian Technologies Consulting believes that the Helpdesk should be a 365-7-24. With this
thought in mind Titian Technology offers a outsourced helpdesk that can offer this service.
4 System administrator training.
System administrator training is part of the IT Support Training. This is because we believe
that the individuals who control the system is the IT Department.
77
Technical and Maintenance Support:
4 Telephone support.
This is filled through the uses of a 1-800 hotline..
4 The command files required to run the system, with complete operator's documentation
This will be held within the IT department and located on a section of Titian Technologies
Consulting’s website that is dedicated to clients.
4 Custom modifications.
Custom modifications was considered through out the project process. From the use of lap-
tops in the hanger and for the Senior Executives of the company to the selection of training
process.
4 Describe who will provide long-term support and system enhancements to the proposed
system and the availability to provide such support.
Through the use of the consultant team, clients will continually find that they are able to
have one individual to turn to if up-grades and expansion is required by the client.
4 Describe the on-going level of support and procedure for "bug-fixes" provided by the bid-
der.
Through the use of the consultant team, clients will continually find that they are able to
have one individual to turn to if up-grades and expansion is required by the client.
4 Warranties included with equipment purchased.
All items that are within the project were considered because of the warranties that were
available.
4 Provide three years of IT technical support.
Most of the equipment and software includes this support, and where it is not included by
the manufacture Titian Technologies Consulting services include through the use of the
consultant team.
4 Provide three years of maintenance support.
Most of the equipment and software includes this support, and where it is not included by
the manufacture Titian Technologies Consulting services include through the use of the
consultant team.
System Integration:
4 List integration services to be performed.
Installation and Testing Team
End User Training
User section of the Titian Technologies Consulting website (www.titiantech.com)
Username and Passwords
365-7-24 Helpdesk
Use of both wired and wireless systems
78
APPENDIX B
EQUIPMENT SCREENSHOTS
Computers:
Precision T1500
79
OptiPlex 380 MT
80
Laptops:
Toughbook 52
81
Laptops:
HP EliteBook 8440w Mobile Workstation
82
Printers:
HP LaserJet P2055dn
83
HP LaserJet M1522
84
Plotter:
HP Designjet T620
85
Server:
86
Storage Array:
87
Tape Dive:
88
Tape Media:
89
Switches:
48 Port Switch
90
24 Port Switch
91
Switches:
Network Switch
92
Router:
Integrated Router
93
UPS:
94
Network Cable Kit:
95
Internet Connection Equipment:
CAT 5E Cable: Belkin Bulk Cable - 1000 ft
96
RJ-45 Connector
97
Router:
98
WIFI Access Points:
99
Surge Protectors:
100
Barcode Reader:
Card Reader:
101
Scheduling Program:
500 Employee Price per month
102
Database Management:
103
Project Management:
# users at price Cost Cost breakdown
1 $25.00 $25.00
24 $10.00 $240.00
25 $8.00 $200.00
50 $6.00 $300.00
150 $4.00 $600.00
250 $2.00 $500.00
Total cost per month $1,865.00
104
Corridor
105
CAD:
Catia
106
Computer Security Logon:
Quantity Unit Price Total
SecureLogin 7.0 1-User License + 1-Year Priority
Maintenance 500 33.200 16,600.00
IDM 3.6 IU + 1 Yr Priority Maintenance 500 23.730 11,865.00
IDM Roles Based Provisioning Mod 3.6 IU Lic + 1 Yr
Priority Maintenance 500 15.160 7,580.00
Sub total 36,045.00
Tax 2,523.15
Total 38,568.15
Re-calculation for number of users at the Company
107
Internet Service Provider: (highlighted section is for this RFP)
108