0% found this document useful (0 votes)
30 views

Abdul Module 8 Application

KPMG has a dedicated systems deployment process to deliver technological solutions to organizations. The process begins with assessing the client's existing technology environment to identify risks. KPMG then works with the client to develop a deployment plan mapping resources, objectives, and timeline. Key steps involve designing and developing hardware and software, installing and configuring systems, and providing ongoing training and support. The goal is to ensure smooth deployment that meets client needs and maximizes return on investment.

Uploaded by

AdhiSath Mishra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views

Abdul Module 8 Application

KPMG has a dedicated systems deployment process to deliver technological solutions to organizations. The process begins with assessing the client's existing technology environment to identify risks. KPMG then works with the client to develop a deployment plan mapping resources, objectives, and timeline. Key steps involve designing and developing hardware and software, installing and configuring systems, and providing ongoing training and support. The goal is to ensure smooth deployment that meets client needs and maximizes return on investment.

Uploaded by

AdhiSath Mishra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Module 8 Application Assignment

Abdul

Date – 04/13/2023
Systems Deployment Process of KPMG

The systems deployment process at KPMG has been a dedicated technique through which

the company makes as well as delivers technological solutions for helping several organizations.

The process of systems deployment has been designed to assuring the technology is sufficiently

carried within with not so much of disruptions at the operations level (Tengilimoglu, Carsten &

Wadud, 2023). The process initiates with assessing the company’s technological environment at

its current level. This assessment works for identifying potential threats or risks in KPMG that

might be encountered while the process of deployment. Once the initial level assessment gets

finished, KPMG starts working for the company or organization for developing a detailed

deployment plan where this plan or process maps project resources, objectives and timeline

required for deployment completion.

The KPMG deals with the organization for developing the architecture solutions as well

as designing and developing necessary hardware and software sections and components (Ahmad

et al., 2022). It includes necessary software designing and hardware development specifications

and technology validation as well as testing. Once the architecture is selected or final, KPMG

cooperates with the organization or company for installing the important components including

network, software and hardware configuration to assuring the technology integration has been

done properly and it’s properly suiting the existing systems of the organization. The company

KPMG also deals with giving the facility of maintenance once the technology gets installed

including ongoing training as well as ongoing support to assuring the technology is secure and

proper (Moll & Yigitbasioglu, 2019).


Further, KPMG also contributes to monitoring and overlooking the organizational

performance as well as technology usage for ensuring the developed technology has met the

organizational expectations and requirements. The systems deployment process of the KGMP

company has been designed for ensuring smooth and efficient deployment and with proper

maintenance and monitoring facilities for ensuring this meets the needs of the organization. It

helps in maximizing the ROI (Return on Investment) of technology with cost reduction as well

as performance improvement.

KPMG has a term called SAM (Software Asset Management) and the company tries its

model of the software life cycle to cover every stage the software runs through in any

organization or company. The IBM Deployment Quick Scan could serve as part of SAM in the

company. Firstly, the company KPMG already has 6 stages of the software life cycle of which 3

are used and deal with the systems deployment process (De Cremer & Moerman, 2018). The 6

steps are Planning, Acquisition, Setup, Usage, management and support, Optimization and

Retirement/renewal in which the last 3 steps are what the systems deployment process is based

on (De Cremer & Moerman, 2018). These all processes can be defined below:

 Planning: A detailed assessment of the specific requirements of the company regarding the

software functionalities.

 Acquisition: This includes the software procurement process as well as supplier and contract

management. The software purchase in relation to the hardware needs will take place as well

as registered as per the requirement.

 Setup: By being authorized, the software becomes available to the right locations in the right

people.
 Usage, management and support: The software supervision gets achieved here without or

with the tools being used and the availability of periodical reports for the software usage

becomes comparable to licensing or available agreements.

 Optimization: With the consideration of several factors, supply and demand synchronization

in the organization will be achieved. The processes of SAM have been designed as well as

implemented effectively in usage times and the organization to maintain its licensing

structure that is possibly the most optimal.

 Retirement/renewal: The existing licenses have to be reused possibly within the

organization every when possible. Also, a procedure for retirement will be in place for

drawing the licenses.


References

Ahmad, W., Rasool, A., Javed, A. R., Baker, T., & Jalil, Z. (2022). Cyber security in iot-based

cloud computing: A comprehensive survey. Electronics, 11(1), 16.

https://www.mdpi.com/article/10.3390/electronics11010016

De Cremer, H., & Moerman, J. (2018). KPMG IBM Deployment Quick Scan. KPMG.

https://assets.kpmg.com/content/dam/kpmg/be/pdf/2018/01/ADV-factsheet-KPMG-IBM-

Deployment-Quick-Scan-LR.pdf

Moll, J., & Yigitbasioglu, O. (2019). The role of internet-related technologies in shaping the

work of accountants: New directions for accounting research. The British accounting

review, 51(6), 100833. https://eprints.qut.edu.au/128841/1/The%20role%20of

%20internet-related%20.pdf

Tengilimoglu, O., Carsten, O., & Wadud, Z. (2023). Infrastructure requirements for the safe

operation of automated vehicles: Opinions from experts and stakeholders. Transport

policy, 133, 209-222.

https://www.sciencedirect.com/science/article/pii/S0967070X23000264

You might also like