112

Rfp Response Proof 8

Embed Size (px)

DESCRIPTION

Response to Request for Proposal of Central Florida Aircraft Overhaul - School Project

Citation preview

Page 1: Rfp Response Proof 8
Page 2: Rfp Response Proof 8
Page 3: Rfp Response Proof 8

TABLE OF CONTENTS

Company Background ……………………………………………………………………

Company Mission Statement ……………………………………………………………..

Company Objectives ……………………………………………………………………..

Company Value Statements ………………………………………………………………

Executive Profiles

Ainsley Robson, Chief Executive Officer ……………………………………….

Ian Myers, Chief Operations Officer ……………………………………………..

Jon Wiesberg, Chief Financial Officer …………………………………………..

Vishal Narayan, Chief Information Officer ………………………………………

Priyesh Patel, Chief Technology Officer ………………………………………..

Sanjay Naidoo, Chief Security Officer …………………………………………..

System Selection

Basic Hardware Selection ………………………………………………………..

Selection By Department …………………………………………………………

Basic Software Selection ……………………………………………………...…

Warranty Information ……………………………………………………………

Budgeting Information

Base Project Budget ………………………………………………………………

Continuing Future Budget Information …………………………………………..

Cost Explanation …………………………………………………………………

Project Timeline …………………………………………………………………………..

Network Set-up Overview ………………………………………………………………..

Individual Office/Building Networks

Administration …………………………………………………………………..

Zone 1 (FAA Liaison/ Customer Liaison/ Engineering/ Maintenance)….

Zone 2 (Accounting/ Human Resources/ IT/ Marketing/ Publications &

Regulatory Data/ Sales & Contracts) …………………………………….

Zone 3 (Vice Presidents Offices/ President Office)……………………….

Maintenance Facility ……………………………………………………………..

Information Technology Policies

Introduction ……………………………………………………………………...

Acceptable Use Policy ...………………………………………………………….

Internet Usage Policy ……………………………………………………………..

Anti-Spam Policy ………………………...……………………………………….

Instant Message Policy …………………………..……………………………….

Software Installation Policy …………………………..…………………………..

Training Program

Introduction …………………………………………..…………………………..

Training Outline - Microsoft Office 2007 ……………………………………….

Training Outline - Corridor Application ………………………………………...

Training Outline - Catea Application ……………………………………...…….

Training Outline - Information Technology Support …………………………….

Appendix

RFP Checklist ……………………………………………………………………

Equipment Screenshots ………………………………………………………….

1

2

2

3

5

9

13

15

17

18

23

24

27

28

29

29

30

33

43

45

46

48

53

55

57

58

60

62

63

64

65

67

68

68

69

71

79

Page 4: Rfp Response Proof 8
Page 5: Rfp Response Proof 8

COMPANY BACKGRAOUND AND WHO WE ARE

Titian Technologies Consulting began 5 years ago through providing small “mom and

pop” businesses with Information Technology Systems in order to facilitate their growth. Since

our beginning, we have always felt that it is important to provide personalized IT services that

mold perfectly to the desired business model and needs of our clients.

Today, our company has grown in size from its initial offering of services to small

“mom and pop” business to serving mid-size companies in a similar manner. Our company

growth has sparked excitement throughout the company and further boosts our confidence in

what we do for the people we love.

It is our profound dedication to serving clients exceptionally well that has continually

set us above our competitors. In our commitment to stay true to our past, we have provided each

of our clients with a personal consultant who is designated to finding, serving, and sustaining

the needs of our clients. Furthermore, our personal consultants act as the gatekeeper of

information between clientele needs during the project’s beginning and throughout its

longevity.

The personal consultant is an experienced and highly qualified individual in customer

service and project management. Like out dedication to serving our clients, it is our well

qualified consultants that set us aside from our competitors. Under this personal consultant

(project manager), we provide a team of individuals who specialize in technologies and sales

and marketing who further facilitate the business needs of our clientele.

As a part of our commitment to the client, we analyze the individual needs of the overall

client and, for example, provide catered services such as offering a department who needs

mobile technology, mobile technology. It is a simple methodology that works well and makes

you, the customer, feel good about your decision to use us as your consultant.

We also strive to provide for the economic and social responsibilities that are important

in today’s society. For instance, each piece of hardware that we equip within a building is

energy-efficient which benefits the customer two-fold: reduces expenses and protects the

environment. Also, we participate in the “Build-a-Forest” program where we plant a tree for

each computer we install for our clients.

Now that you know a little about our history and who we are, feel free to contact us for

more information via email or on one of our toll-free lines.

1

Page 6: Rfp Response Proof 8

MISSION STATEMENT

To provide personalized, quality IT

consultation for organizations that need to

advance their IT solutions.

OBJECTIVE

Provide each of our customers with an in-house

consultant specific to each client. In addition,

to provide 365-7-24 technical support.

Offer quality consulting based IT services

personalized to each department/division of the

department

To return an annual investment of 12% profit

To interact in local community volunteer

programs, such as the Special Olympics and

“Build-a-Forest” Program.

Provide our customers with energy-efficient

“green” products. 2

Page 7: Rfp Response Proof 8

VALUES

STATEMENT

Winning Attitudes

One-on-One Service

Integrity

Loyalty

Socially Responsible

Teamwork

3

Page 8: Rfp Response Proof 8
Page 9: Rfp Response Proof 8

EXECUTIVE TEAM MEMBERS

Ainsley Robson

Chief Executive Officer

Project Manager

Areas of Expertise:

Customer Service; Project Management; Public Relations

It is my pleasure to introduce my self as the Chief Executive Officer (CEO) for Titian

Technologies Consulting. As the CEO of this company it is my responsibility to set the

direction for the company and encourage my employees to perform to the maximum of their

abilities.

For each of our clients my staff and I continue to work towards holding true to the ideals

that the company was founded upon and ensure that the client is the number one priority. In

ensuring this I also have often taken part in the consulting process with maintaining my own

client role as a project manager.

As a proud graduate of Embry Riddle Aeronautical University with both my Bachelor of

Science in Safety Science and Master of Business Administration, I continue to work toward

excelling to the highest potential that can be meet.

5

Page 10: Rfp Response Proof 8

6

Page 11: Rfp Response Proof 8

7

Page 12: Rfp Response Proof 8
Page 13: Rfp Response Proof 8

EXECUTIVE TEAM MEMBERS

Ian Myers

Chief Operations Officer

Areas of Expertise:

Financing; Budgeting; Project Management

As the Chief Operating Officer (COO) for Titan Technologies Consulting, I

oversee the day-to-day operations of the company as well as coordinate the strategic planning

for our future operations. In addition to the latter business functions, I aid in the implementation

of services to our customers by ensuring the delivery of our products/services meets the needs,

expectations, and wants of our clientele. I’ve been with the company since its incorporation

and, as a member of this company, have helped the company grow to its outstanding reputation

within the IT consulting industry.

9

Page 14: Rfp Response Proof 8

10

Page 15: Rfp Response Proof 8

11

Page 16: Rfp Response Proof 8
Page 17: Rfp Response Proof 8

EXECUTIVE TEAM MEMBERS

Jon Weisberg

Chief Financial Officer

Areas of Expertise::

Customer Service; Project Management; Sales

As the Chief Financial Officer (CFO) for Titan Technologies Consulting, I am

responsible for the company’s corporate finance, financial planning, tax, accounting, investor

relations, personal auditing, and risk management. My obligations as CFO is to provide your

company with the best possible financial plan to save you money as well as receive the best

possible service possible. To do this, we will meet constantly to develop a budget and plan that

meets your financial needs. With a staff including certified C.P.A’s as well as C.F.A’s, we

continually work towards supporting the mission of the company by maintaining balanced

budgets and find ways to save money.

Personally, I am a graduate of Embry Riddle Aeronautical University with a Master of

Business Administration with a specialization in Finance. Through numerous jobs and

positions within the Financial aspect I have worked up the ranks to become CFO for Titan

Technologies Consulting.

13

Page 18: Rfp Response Proof 8

14

Page 19: Rfp Response Proof 8

EXECUTIVE TEAM MEMBERS

Vishal Narayanaswamy

Chief Information Officer

Areas of Expertise::

Project Management; Information Technology

Information has always proven to serve as the backbone to a company and its success. It

is my job as the Chief Information Officer (CIO) for Titian Technologies Consulting to main-

tain the Information Technology Systems and its long-term requirements. As the company’s

CIO, it is my responsibility to oversee all uses on information technology and to ensure the stra-

tegic alignment of IT with our business goals and objectives.

Together, with my team and fellow Executive Officers, we continually strive to have

both the most suitable technology and to have updated information at Titian Technologies Con-

sulting as well as the latter for our clientele base. Furthermore, it is my personal privilege to en-

sure that the delivery of all IT projects is on time and within budget.

15

Page 20: Rfp Response Proof 8

16

Page 21: Rfp Response Proof 8

EXECUTIVE TEAM MEMBERS

Priyesh Patel

Chief Technology Officer

Areas of Expertise::

Financing; Budgeting; Information Technology

It is my pleasure to serve as the Chief Technology Officer (CTO) for Titian

Technologies Consulting. In this position I work on using my knowledge of Information

Technology Systems to ensure that the throughput, speed, accuracy, availability, and reliability

of our organizations systems are working at their peak efficiency and effectiveness in order to

adequately provide customer service to each of our clients. Also, my department works on

continually updating our systems database on available technology for on-time, available

clientele use.

17

Page 22: Rfp Response Proof 8

18

Page 23: Rfp Response Proof 8

EXECUTIVE TEAM MEMBERS

J. Sanjay Kiran Naidoo

Chief Security Officer

Areas of Expertise::

Computer Software; Engineering

In the world of Information Technology, one of the biggest threats to an organization is

the security of the IT system. It is my responsibility as the Chief Security Officer (CSO) to

ensure that all systems that are installed within our company and our clients have security

strategies and IT safeguards to protect the systems from hackers and viruses. Within my office,

we continually monitor the integrity of the system, develop policies to protect the systems, and

obtain the most up-to-date anti-viral and spyware software available in the marketplace.

19

Page 24: Rfp Response Proof 8

20

Page 25: Rfp Response Proof 8

21

Page 26: Rfp Response Proof 8
Page 27: Rfp Response Proof 8

HARDWARE SYSTEM SELECTION

Basics

23

Hardware

Category Item Description Quantity Price per

Item Total Price

Workstation Precision T1500 28 1,548.00 43,344.00

Workstation Optiplex 380MT 198 1,140.00 225,720.00

Laptop Toughbook 52 16 2,241.99 35,871.84

Laptop HP EliteBook 8440w Moblie Workstation 5 1,649.00 8,245.00

Printer HP LaserJet P2055dn (B&W) 18 399.00 7,182.00

Printer HP LaserJet M1522 (multi-function) 18 349.99 6,299.82

Plotter HP Designjet T620 Printer series 1 2,450.00 2,450.00

Server Dell PowerEdge T710 7 9,819.00 68,733.00

Storage Array Power Vault 1 11,945.00 11,945.00

Tape Drive Q1538A HP Storage Works Ultrium 960 1 2,666.53 2,666.53

Tape Media C8014A HP LTO Ultrium x20-200GB 30 1,061.66 31,849.80

48 port Switch WS-C2960-48TT-L Cisco Caralyst 2960-48TT 7 1,372.25 9,605.75

24 port Switch WS-C2960-24TC-L Cisco Caralyst 2960-24TC 4 1,372.25 5,489.00

UPS HP UPS T1500 G3-UPS-95 Watt 1400VA 8 494.99 3,959.92

Network Cable Cables to Go network cable kit 6 146.99 881.94

Cable Connec-

tors RJ-45 Belkin Network Connectors (100 pcs) 17 23.99 407.83

Router Cisco 1941 Intergrated Service Router 2 1,294.62 2,589.24

WIFI Access D-Link Xtreme N Duo Wireless-N Bridge/

Access Point 8 99.99 799.92

Barcode Scanner Datalogic Quickscan 6500BT Scanner 4 437.90 1,751.60

Card Scanner 21088045 MagTek Stripe Reader Card Scanner 4 180.00 720.00

Switch Cisco Catalyst 4900M 1 10,080.00 10,080.00

Router Cisco 3945 Integrated Service Router 1 7,953.33 7,953.33

Firewall D-Link DFL 210 NetDeffend 4-Port 1 354.99 354.99

Surge Protectors Model SS7619-15 18 99.00 1,782.00

Totals 490,682.51

Page 28: Rfp Response Proof 8

By Department

Department Hardware Quantity Price Per Unit Total Costs

FAA Liasion Workstations 4 1,548.00 6,192.00

24 Port Switch 1 1,372.25 1,372.25

Wireless Access Point 1 99.99 99.99

Black & White Printer 1 399.00 399.00

Engineering Workstations 16 1,548.00 24,768.00

Black & White printer 2 399.00 798.00

Multi-Function printer 1 349.99 349.99

Plotters 1 2,450.00 2,450.00

24 Port Switch 1 1,372.25 1,372.25

UPS 1 494.99 494.99

Server 1 9,819.00 9,819.00

Maintenance Planning and

Control

Workstations 25 1,140.00 28,500.00

Black & White printer 3 399.00 1,197.00

Wireless Access Point 1 99.99 99.99

Multi-Function printer 1 349.99 349.99

48 Port Switch 1 1,372.25 1,372.25

Customer Liaison Workstations 6 1,140.00 6,840.00

Black & White printer 1 399.00 399.00

Multi-Function printer 1 349.99 349.99

Accounting Workstations 20 1,140.00 22,800.00

Black & White printer 2 399.00 798.00

Multi-Function printer 1 349.99 349.99

48 port switch 1 1,372.25 1,372.25

Server 1 9,819.00 9,81900

UPS 1 494.99 494.99

Information Technology Workstations 12 1,140.00 13,680.00

Servers 4 9,819.00 39,276.00

UPS 5 494.99 2,474.95

Storage Array 1 11,744.00 11,744.00

Black & White printer 1 399.00 399.00

Wireless Router 1 1,294.62 1,294.62

Multi-Function printer 1 349.99 349.99

48 port switch 1 1,372.25 1,372.25

Storage Array 1 11,945.00 11,945.00

Tape Media 30 1,061.66 31,849.80

Tape Drive 1 2,666.53 2,666.53

Network Switch 1 10,080.00 10,080.00

Network Router 1 7,953.33 7,953.33

24

Page 29: Rfp Response Proof 8

Department Hardware Quantity Price Per Unit Total Costs

Publications & Regulatory

Data

Workstations 8 1,140.00 9,120.00

Multi-Function printer 1 349.99 349.99

Black & White Printer 1 399.00 399.00

24 Port Switch 1 1,372.25 1,372.25

Human Resources Workstations 12 1,140.00 13,680.00

Black & White Printer 1 399.00 399.00

Multi-Function printer 1 349.99 349.99

48 port switch 1 1,372.25 1,372.25

Marketing Workstations 24 1,140.00 27,360.00

Black & White printer 3 399.00 1197.00

Multi-Function printer 1 349.99 349.99

48 port Switch 1 1,372.25 1,372.25

Sales & Contracts Workstations 20 1,140.00 22,800.00

Black & White printer 3 399.00 1,197.00

Multi-Function printer 1 349.99 349.99

48 port Switch 1 1,372.25 1,372.25

Hangar 1 Workstations 12 1,140.00 13,680.00

Laptops 4 2,241.99 8,967.96

Wireless Access Point 1 99.99 99.99

Multi-Function printer 1 349.99 349.99

Server 1 9,819.00 9,819.00

UPS 1 494.99 494.99

Wireless Access Point 1 99.99 99.99

Hangar 2 Workstations 8 1,140.00 9,120.00

Laptop 4 2,241.99 8,967.96

Multi-Function printer 1 349.99 349.99

Wireless Access Point 1 99.99 99.99

Hangar 3 Workstations 8 1,140.00 9,120.00

Laptop 4 2,241.99 8,967.96

Multi-Function printer 1 349.99 349.99

Wireless Access Point 1 99.99 99.99

Hangar 4 Workstations 8 1,140.00 9,120.00

Laptop 4 2,241.99 8,967.96

Multi-Function printer 1 349.99 349.99

Wireless Router 1 1,294.62 1,294.62

V.P. Maintenance Operations Workstations 8 1,548.00 12,384.00

Multi-Function printer 1 349.99 349.99

Wireless Access Point 1 99.99 99.99

Laptop 1 1,649.00 1,649.00

48 Port Switch 1 1,372.25 1,372.25

25

Page 30: Rfp Response Proof 8

Department Hardware Quantity Price Per Unit Total Costs

V.P Human Resources Workstations 6 1,140.00 6,840.00

Laptop 1 1,649.00 1,649.00

Multi-Function printer 1 349.99 349.99

V.P Marketing Workstations 9 1,140.00 10,260.00

Multi-Function printer 1 349.99 349.99

24 Port Switch 1 1,372.25 1,372.25

Laptop 1 1,649.00 1,649.00

V.P Accounting & Finance Workstations 8 1,140.00 9,120.00

Laptop 1 1,649.00 1,649.00

Multi-Function printer 1 349.99 349.99

President Workstations 12 1,140.00 13,680.00

Laptop 1 1,649.00 1,649.00

Wireless Access Point 1 99.00 99.00

Multi-Function printer 1 349.99 349.99

MISC Network Cable Kit 6 146.99 881.94

RJ-45 Connectors (100pcs) 17 23.99 407.83

Surge Protectors 18 99.00 1,782.00

Barcode Scanner 4 437.90 1,751.60

Card Scanner 4 180.00 720.00

26

Page 31: Rfp Response Proof 8

SOFTWARE SYSTEM SELECTION

27

* Note:

All programs having a monthly fee have no set-up or purchase costs associated with them.

Software

Category Item Description Quantity Total Price

Operating System Windows 7 Professional 247 included

Office Applications Microsoft Office 2007 Small Business Edition 247 included

Outlook; PowerPoint Presentation; Excel;

Word; Publisher

Scheduling Schedule Anywhere 500 monthly fee*

Project Management ProjectManagement.com 500 monthly fee*

Internet Service New Edge Network 1 monthly fee*

Enterprise T1 1.5 - Core Coverage 3YR

Maintenance Corridor (minus the annual fee) 45 138,769.00

Database Management Oracle Database Standard Edition

(plus first year support) 1 21,350.00

CAD Catia 1 8,857.00

Computer Logon Novell Secure Logon (total for 500 logons) 38,568.15

Total 207,544.15

Page 32: Rfp Response Proof 8

WARRANTY INFORMATION

Hardware Support Manufacturer

Dell PowerEdge T710 3 Yr ProSupport for IT and Mission Critical 2hr

7X24 Onsite Pack, 5Hr Repair

Dell

Dell Precision T1500 3 Yr ProSupport for end users and 3 Yr NBD

On-site Service

Dell

Optiplex 380MT 3 Yr ProSupport for end users and 3 Yr NBD

On-site Service, 3 year Complete Care

Accidental Damage Protection

Dell

HP Storage Works Ultrium 960 3 Years Warranty HP

HP LTO Ultriumx 20- 200GB

Storage Media

Limited Life time Warranty HP

Cisco 48 Port Switch Limited Life time Warranty Cisco

Cisco 24 Port Switch Limited Life time Warranty Cisco

UPS 3 Years Warranty HP

PowerVault MD3000 3 Yr ProSupport for end users and NBD On-site

Service

Toughbook 52 Protection Plus 3yr Accidental Damage

EliteBook 8440w Mobile

workstation

Limited 3-year standard parts and labor onsite,

7x24 hardware technical phone support, 1 yr

limited warranty on battery

HP

Tripp-Lite Surge Protectors Life time warranty Tripp-Lite

1941 Integrated service router 90 Day warranty, 10 Day replacement period Cisco

Wifi Access Point Best buy

Black & White Printer 1 Year warranty HP

Multi-Function Printer 1 Year Warranty HP

28

Page 33: Rfp Response Proof 8

BASE PROJECT BUDGET

COMPANUY FUTURE BUDGET INFORAMTION

29

Item Description Monthly Rate Yearly Rate

Internet Service (New Edge Network) 289.00 3,468.00

Project Management 1,865.00 22,380.00

Scheduling (Schedule Anywhere) 257.45 3,089.40

Oracle Annual Support 1,100.00

Catia Annual Service Fee 1,563.00

Consulting Team & IT Support Fee 30,000.00

Annual Totals 61,600.40

Category Item Description Quantity Rate Total Price

Consultant Fee Titian Technology Consultation Team 1 200,000 $ 200,000.00

Installation Fee Installation/Test Employee (10 man team per

week) 6 9,000 54,000

Installation Fee Site Supervisor (1 individual) 6 1,200 7,200

Training Fee Microsoft Office 2007 Training (per employee) 500 50 25,000

Training Fee Corridor Application (per employee) 500 100 50,000

Training Fee Catia Application (per employee) 16 100 1,600

Training Fee IT System Solutions (per employee) 12 100 1,200

Sub-total 339,000

Hardware Total Product Price 637,425.78

($472,154.19 + 20% Markup)

Sofware Total Product Price 207,544.15

First Year of Annual Fees (minus the consultant and IT support

fees) 31,600.40

Bid Price 1,183,969.93

Budget 1,500,000.00

Remaining Funds 316,030.07

Page 34: Rfp Response Proof 8

COST EXPLAINATION

30

Service Cost

Titan Technologies Consulting provides a personal consulting team to CFAO. For the

full-time services of our team, we are charging a flat fee of $200,000. This price includes a full

-time lead or Project Manager, which is exclusive to the individual client. Also the price covers

the team of experts that are under the Project Manager which includes a Financial Consultant

and a Information Technology Consultant. Together they work to provide the best IT solution

for their client. Through our research this price is inline with the industry average range for this

consulting service and structure.

The installation and testing of your enterprise architecture will take a total of 6 weeks;

we equate this installation to a cost of $61,200. The team is constructed of a 10 individual team

and a site supervisor to ensure quality control and task management. By taking the average

annual income for a single worker with this type of job description it works out to be $900.00

for each individual worker a week. For the site supervisor we included a $300.00 increase over

the workers, due to the added responsibilities that this individual holds in creating and testing

the IT systems.

The total fees for your training amount to $77,800. For Microsoft Office training, the

cost was figured out by charging all 500 CFAO employees at a rate of $50 per employee. For

Corridor Applications, the cost was figured out by charging all 500 CFAO employees at a rate

of $100 employee. For Catia Applications, the cost for the 16 engineers is at a rate of $100

employee. For IT Systems Solutions, the cost for the 12 employees at a rate of $100 employee.

These rates are able to be accomplished through the concept that we do off-site training at a

location which is owned and operated by Titian Technologies. The reason for the price differ-

ence in the trainings is due to the difference in length of time and the technology systems that

are required for each training evolution.

Hardware Cost

We chose the hardware presented above because it fits into Titan Technologies Consulting’s

core philosophy. The following are the main reasons why we choose the hardware:

Eco-friendly aspects of the hardware (including Energy Efficiency)

Competitively priced High quality of the equipment that is purchased

Titian Technology Consulting Calculations

When we were researching our opportunities for creating a profitable situation for our

company, it was discovered that in order to remain competitive that we should look at a 30

percent markup on products offered. The average for contractors (according to contractor-

talk.com) is to have a 30 to 40 percent markup on services offered. What we have decided on

doing to create out profit is to mark up the physical hardware product that is purchased with a

30 percent markup.

Page 35: Rfp Response Proof 8

31

Hardware 130%

Category Item Description Total Price Markup

Price

Workstation Precision T1500 43,344.00 56,347.20

Workstation Optiplex 380MT 225,720.00 293,436.00

Laptop Toughbook 52 35,871.84 46,633.39

Laptop HP EliteBook 8440w Moblie Workstation 8,245.00 10,718.50

Printer HP LaserJet P2055dn (B&W) 7,182.00 9,336.60

Printer HP LaserJet M1522 (multi-function) 6,299.82 8,189.77

Plotter HP Designjet T620 Printer series 2,450.00 3,185.00

Server Dell PowerEdge T710 68,733.00 89,352.90

Storage Array Power Vault 11,945.00 15,528.50

Tape Drive Q1538A HP Storage Works Ultrium 960 2,666.53 3,466.49

Tape Media C8014A HP LTO Ultrium x20-200GB 31,849.80 41,404.74

48 port Switch WS-C2960-48TT-L Cisco Caralyst 2960-48TT 9,605.75 12,487.48

24 port Switch WS-C2960-24TC-L Cisco Caralyst 2960-24TC 5,489.00 7,135.70

UPS HP UPS T1500 G3-UPS-95 Watt 1400VA 3,959.92 5,147.90

Network Cable Kit Cables to Go network cable kit 881.94 1,146.52

Cable Connectors RJ-45 Belkin Network Connectors (100 pcs) 407.83 530.18

Router Cisco 1941 Intergrated Service Router 2,589.24 3,366.01

WIFI Access D-Link Xtreme N Duo Wireless-N Bridge/Access

Point 799.92 1,039.90

Barcode Scanner Datalogic Quickscan 6500BT Scanner 1,751.60 2,277.08

Card Scanner 21088045 MagTek Stripe Reader Card Scanner 720.00 936.00

Switch Cisco Catalyst 4900M 10,080.00 13,104.00

Router Cisco 3945 Integrated Service Router 7,953.33 10,339.33

Surge Protectors Model SS7619-15 1,782.00 2,316.60

Totals 490,327.52 637,425.78

Below are the markup calculations for the product which is proposed for purchase with this

RFP.

Titian Technologies Consulting’s profit for this project would be $147,098.26.

Page 36: Rfp Response Proof 8
Page 37: Rfp Response Proof 8

PROJECT TIMELINE

33

Page 38: Rfp Response Proof 8

GANTT CHART FOR PROJECT

34

Page 39: Rfp Response Proof 8

35

Page 40: Rfp Response Proof 8

36

Page 41: Rfp Response Proof 8

37

Page 42: Rfp Response Proof 8

38

Page 43: Rfp Response Proof 8

39

Page 44: Rfp Response Proof 8

40

Page 45: Rfp Response Proof 8

41

Page 46: Rfp Response Proof 8
Page 47: Rfp Response Proof 8

NETWORK SET-UP OVERVIEW

43

Page 48: Rfp Response Proof 8
Page 49: Rfp Response Proof 8

INDIVIDUAL OFFICE/BUILDING NETWORKS

Administrative Facility

Zones for easy reference to office location

Zone 1

Zone 2

Zone 3

45

Page 50: Rfp Response Proof 8

Zone 1

FAA Liaison/ Customer Liaison/ Engineering/ Maintenance

46

Page 51: Rfp Response Proof 8

47

Page 52: Rfp Response Proof 8

Zone 2

Accounting/ Human Resources/ IT/ Marketing/ Publications & Regulatory Data/

Sales & Contracts

48

Page 53: Rfp Response Proof 8

49

Page 54: Rfp Response Proof 8

50

Page 55: Rfp Response Proof 8

51

Page 56: Rfp Response Proof 8

52

Page 57: Rfp Response Proof 8

Zone 3

Vice President Office/ President Office

53

Page 58: Rfp Response Proof 8
Page 59: Rfp Response Proof 8

Maintenance Facility

55

Page 60: Rfp Response Proof 8
Page 61: Rfp Response Proof 8

INFORMATION TECHNOLOGY POLICIES

Introduction

This section is a conglomerate of Information Management Policies that Titian Technologies

Consulting suggests for all clients to adopt into their information enterprise architecture. The

purposes of these policies are to ensure the appropriate usage of the systems and the

protection of the systems that Titan Technologies Consulting, Inc. provides its clients.

All policies should be reviewed by the Chief Information Officer (CIO) or another senior

executive to remain within compliance standards of each policy and to enact appropriate

changes where necessary. Furthermore, if necessary, it is suggested that the CIO partner with

executive peers in order to create changes to the policies.

The policies that Titian Technologies Consulting suggests are:

Acceptable Use Policy

Internet Usage Policy

Anti-spam Policy

Instant Message Policy

Software Installation Policy

In order to effectively ensure that all policies are followed, it is best practice to guarantee that

every employee is aware of these policies. In addition, it is Titian Technologies Consulting

suggestion that the latter policies be placed in an employee handbook and stored for future

reference.

References:

http://www.sans.edu/resources/student_projects/200711_002.pdf

www.theiia.org/download.cfm?file=77275

57

Page 62: Rfp Response Proof 8

Acceptable Use Policy

Central Florida Aircraft Overhaul Inc. will provide access to the computer Network, Internet

and email. Your cooperation with all listed rules and recommendations and general etiquette

are required for this access to be continued. If you have any questions or concerns regarding

the provisions of this Policy in general or pertaining to you, please contact the Office of Human

Resources.

You are forbidden to provide any person details of your account information without prior ap-

proval on a per incident basis from your in house implementation officer.

If you violate this policy, your access may be limited or withdrawn. In addition, you may be

subject to disciplinary action, up to and including termination.

1. Your commitment to and responsibilities

By using or accepting your account password and related information, you agree to adhere to

this policy document. You also agree to report any Network, Internet or email misuse to the in

house implementation officer. Misuse includes Policy violations listed or unlisted which harm

any person or the company or which compromise data.

2. Intended period of Usage

Network, Internet and email access extends throughout the term of your contract and employ-

ment, provided you do not violate the Acceptable Usage Policy. Note: The company may sus-

pend access at any time without notice or reason.

3. Purpose of provison of computer privilege.

The company offers access to its Network Internet and email system for business purposes only.

If you are unsure consult the in house implementation officer.

4. Netiquette (Etiquette for the net)

All users are required to maintain the rule of Network etiquette, or Netiquette. You must be

considerate, comply with the acceptable ethics and code of conduct and use the Network, Inter-

net and email appropriately and legally. The company will determine what materials, files, in-

formation, software, communications, and other content and activity are permitted or prohib-

ited, as outlined below.

5. Banned/ Unacceptable Activities

The following activities violate the Company’s Computer Network, Internet and email Accept-

able Usage Policy.

5.1. Sending or receiving offensive, abusive, vulgar or defamatory content.

5.2. Sending or receiving ethnic, sexual-preference, or gender-related slurs or jokes.

5.3. Sending or receiving confidential information about clients or colleagues.

5.4. Conducting unauthorized business.

5.5. Viewing, transmitting, downloading, or searching for pornographic or illegal materials.

5.6. Accessing others’ folders, files, work, networks, or computers.

5.7. Using software that is not licensed or approved by the company.

It is understood that you could receive banned material through no fault of your own. It is ex-

pected that you report this on immediate receipt to the in house implementation officer. If the

in house implementation officer is not available then you should report it to the person of 58

Page 63: Rfp Response Proof 8

nearest authority available and leave word for the in house implementation officer to contact

you urgently on her/ his return.

6. Respect for all confidential information

Some employees may have access to confidential information pertaining to clients, the com-

pany, employees or management. This information should be shared with caution and on a

need to know basis. If in doubt please consult the in house implementation officer.

7. Email Exists for Business Purposes

The company allows email access primarily for business purposes. Employees are prohibited

from using personal email software (Hotmail, etc) for business or personal communications at

the office other than with permission on a per incident basis from the in house implementation

officer.

8. Authorized Personal Use of Email

Employees may use (if requested of and permitted by the in house implementation officer)

email to communicate with family members. Employees’ personal use of email is limited to

lunch breaks and work breaks only. Employees may not use email during otherwise productive

business hours. Employees are prohibited from using email to operate a business, conduct an

external job search, solicit money for personal gain, campaign for political causes or candidates,

or promote or solicit funds for a religious or other personal cause.

9. Privacy

Network, Internet access and email are provided as a tool for our organization’s business. The

computer system is the property of CFAO. CFAO has the legal right to monitor usage of the

Network, Internet and email. Employees have no reasonable expectation of privacy when using

CFAO’s computer system, Network, Internet or email.

10. Violations and consequences

These guidelines are intended to provide CFAO employees with general examples of acceptable

and unacceptable use of the Company’s computer system. A violation of this policy may result

in disciplinary action up to and including termination.

Acknowledgement

If you have any questions about the above policies and procedures, address them to the in house

implementation officer before signing the following agreement.

I have read the company’s Network, Internet and Email Acceptable Usage Policy and agree to

abide by it. I understand and accept that a violation of any of the above policies and procedures

may result in disciplinary action, up to and including my termination.

User Name

User Signature

Date

59

Page 64: Rfp Response Proof 8

Internet Usage Policy

Introduction

Central Florida Aircraft Overhaul, Inc. aims to provide you with accessible, up-to-date and reli-

able information to support you in your work. This goal requires us to provide access to the vast

information resources of the Internet to help you do your job and be well-informed. The Inter-

net is a business tool for Central Florida Aircraft Overhaul, Inc., and is provided to you at a sig-

nificant cost. Users must understand that this access is for the purpose of increasing productiv-

ity and not for non-business activities. Users must also understand that any connection to the

Internet offers an opportunity for non-authorized users to view or access corporate information.

Therefore, it is important that all connections be secure, controlled, and monitored to provide

you with accessible, up-to-date and reliable information and learning technology to support you

in your work, research, and studies

Authorized use

Central Florida Aircraft Overhaul, Inc.'s Internet connection is intended primarily for business

use. That means we expect you to use your Internet access primarily for business-related pur-

poses, i.e., to communicate with customers and suppliers, to research relevant topics, and to ob-

tain useful business information. The following are specific provisions regarding authorized use

of Central Florida Aircraft Overhaul, Inc.'s internet connection:

Internet use should be restricted to sites and materials such as news or information that

might be considered reasonable if read as a text publication in an office environment.

Occasional and reasonable personal use should not interfere with the performance of

work duties and responsibilities.

Unauthorized use

Users shall not use this company's Internet or e-mail services to view, download, save, receive,

or send material related to the following:

Offensive content of any kind, including pornographic material.

Propagate a virus, worm, Trojan horse, or trap-door program code.

Circumvent any system intended to protect the privacy or security of another user.

Visiting Web sites that promote threatening or violent behavior.

Using the Internet for Illegal activities.

The above list of prohibited actions is by way of an example only and is not intended to be ex-

haustive.

User accountability

Users are responsible for their Internet use and are accountable for the following:

Honoring acceptable use policies of networks accessed through the organization’s

Internet services.

Abiding by existing federal, state, and local telecommunications and networking laws

and regulations.

Following copyright laws regarding protected commercial software or intellectual

property.

Privacy and monitoring

Central Florida Aircraft Overhaul, Inc. has software and systems in place to monitor and record 60

Page 65: Rfp Response Proof 8

all Internet usage. Our security systems are capable of recording each Web site and e-mail mes-

sage into and out of our internal networks. We reserve the right to do so at anytime. No em-

ployee should have any expectation of privacy as to his or her Internet usage. Our managers

will review Internet activity and analyze usage patterns, and they may choose to publicize this

data to assure that Central Florida Aircraft Overhaul, Inc. Internet resources are devoted to

maintaining the highest levels of productivity. We reserve the right to inspect any and all files

stored in private areas of our network in order to assure compliance with this policy.

Accidental/unintended violations

Central Florida Aircraft Overhaul, Inc. uses independently-supplied software and data to iden-

tify inappropriate or sexually-explicit Internet sites. We may block access from within our net-

works to all such sites. If you find yourself connected accidentally to a site that contains sexu-

ally explicit or offensive material, you mush disconnect from that site immediately, regardless

of whether that site had been previously deemed acceptable by any screening or rating program.

A user who accidentally accesses a prohibited site is encourage to report the incident to the

company's IT Department without the threat of incurring a violation penalty.

Violation penalties

Violations will be reviewed on a case-by-case basis. If it is determined that a user has violated

one or more use regulations, that user will receive a reprimand from his or her supervisor and

his or her future Internet use will be closely monitored. If a gross violation has occurred, man-

agement will take immediate action. Such action may result in losing Internet privileges, severe

reprimand, or termination of employment.

Reporting

When clear violations of this Internet Usage Policy occur, appropriate IT department staff, the

offender’s managing supervisor, and a company's Human Resource representative will be for-

mally notified. First time offenders will be notified their Internet usage will be closely moni-

tored and IT staff may review the employee’s communications for a period of 3 months. If the

user's Internet usage is deemed appropriate during that time, then no further action will be

taken. If other abuses of this Internet Usage Policy occur during this probationary period, man-

agement and a Human Resources representative will be notified to take appropriate action as

indicated in the Violation Penalties section of this document.

Central Florida Aircraft Overhaul, Inc. intends to enforce this policy, but reserves the right to

change it at any time as circumstances may require. Chief Informational Officer is responsible

for administering this policy and should be contacted should you have any questions or com-

ments concerning this policy.

The employee may not access the Internet via the Central Florida Aircraft Overhaul, Inc.'s net-

work at any time, through any device, unless he/she has read this policy.

61

Page 66: Rfp Response Proof 8

Anti-Spam Policy

Central Florida Aviation Overhaul Inc. has a no tolerance spam policy. Central Florida Aviation

Overhaul Inc. customer support actively monitors large import lists and emails going to a large

number of contacts. Any customer found to be using Central Florida Aviation Overhaul Inc. for

spam will be immediately cut-off from use of the product. If you know of or suspect any viola-

tors, please notify us immediately at [email protected]

Every email contains a mandatory unsubscribe link - those individuals who try to remove this

link will be warned that they are doing so. If the link is removed or de-activated in any way,

Central Florida Aviation Overhaul Inc. will terminate the customer's account.

What is Spam? Spam is unsolicited email also known as UCE (Unsolicited Commercial Email). By sending

email to only to those who have requested to receive it, you are following accepted permission-

based email guidelines.

What constitutes a Preexisting business relationship?

The recipient of your email has made a purchase, requested information, responded to a ques-

tionnaire or a survey, or had offline contact with you.

What constitutes consent?

The recipient of your email has been clearly and fully notified of the collection and use of his

email address and has consented prior to such collection and use. This is often called informed

consent.

Isn't there a law against sending Spam? The federal anti-spam law went into effect on January 1st, 2004 and preempts all state laws.

While this new law will not stop spam, it does make most spam illegal and ultimately less at-

tractive to spammers. The law is specific about requirements to send commercial email and em-

powers the federal government to enforce the law. The penalties can include a fine and/or im-

prisonment for up to 5 years.

How to protect yourself from Spam: Take the Spam Test

1.Are you importing a purchased list of ANY kind?

2.Are you sending to non-specific addresses such as:

[email protected], [email protected], [email protected],

[email protected], or other general addresses.

Are you sending to distribution lists or mailing lists which send indirectly to a variety

of email addresses?

Are you mailing to anyone who has not explicitly agreed to join your mailing list?

Have you falsified your originating address or transmission path information?

Have you used a third party email address or domain name without their permission?

Does your email's subject line contain false or misleading information?

Does your email fail to provide a working link to unsubscribe?

Are you failing to process any unsubscribe requests that come to you via a reply to

your email within 10 days or the request?

62

Page 67: Rfp Response Proof 8

Instant Message Policy

If you have answered YES to ANY of the above questions you will likely be labeled a SPAM-

MER. For more information visit The Coalition Against Unsolicited Email (www.xauce.org)

or contact Constant Contact Customer Support ([email protected])

The use of Instant Messaging technology is limited to the capabilities provided by Central Flor-

ida Aircraft Overhaul, Inc. on internal network services. Workforce members must use the In-

stant Messaging service provided in a manner that protects company assets and Confidential

Information and abide by the rules subject to the policy as outlined below.

Rules

1. Employees are prohibited from downloading and using personal, consumer-grade IM

software (e.g., AOL Instant Messenger, Yahoo!, or MSN) to transmit messages via the

public Internet. Employees who violate this rule are subject to termination.

2. All IM communications and information transmitted, received, or archived in the com-

pany's IM system belong to the company.

3. Employees have no reasonable expectation of privacy when using the company s IM

system. The company reserves the right to monitor, access, and disclose all employee

IM communications.

4. The IM system is intended for business use only. Employees are prohibited from wast-

ing computer resources, colleague’s time, or their own time sending personal instant

messages or engaging in unnecessary chat related to business.

5. Treat IM messages as business records that may be retained and used as evidence in liti-

gation, audits, and investigations.

6. Employees are required to retain all business-related instant messages and delete nones-

sential messages in accordance with the company s written IM retention and deletion

schedule. Please talk to Central Florida Aircraft Overhaul, Inc. compliance officer or

chief information officer if you need a copy or have questions about Central Florida Air-

craft Overhaul, Inc.’s IM retention and deletion policies, practices, and procedures.

7. Always use professional and appropriate language in all instant messages. Employees

are prohibited from sending abusive, harassing, threatening, menacing, discriminatory,

pornographic, disrespectful, or otherwise offensive instant messages.

8. Employees are prohibited from sending jokes, rumors, gossip, or unsubstantiated opin-

ions via IM. These communications, which often contain objectionable material, are

easily misconstrued when communicated electronically.

9. Employees may not use IM to transmit confidential, proprietary, personal, or potentially

embarrassing information about the company, employees, clients, business associates, or

other third parties.

10. Employees may not share confidential, proprietary, or potentially embarrassing business

-related or personal IMs with the media, competitors, prospective employers, or other

third parties.

11. Employees are to share their IM usernames with colleagues strictly on a need-to-know

basis. If you have any questions about the above policies, address them to the compli-

63

Page 68: Rfp Response Proof 8

Software Installation Policy

Overview

Allowing employees to install software on company computing devices opens the

organization up to unnecessary exposure. Conflicting file versions or DLLs which can

prevent programs from running, the introduction of malware from infected installation

software, unlicensed software which could be discovered in an audit, and programs which

can be used to hack the organization’s network are examples of the problems that can be

introduced when employees install software on company equipment.

Purpose

To minimize the risk of loss of program functionality, the exposure of sensitive

information contained within Central Florida Aircraft Overhaul, Inc. computing network, the

risk of introducing malware, and the legal exposure of running unlicensed software.

Scope

This policy covers all computers, servers, PDAs, smartphones, and other computing

devices operating within Central Florida Aircraft Overhaul, Inc...

Policy

Employees may not install software on Central Florida Aircraft Overhaul, Inc. computing de-

vices operated within the Central Florida Aircraft Overhaul, Inc. network. Software requests

must first be approved by the requester’s manager and then be made to the Information Tech-

nology department or Help Desk in writing or via email. Software must be selected from an ap-

proved software list, maintained by the Information Technology department, unless no selection

on the list meets the requester’s need. The Information Technology Department will obtain and

track the licenses, test new software for conflict and compatibility, and perform the

installation.

Enforcement

Any employee found to have violated this policy may be subject to disciplinary action, up

to and including termination of employment.

Definitions

DLL: Dynamically Linked Library. A shared program module used by one or more pro-

grams, often installed as part of a program installation. If the current version of a

DLL is overwritten by a newer or older version, existing programs that relied upon the

original version may cease to function or may not function reliably.

Malware: A wide variety of programs created with the explicit intention of performing mali-

cious acts on systems they run on, such as stealing information, hijacking functionality, and

attacking other systems.

PDA: Personal Digital Assistant. A portable, hand held computing device capable of run-

ning software programs. It may connect to host computers or to wired or wireless networks.

Smartphone: A cellular phone with qualities of a computer or PDA. It is capable of running

software programs and connecting to computer networks.

64

Page 69: Rfp Response Proof 8

TRAINING PROGRAM

In House Training Program

Training for your new enterprise architecture will be conducted by one of our selected in-house

training teams. We choose not to outsource this important facet of your new endeavour because

we feel our services end not at providing your company tailored products but exist indefinitely

throughout the longevity of your needs. Furthermore, since our analysis of your company

guided us to provide you with the ultimate personalized architecture, we feel it is our duty to

ensure you know how to use it from the people who provided it to you.

Note from the graph below shows that 55% of companies use departments within themselves to

provide IT training. It is our belief that these companies are underutilizing the potential to ade-

quately train their employees through utilizing their own sources. Although this may provide

more comfort and perceived control for a company, the lack of know-how and lack of true com-

petitive advantage poorly transcends throughout the company and, ultimately, hurts the bottom

line. Therefore, we are proud to be a considered within the 13% of companies who utilize out-

side sources for their training.

Training will be held at an off cite training facility that we set up to provide classroom/

simulator training for your employee’s. We will supply the computers and training materials

(e.g. projectors, printers, and so on) and each class will consist of no more than a third of each

of the department’s workforce.

http://articles.techrepublic.com.com/5100-10878_11-1049089.html?tag=content;leftCol

65

Page 70: Rfp Response Proof 8

Several benefits of training offsite:

Improves focus on learning tasks instead of work

Allows employees to absorb more information

Promotes collaboration and interaction between employees

Psychologically beneficial through an environmental change

Creates less disruption of the operation at the primary location

Allows “folks” to get out of the office and have fun

Our Training Program Goals:

Provide real world training instead of just application training – task oriented

Address specific skills relative to the employee’s specific job

Administer continual training throughout the longevity of employee’s tenure

Identifying the Training Needs of the Company:

The following section outlines how we identified the training needs of your company. We feel

it is integral to understand the training needs of the company and tailor a training program that

fits those needs.

Executive input – We seek the input regarding the training requirements and goals from execu-

tives within the consultee organization. This enables our training program to be catered to the

goals and requirements of the company and remain in line with the strategy of the company.

Employee assessment – An employee assessment is important to understand the exact needs of

different departments within the company. We understand that each department has specific

needs and wants, therefore and employee analysis is conducted before the training program be-

gins to better understand our clients.

Indentify current help-desk trends – We consult with the current IT solutions or help-desk

within the company to further understand the recurring problem within in order to develop a

training plan resolves such problems.

Poll the students – As a post training evaluation, our trainers survey a sample of trainees to

evaluate the training program to ensure proper, real-world knowledge was absorbed during the

training program. This evaluation serves as a metric for your company and allows us to better

understand how our program can more effectively serve your needs in the future.

Specific training classes:

Microsoft Office 2007 Class

Corridor Operations Class

Catia Operations Class

New Hire Class

Luncheon – ask the expert “continual” training classes (Held after initial training)

66

Page 71: Rfp Response Proof 8

Training timeline:

Timeline - August 23, 2010 through November 19, 2010

Days and time – Training per employee will be anywhere between 6 to 20 hours. Classes will

be held Monday through Friday where employees will spend no more than 6 hours a day (not

including breaks).

Continual training – We understand the importance of time to your employees; therefore our

continual training program isn’t as dynamic as the initial training program. For the reason of

time, and an assumption that employees will have the proper knowledge after initial training,

our continual training program is very relaxed and more geared toward answering unique ques-

tions and problems not discussed in initial training. Our continual training program consists of

selected IT employee s that will hold a luncheon every two weeks.

Course Outline - Microsoft Office 2007 Training

*Note- All employees of CFAO will participate in Microsoft Office Training. They will be

split up into 3 evenly groups consisting of: Engineering, Maintenance Planning & Control, Ac-

counting, Information Technology, Human Resources, Marketing, Sales & Contracts

Objectives:

To properly evaluate employees current knowledge of Microsoft Office Software

To transition the employees of CFAO from Microsoft Office 2003 to Microsoft Office

2007

To train employees at a steady pace so that the information is not too overwhelming.

Training Schedule:

Group A Schedule:

August 23rd - 6 hour session on fundamentals of Word, Excel, and PowerPoint

August 24th - 6 hour practical case study

Group B Schedule:

August 25th - 6 hour session on fundamentals of Word, Excel, and PowerPoint

August 26th - 6 hour practical case study

Group C Schedule:

August 30th - 6 hour session on fundamentals of Word, Excel, and PowerPoint

August 31st - 6 hour practical case study

67

Page 72: Rfp Response Proof 8

Course Outline - Corridor Application

*Note– All employees of the company will participate in the week long training.

Objectives:

To properly evaluate the Maintenance Planning & Control department’s current knowl-

edge of aviation service providers.

To train engineers at a steady pace so that the information is not too overwhelming

Group A Schedule:

September 6th - 6 hour session of Corridor services

September 7th - 6 hour session of Corridor services

September 6th - 6 hour session of Corridor services

September 8th - 6 hour practical case study

Group B Schedule:

September 13th - 6 hour session of Corridor services

September 14th - 6 hour session of Corridor services

September 15th - 6 hour session of Corridor services

September 16th - 6 hour practical case study

Group C Schedule:

September 20th- 6 hour session of Corridor services

September 21st - 6 hour session of Corridor services

September 22nd - 6 hour session of Corridor services

September 23rd - 6 hour practical case study

Course Outline - Catia Application

*Note- Only the Engineering Department will participate in the week long training

Objectives:

To properly evaluate the engineering department’s current knowledge of Catia.

To train engineers at a steady pace so that the information is not too overwhelming.

Group A Schedule:

October 4th - 6 hour session of Catia Fundamentals

October 5th - 6 hour session of Catia Programming

October 6th - 6 hour session of Catia Programming & Design

October 7th - 6 hour session of Catia Design

October 8th - 6 hour practical case study

68

Page 73: Rfp Response Proof 8

References:

http://articles.techrepublic.com.com/5100-10878_11-1036375.html?tag=content;leftCol

http://articles.techrepublic.com.com/5100-10878_11-5032139.html?tag=content;leftCol

http://articles.techrepublic.com.com/5100-10878_11-1049089.html?tag=content;leftCol

Group B Schedule:

October 11th - 6 hour session of Catia Fundamentals

October 12th - 6 hour session of Catia Programming

October 13th - 6 hour session of Catia Programming & Design

October 15th - 6 hour session of Catia Design

October 15th - 6 hour practical case study

Group C Schedule:

October 18th - 6 hour session of Catia Fundamentals

October 19th - 6 hour session of Catia Programming

October 20th - 6 hour session of Catia Programming & Design

October 21st - 6 hour session of Catia Design

October 22nd - 6 hour practical case study

Course Outline - Informational Technology Support

*Note- Only the IT Department will participate in the week long training

Objectives:

To properly evaluate the IT department’s current knowledge of IT solutions

To train IT technicians at a steady pace so that the information is not too overwhelming.

Group A Schedule:

November 1st - 6 hour session of Networking Solutions

November 2nd - 6 hour session of Reviewing the Programs in Use at Company

November 3rd - 6 hour session of Troubleshooting Solutions

November 4th - 6 hour session of Troubleshooting Solutions/ System Administrator Training

November 5th - 6 hour practical case study

Group B Schedule:

November 8th - 6 hour session of Networking Solutions

November 9th - 6 hour session of Reviewing the Programs in Use at Company

November 10th - 6 hour session of Troubleshooting Solutions

November 11th - 6 hour session of Troubleshooting Solutions/ System Administrator Training

November 12th - 6 hour practical case study

Group C Schedule:

November 15th - 6 hour session of Networking Solutions

November 16th- 6 hour session of Reviewing the Programs in Use at Company

November 17th - 6 hour session of Troubleshooting Solutions

November 18th - 6 hour session of Troubleshooting Solutions/ System Administrator Training

November 19th - 6 hour practical case study

69

Page 74: Rfp Response Proof 8
Page 75: Rfp Response Proof 8

APPENDIX A

SYSTEM REQUIREMTS PROPOSAL WORKSHEET

Overall System Requirements:

4 The bidder's products must execute in a dynamic, secure environment and all company

computers will use the Windows operating system.

The operating system that will be used is Windows 7 Professional Edition. All workstations

will be protected by Trend Micro Internet Security software for 15 months. SUSE Linux

Enterprise server 10 will be used as operating software for all integrated servers.

4 All computers and associated peripherals will be networked.

All elements of the network will be integrated using CAT5e cables and Wi-Fi.

Overall Software Requirements:

4 Network all company computers using a Windows-based operating system.

All workstations and laptops are networked with each other using Windows 7 Professional

Edition as an operating system

4 Establish a company-wide intranet.

All networked elements will have access to company-wide intranet. Every employee will

have their own username and password provided by the network administrator to allow se-

cure access to the intranet.

4 Provide secure Internet access for all users.

All the workstations will be connected to the internet. The internet service will be provided

by New Edge Networks with a 1.5M T1 connection. New Edge Network guarantees net-

work availability of 99.9% or better. Secured Wi-Fi access will be provided throughout both

facilities.

4 Use technologies such as fiber, satellite, the Internet, etc., as appropriate.

The network will utilize CAT5e cables, switches, Wi-Fi routers, Wi-Fi Access Points to

connect all workstations and peripherals. A T1 router modem will be used to gain broad-

band access to the internet.

Office and Productivity Software Requirements:

4 Word processing

Microsoft Word 2007 will be used as the word processing software. This version enables

communication more effectively with SmartArt diagrams and new charting tools. Word

2007 helps information workers create professional looking content quickly. A host of new

tools enable the user to construct documents from pre-defined parts and styles that allow

workers to increase productivity efficiently.

4 Spreadsheets

Microsoft Office Excel 2007 allow users to create and format spreadsheets. It is also used to

analyze and share information to make more informed business decisions. Excel 2007 al-

lows users to share sensitive business information more broadly with enhanced security

among work groups.

4 Database management

Oracle Database Standard Edition is a full featured database for servers with up-to 4 sock-

ets. The software manages all data types and enables all the business applications to take

advantage of the performance, reliability, security and scalability.

71

Page 76: Rfp Response Proof 8

Office and Productivity Software Requirements:

4 Presentation graphics

Microsoft Office PowerPoint 2007 enables users to quickly create high impact dynamic

presentation by integrating workflow and ways to easily share information. Integration with

Windows Media Player allows users to integrate audio and video into a slideshow.

4 Email

Microsoft Outlook 2007 provides an integrated solution for managing time and information,

connecting across boundaries, and remaining in control of the information that needs to be

reached to the user. Key features include automatic grouping of messages, junk e-mail han-

dling and improved reading views and also allows users to flag messages.

4 Scheduling

In addition to e-mail abilities, Microsoft Office Outlook 2007 also provides solutions for

scheduling. Outlook 2007 delivers innovations in order to manage daily priorities by using

the "To-Do" bar. The "To-Do" bar provides a consolidated view of upcoming events, tasks,

calendar, making it easy to act on information. ScheduleAnywhere is also going to be used.

This is an internet based scheduling software that allows employees to access their schedule

from anywhere.

4 Project management

ProjectManager.com will be providing all the solutions for project management. They offer

a wide range of services that include project planner, tracking, sharing, and reporting.

Teams can be managed online from any geographic location.

4 CAD

CATIA is a multi-platform CAD/CAM/CAE commercial software suite developed by Das-

sault Systems. CATIA supports multiple stages of product development from conceptualiza-

tion, design, manufacturing and engineering.

4 Internet browser

Internet Explorer 8 is faster, safe and easier to use than the previous versions. With visual

suggestions and accelerators, Internet Explorer 8 is easy to navigate and fast. The browser

also protects users from Malware threats. Many new features such as an automatic crash

recovery, content filtering and smart screens protect the user's internet experience.

4 Network operating system

SUSE Linux Enterprise Server 10 is the network operating system of choice for applica-

tions, web services and infrastructure delivering high reliability and performance and supe-

rior business value. This software is highly reliable, scalable and secure server operating

system, built to power both physical and virtual mission critical workloads. Linux Enter-

prise Server is designed to work with Windows and other operating systems making it the

ideal choice for a mixed environment.

Maintenance Software Requirements:

4 Provide maintenance software (from vendors) that allows for planning and control of air-

craft maintenance on large (including wide-body) aircraft.

Corridor Workgroup Edition was selected to satisfy the maintenance software requirements.

corridor eliminates manual efforts, reduces redundancies, lowers costs, improve speed and

empowers employees to perform higher levels of direct service. Corridor's module set al-

lows for customization of software to suit company's specific needs

72

Page 77: Rfp Response Proof 8

License QTY

Corridor Work Group Edition* 45

Annual Support** 45

Oracle License (1 Processor) 1

Oracle Support (Annually – 1 Processor) 1

Installation & Implementation 1

Maintenance Software Requirements:

4 Hardware proposed will support maintenance software.

Datalogic QuickScan 6500 BT Scanner, a RS232 protocol compliant device, fully decoded

and reads track 1 and 2 will be acquired to support the maintenance software. MagTek

Stripe Reader Card Scanner, PS232 protocol with serial port will also be provided.

4 Use Continuum Corridor software per the quote provided by CFAO. You will need the nec-

essary number of Work Group Edition applications, annual support, one Oracle license,

Oracle support and installation & implementation.

Maintenance Software Requirements (cont.)

4 Maintenance software will include work order, work order quote, line sales & management,

inventory, rotable management, account integration, sales order quote, sales order, aircraft,

regulatory compliance, company database, purchase request, purchase order, and shipping

& receiving.

Corridor Software includes all of the above mentioned modules

4 Provide regulatory software as appropriate to large aircraft (must include Airworthiness Di-

rectives, Service Letters, Service Bulletins, etc.).

"The aviation regulatory library system by Aviation DataSource, Inc will be used as the

company's regulatory software. This system is an internet based single source electronic

aviation regulatory library database that includes all airworthiness directives for large and

small aircraft, type certification data sheets, FARS, CARS, and JARS. Over 350000 files

are in the system and are available by request.

The system should include utilities for:

4 Installation

SUSE Linux Enterprise Server 10 ships with a unique set of server administration, configu-

ration and deployment tool called YaST. This allows administrators to easily install and up-

grade software and operating systems from a central location.

4 Recovery

All the servers are factory equipped with Symantec Backup Exec system Recovery 2010

Server Edition. The software is a simple, cost effective back-up and recovery solution for

businesses that help minimize down time and avoid disaster by easily recovering individual

data, files, folders or complete windows system in minutes, even to different hardware, vir-

tual environment or remote locations.

4 Back-up

All the servers are factory equipped with Symantec Backup Exec system Recovery 2010

Server Edition. The software is a simple, cost effective back-up and recovery solution for

businesses that help minimize down time and avoid disaster by easily recovering individual

data, files, folders or complete windows system in minutes, even to different hardware, vir-

tual environment or remote locations.

73

Page 78: Rfp Response Proof 8

The system should include utilities for:

4 Security

All workstations come equipped with Trend Micro Internet Security. The software protects

against viruses and defends personal information with a anti-spyware technology. A per-

sonal firewall defends against attacks through the internet.

4 On-line help and documentation

Titan Technologies will provide all the documentation and help on-line through its website.

Titan Technology will acquire all necessary documents from different vendors and offer

them at one website for our customers at www.titantech.com.

Workstation Components:

4 Make and model:

Low End Workstations : Dell OptiPlex 380 MT

High End Workstations : Dell Precision T1500

Hangar Laptops : Panasonic Toughbook 52

Executive Laptops : HP EliteBook 8440W Mobile Workstation

4 Processor, processor speed

Dell OptiPlex 380 MT - Intel Core 2 Duo (2.93 GHz, 1066 MHz FSB)

Dell Precision T1500 - Quad Core Processor CORE i5 (2.64 GHz, 8MB)

Panasonic Toughbook 52 - Intel Core 2 Duo P8400 2.26GHz (Centrino)

HP EliteBook 8440W Mobile Workstation - Intel Core i7-620M 2.66GHz, 4MB L3 Cache

4 Amount of RAM

Dell OptiPlex 380 MT - 2GB DDR 3 Non-ECC SDRAM, 1066 MHz (2 DIMM)

Dell Precision T1500 - 2GB DDR 3 Non-ECC SDRAM, 1066 MHz (2 DIMM)

Panasonic Toughbook 52 - 2GB

HP EliteBook 8440W Mobile Workstation - 4GB, 1333MHz DDR3 SDRAM

4 Hard drive size

Dell OptiPlex 380 MT - 320 GB SATA 3.0 GB/s and 16MB DataBurst Cache

Dell Precision T1500 - 320 GB SATA 3.0 GB/s 7200 RPM and 16MB DataBurst Cache

Panasonic Toughbook 52- 160GB

HP EliteBook 8440W Mobile Workstation - 320GB, 7200RPM SATA II

4 Other drives

Dell OptiPlex 380 MT - 16x DVD-ROM, Cyberlink Power DVD

Dell Precision T1500 - 16x DVD-ROM, Cyberlink Power DVD

Panasonic Toughbook 52 - 8x DVD+/-R/RW with double layer support

HP EliteBook 8440W Mobile Workstation - DVD+/-RW SuperMulti DL LightScribe

4 Printer make and model (networked and/or stand-alone)

Black and White : HP LaserJet P2055dn

Multifunction : HP LaserJet M1522

Plotter : HP Designjet T620 printer

4 Monitor make, model and size

Dell OptiPlex 380 MT - Dell E Series E1910H 18.5in wide monitor, VGA only

Dell Precision T1500 - Dell Professional 1909W 19in wide monitor, VGA/DVI

Panasonic Toughbook 52 - 15.4in wide screen display

HP EliteBook 8440W Mobile Workstation - 14in diagonal backlit HD+ antiglare

74

Page 79: Rfp Response Proof 8

Workstation Components:

4 Any network or telecommunication devices

Dell OptiPlex 380 MT - PCIE 10/100/1000

Dell Precision T1500 - PCIE 10/100/1000

Panasonic Toughbook 52 - PCIE 10/100/1000.

Wireless - 802.11 A/B/G/N

HP EliteBook 8440W Mobile Workstation - PCIE 10/100/1000.

Wireless - Intel Centrino Ultimate-N 6300, 802.11 A/B/G/N, Bluetooth 2.1

4 Any necessary audio hardware

There are no necessary audio hardware required. However, the laptops come equipped with

integrated speakers.

Other Hardware:

4 Servers

Dell PowerEdge T710

Processor : (x2) Intel Xeon E5630 2.53GHz, 12M Cache, Turbo HT, 1066MHz

RAM : 12GB (6 x 2GB), 1333MHz Dual Ranked RDIMMs

Hard drive : 300GB 10K RPM Serial-Attach SCSI 6GBPS

Monitor : 17in LCD

Networking: Broadcom 5709 Dual Port 1GBE NIC W/TOE iSCSI, PCIe-4

4 Storage array

Dell PowerVault MD 3000

Hard drive: 2X 2TB 7.2K RPM universal SATA 3.5in

4 Firewall

Microsoft Windows 7 Professional edition already has inbuilt firewall capabilities. In addi-

tion all the routers are integrated with inbuilt firewall. The Cisco Catalyst switch offers inte-

grated security that includes network admission control, advance quality of service.

4 Connection (NIC or Modem)

The connection between the network components and to the internet will be through the

NIC port. This connection will enable the component to receive and exchange data and ap-

plications. The network is connected to the internet via a T1 router provided by the ISP.

4 Cables (estimate an average of 10 yards per connection if used)

CAT5e cables are going to be used to connect all the network components. It can support

speeds up to 100Mbps. Cables to go network cable kit will be used to network the system.

The kit includes 1000ft of CAT5e cable, 50 pack of RJ45 connectors, RJ45 crimp tool and

cable continuity tester using an estimate of 30ft/connection we estimate that we require 10

kits.

4 Hubs, repeaters, bridges, switches or routers

Cisco Catalyst 2960-24TC- 24 port switch

Cisco Catalyst 2960-48TT- 48 port switch

Cisco 1941 integrated service router

D-Link - Xtreme N Duo Wireless-N Bridge/Access point

4 Server racks

Not required since the servers use tower chassis

4 UPS

HP UPS T1500 G3-950WATT-1400VA. Only the servers, storage array and the database

are connected to the UPS.

75

Page 80: Rfp Response Proof 8

Minimum Hardware Requirements:

4 2 GB of RAM per workstation

4 100 GB of hard drive space per workstation

4 2 GHz processor speed

4 4 TB storage capability for entire network (storage array, server, etc.)

4 Total back-up capability including all data and applications (preferably offsite)

HP StorageWorks Ultrium 960-TapeDrive- LTO Ultrium - SCSI

Storage Media - HP LTO Ultrium x 20 - 200GB

The system should allow for:

4 User ID and password protection.

Novell SecureLogin simplifies the enterprise single Sign-on implementation. Novell Se-

cureLogin effectively reduces the number of password reset calls to the helpdesk.

4 Security administration that is centrally controlled on-site.

The YaST tools in SUSE Linux Enterprise Server 10 allows administrators to automatically

and transparently configure, update and troubleshoot workstations from wherever they are

without having to physically visit each device. Using policies, administrators can generate

and maintain work environments with content and applications according to the personal

needs of each user. As a result, users access their work environments and applications in a

simple, consistent way from any device, at any location. Novell Identity Manager provides

capabilities such as identity lifecycle management, Access Management, Enterprise Single

Sign-on, Password Management.

4 Complete archival capability to meet FAA and other regulatory requirements.

SUSE Linux Enterprise Server 10 enables IT administrators to simplify storage manage-

ment. Without an effective storage-management solution, the risks could range from lost

data to more serious threats like litigation or negative audit findings. SUSE Linux 10 helps

minimize these risks with automated policy management, ensuring compliance with corpo-

rate and government regulations for secure data storage.

The aircraft maintenance planning and tracking system should provide for:

4 Flexible reporting capacity.

As many aircrafts as needed can be added to the reports

4 Easily modified standard reports.

Standard reports can be easily modified by adding or excluding fields of information.

4 Ability to write special reports.

Any report can be customized

4 Trend reporting.

It is a part of "Reliability Report"

4 Linkage/download into other software (e.g. spreadsheets, word processing, database, etc.)

Corridor integrates with all Microsoft Office Programs

4 Be menu-driven to lead inexperienced users through the system.

Users inexperienced with the system can easily use the system by the menus provided

4 Allow an experienced user to by-pass menus.

Shortcuts provide direct access to most commonly accessed information for an experienced

user to by-pass the menus

76

Page 81: Rfp Response Proof 8

Network Management and Administration:

4 Provide easy-to-read documentation, including both technical and user manuals.

All documentation will be provided by the software and hardware vendors

4 Provide an IT policy manual which includes a recommended employee computer-use

policy, security processes, sanctions for misuse, etc.

All IT policies that Titian Technologies Consulting recommend to be adapted by a client for

their system are available from the consulting team or through the client section of our web

page.

4 Include network management policies such as maintenance rules, software installation, indi-

vidual data back-up, etc.

All IT policies that Titian Technologies Consulting recommend to be adapted by a client for

their system are available from the consulting team or through the client section of our web

page.

Installation:

4 Installation assistance.

Installation of the system will be either taken care of by a team of Titian Technology Con-

sulting employees, or is included in the price of the equipment. All outside installation is

limited to specific software applications.

4 Implementation assistance.

Implementation assistance will be part of Titian Technology Consulting’s services provided.

4 Is a qualified technical representative provided on-site to install the system? If not, describe

installation alternatives and the level of technical knowledge required.

Yes, there will be a team of Titian Technology Consulting employees who will be installing

and testing the network. They workers will be supervised by a site supervisor who will be

there when company employees are working.

4 Describe how the bidder ensures that newly installed systems are adequately tested.

Titian Technologies has an intensive 3 week testing process that will be conducted along

with a quality control measures inspection, that will be conducted by the site supervisor.

Training:

4 Technical training (IT support staff).

During the training evolution part of this project there will be IT support training, the dates

for this training will be November 1, 2010 though November 19, 2010

4 End-user training.

There are three different elements of training for this project. There will be Microsoft Of-

fice and Corridor Training for all employees. The dates for this training will be August 23,

2010 through August 31, 2010 and September 6, 2010 through September 23, 2010 respec-

tively.

4 Helpdesk counselor training.

Titian Technologies Consulting believes that the Helpdesk should be a 365-7-24. With this

thought in mind Titian Technology offers a outsourced helpdesk that can offer this service.

4 System administrator training.

System administrator training is part of the IT Support Training. This is because we believe

that the individuals who control the system is the IT Department.

77

Page 82: Rfp Response Proof 8

Technical and Maintenance Support:

4 Telephone support.

This is filled through the uses of a 1-800 hotline..

4 The command files required to run the system, with complete operator's documentation

This will be held within the IT department and located on a section of Titian Technologies

Consulting’s website that is dedicated to clients.

4 Custom modifications.

Custom modifications was considered through out the project process. From the use of lap-

tops in the hanger and for the Senior Executives of the company to the selection of training

process.

4 Describe who will provide long-term support and system enhancements to the proposed

system and the availability to provide such support.

Through the use of the consultant team, clients will continually find that they are able to

have one individual to turn to if up-grades and expansion is required by the client.

4 Describe the on-going level of support and procedure for "bug-fixes" provided by the bid-

der.

Through the use of the consultant team, clients will continually find that they are able to

have one individual to turn to if up-grades and expansion is required by the client.

4 Warranties included with equipment purchased.

All items that are within the project were considered because of the warranties that were

available.

4 Provide three years of IT technical support.

Most of the equipment and software includes this support, and where it is not included by

the manufacture Titian Technologies Consulting services include through the use of the

consultant team.

4 Provide three years of maintenance support.

Most of the equipment and software includes this support, and where it is not included by

the manufacture Titian Technologies Consulting services include through the use of the

consultant team.

System Integration:

4 List integration services to be performed.

Installation and Testing Team

End User Training

User section of the Titian Technologies Consulting website (www.titiantech.com)

Username and Passwords

365-7-24 Helpdesk

Use of both wired and wireless systems

78

Page 83: Rfp Response Proof 8

APPENDIX B

EQUIPMENT SCREENSHOTS

Computers:

Precision T1500

79

Page 84: Rfp Response Proof 8

OptiPlex 380 MT

80

Page 85: Rfp Response Proof 8

Laptops:

Toughbook 52

81

Page 86: Rfp Response Proof 8

Laptops:

HP EliteBook 8440w Mobile Workstation

82

Page 87: Rfp Response Proof 8

Printers:

HP LaserJet P2055dn

83

Page 88: Rfp Response Proof 8

HP LaserJet M1522

84

Page 89: Rfp Response Proof 8

Plotter:

HP Designjet T620

85

Page 90: Rfp Response Proof 8

Server:

86

Page 91: Rfp Response Proof 8

Storage Array:

87

Page 92: Rfp Response Proof 8

Tape Dive:

88

Page 93: Rfp Response Proof 8

Tape Media:

89

Page 94: Rfp Response Proof 8

Switches:

48 Port Switch

90

Page 95: Rfp Response Proof 8

24 Port Switch

91

Page 96: Rfp Response Proof 8

Switches:

Network Switch

92

Page 97: Rfp Response Proof 8

Router:

Integrated Router

93

Page 98: Rfp Response Proof 8

UPS:

94

Page 99: Rfp Response Proof 8

Network Cable Kit:

95

Page 100: Rfp Response Proof 8

Internet Connection Equipment:

CAT 5E Cable: Belkin Bulk Cable - 1000 ft

96

Page 101: Rfp Response Proof 8

RJ-45 Connector

97

Page 102: Rfp Response Proof 8

Router:

98

Page 103: Rfp Response Proof 8

WIFI Access Points:

99

Page 104: Rfp Response Proof 8

Surge Protectors:

100

Page 105: Rfp Response Proof 8

Barcode Reader:

Card Reader:

101

Page 106: Rfp Response Proof 8

Scheduling Program:

500 Employee Price per month

102

Page 107: Rfp Response Proof 8

Database Management:

103

Page 108: Rfp Response Proof 8

Project Management:

# users at price Cost Cost breakdown

1 $25.00 $25.00

24 $10.00 $240.00

25 $8.00 $200.00

50 $6.00 $300.00

150 $4.00 $600.00

250 $2.00 $500.00

Total cost per month $1,865.00

104

Page 109: Rfp Response Proof 8

Corridor

105

Page 110: Rfp Response Proof 8

CAD:

Catia

106

Page 111: Rfp Response Proof 8

Computer Security Logon:

Quantity Unit Price Total

SecureLogin 7.0 1-User License + 1-Year Priority

Maintenance 500 33.200 16,600.00

IDM 3.6 IU + 1 Yr Priority Maintenance 500 23.730 11,865.00

IDM Roles Based Provisioning Mod 3.6 IU Lic + 1 Yr

Priority Maintenance 500 15.160 7,580.00

Sub total 36,045.00

Tax 2,523.15

Total 38,568.15

Re-calculation for number of users at the Company

107

Page 112: Rfp Response Proof 8

Internet Service Provider: (highlighted section is for this RFP)

108