Saturday 20 June 2015

MMT2 Task 1

MMT2 Task 1
MMT2 IT Strategic Solution Task 1
Task:
Write a proposal to the CTO of AEnergy Company in which you do the following:
A. Perform a SWOT analysis of the existing IT infrastructure by doing the following:
1. Evaluate the existing strengths of the current IT infrastructure.
2. Evaluate the existing weaknesses of the current IT infrastructure.
3. Analyze opportunities for updating technology within the current IT infrastructure.
4. Analyze threats that could result from continued use of the current IT infrastructure.
MMT2 IT Strategic Solution Task 1
Task:
Write a proposal to the CTO of AEnergy Company in which you do the following:
A. Perform a SWOT analysis of the existing IT infrastructure by doing the following:
1. Evaluate the existing strengths of the current IT infrastructure.
2. Evaluate the existing weaknesses of the current IT infrastructure.
3. Analyze opportunities for updating technology within the current IT infrastructure.
4. Analyze threats that could result from continued use of the current IT infrastructure.


MMT2 Task 1,
MMT2 IT Strategic Solution Task 1
Task:
Write a proposal to the CTO of AEnergy Company in which you do the following:
A. Perform a SWOT analysis of the existing IT infrastructure by doing the following:
1. Evaluate the existing strengths of the current IT infrastructure.
2. Evaluate the existing weaknesses of the current IT infrastructure.
3. Analyze opportunities for updating technology within the current IT infrastructure.
4. Analyze threats that could result from continued use of the current IT infrastructure.
MMT2 IT Strategic Solution Task 1
Task:
Write a proposal to the CTO of AEnergy Company in which you do the following:
A. Perform a SWOT analysis of the existing IT infrastructure by doing the following:
1. Evaluate the existing strengths of the current IT infrastructure.
2. Evaluate the existing weaknesses of the current IT infrastructure.
3. Analyze opportunities for updating technology within the current IT infrastructure.
4. Analyze threats that could result from continued use of the current IT infrastructure.

No comments:

Post a Comment