StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Tendering Documents and Protocols - Essay Example

Cite this document
Summary
From the paper "Tendering Documents and Protocols" it is clear that according to the government of the United Kingdom (2010, p. 1), the tendering process involves needing analysis, supplier selection, tendering documents and finally the awarding of the tender…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.3% of users find it useful
Tendering Documents and Protocols
Read Text Preview

Extract of sample "Tendering Documents and Protocols"

Sometimes the nearby community will have to be sought for approval in case of large projects. In our case, the staff will be informed to give their views.
Supplier Selection
The management will have to access the pre-negotiated contacts of the IT catalog or IT services.
Tendering Documents
The tendering documents will contain the following information as explained; Introduction to the tender giving a brief introduction of the tender. The tender condition will compose of the legal requirements that surround the tender. Specifications describing the services and the work to be done will be availed. Instructions to be followed by the bidders in terms of submission of documents will be sated. The tender response will compose of all the questions to be asked by the bidders and answerers by the bidder. The tender will compose of the declarations to be signed by the bidders. The certificate of non-alignment will be signed whereby the bidder will declare that he has not merged with any other bidder for the tender. Finally, there will be a draft of the proposed tender.
Tendering Protocols

The tender may be restricted, negotiated or open as per the tendering guidelines. Restricted tenders will have a pre-qualifying questionnaire (PQQ) that will cover the organization, financial details, environmental policies, technical information, health and safety policies of the bidder. The PQQ will be done before the invitation to tender (ITT) in the determination of quality and price basis.
Consideration for the Tender
Any successful bidder should avail all the required information. Moreover, he should appropriately and correctly answer all the questions. Finally, the bidder should return the needed information at the speculated time.

Fair Competition
All tender will be given the same formation with equal treatment to all. The confidentiality of all the bidders will be maintained.
Contract Award
Award of the contract will be awarded after weighing several criteria mainly experience, quality, implementation timetable, pricing schedule, tax clearance certificates, financial stability and suitability. Provided that there will be no challenges encountered, the successful; bidder will be awarded after the contact after 10 days. Unsuccessful bidders will be informed of the presence or absence of viable reasons as to why they were not considered. Thereafter, the selected bidder will sign a contract as per the tendering documents.
Contract Monitoring
The management will select a committee to oversee the project. The group will always meet with the bidder in determining the progress and the performance.

Question 4
An efficient Information Technology strategy must compose of five elements mainly: the infrastructure, applications, innovation, sourcing and investment strategy (WMC. 2010).
Infrastructure Strategy
The infrastructure strategy has three main parts mainly operating system, hardware and networks. The strategy should ensure that the organization is provided with high computing and performance power with a strong bandwidth that is achievable at the lowest cost possible (ECU. 2011, p. 1).
.Application Strategy
The application strategy deals with the usage of software in warehousing or office in support of business activities. At this level, the software may help in increase the profits whereby software such as CRM aids in customer care and sales promotion. Secondly, the software can aid in the development of an efficient business operation where software such as SAP is used in accounting and personal management.
Innovation Strategy

The innovation strategy deals with the innovation of the IT programs. During this phase, the management group eyes ahead and comes out with new ideas that if implemented can lead to innovation that if applied will lead to improved operations within the organizations. The innovation may arise from the potential problems facing the firm. From the problem, the development group can develop or create a new strategy to be applied or used in the mitigation of the problem.
Sourcing Strategy
The sourcing strategy deals with the value that will benefit the company on the application of the IT program. In this phase, one decides on whether to make or purchase the strategy for the services.
Investment Strategy
The investment strategy depends on the former four components. It ensures that IT resources will be used efficiently in a profitable mode that will satisfy all the customers besides ensuring that the staff is working at their comfort (WMC. 2010).
Key features of the IT system
Security
It should ensure that security and confidentiality are high besides not liable for any unauthorized usage.

Efficient and Reliable
The system should be of required standards and avail all the required details in a simple manner with no inconveniences (Dhillon, 2009, 166). Moreover, it should be environmentally friendly with no radiation and unnecessary noises. In addition, power consumption should be minimal.
Accurate
Cost-effective
The system should spend a reasonable cost for its infrastructure laying and up to the current standard.
The outputted data should be free from all sorts of errors to avoid losses and inconveniences
Time Conscious
The system should produce its results within short time intervals. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Paper 2 Essay Example | Topics and Well Written Essays - 750 words - 5”, n.d.)
Paper 2 Essay Example | Topics and Well Written Essays - 750 words - 5. Retrieved from https://studentshare.org/information-technology/1644925-paper-2
(Paper 2 Essay Example | Topics and Well Written Essays - 750 Words - 5)
Paper 2 Essay Example | Topics and Well Written Essays - 750 Words - 5. https://studentshare.org/information-technology/1644925-paper-2.
“Paper 2 Essay Example | Topics and Well Written Essays - 750 Words - 5”, n.d. https://studentshare.org/information-technology/1644925-paper-2.
  • Cited: 0 times

CHECK THESE SAMPLES OF Tendering Documents and Protocols

International Environmental Law Ensures the Sustainability of Global Commons

The paper "International Environmental Law Ensures the Sustainability of Global Commons" states that the success of the Kyoto Protocol to greater extent glimpses from its normative framing making it a flexible environmentalist bounding the member countries through commitments.... ... ... ... The system difference between ICJ and ITLOS remains in the matter of jurisdiction, as ITLOS has a permanent 11-member Seabed Disputes Chamber (SBDC) for listening to disputes that are beyond the national jurisdiction....
15 Pages (3750 words) Essay

Computer Communications and Networks

Likewise, application layer of the TCP/IP model is associated with protocols such as Simple Mail Transfer Protocol (SMTP), Hyper Text Transfer Protocol (HTTP), File Transfer Protocol (FTP) etc.... The transport Layer is associated with protocols such as Transmission Control Protocol (TCP), User Datagram Protocol (UDP) etc.... Example demonstration via TCP/IP Model Protocol Layering Up till now we have discussed the TCP/IP model, protocols and functions associated with each layer....
8 Pages (2000 words) Report

Network Security of LAN used in Small Office and Home Office

The study was conducted with 15 small businesses, whose representatives have been interviewed.... The responses were then analysed thematically.... ... ... ... It must be noted also the fact that less than two thirds (60 percent) of our interviewed companies utilize hard to crack passwords.... Without such a password system, a hacker can quickly obtain access by exhaustive search Another fact worthy to note is that less than two thirds (62 percent) of these small businesses use automatic patching....
60 Pages (15000 words) Essay

X Stream - Computer Communication and Networks

The purpose is to expand the accessibility of these web-based applications globally and provide services to users such as sharing and uploading documents, pictures, videos, electronic email, video conferencing, chatting, forums, social networks, etc.... The paper "X Stream - Computer Communication and Networks" reviews X stream as one of the technological educational portals that facilitate tutors and students to collaborate and exchange information, by demonstrating the necessary methods, protocol techniques, and processes....
8 Pages (2000 words) Case Study

Medical errors

However, due to inevitable presence of humans in this field, the probability of human errors cannot be ignored.... It is further.... ... ... First and foremost, medical institutions mainly hospitals are expected to be honest with the patients and let them be aware of what exactly went Due to development in science and related ethical considerations in the western part of the world, patients and those related to them have more opportunities to be aware of mistakes and errors committed by their medical practitioners which further allows them to follow an appropriate course of action depending on the nature of MEs....
40 Pages (10000 words) Research Paper

The Concept of Networking

The discussion emphasizes the principles and operations of layered communication protocols.... It also briefs about protocol stack, its working and packet headersIn computer networking, there are two important protocols that include Internet Protocol (IP) and Transmission Control Protocol (TCP).... The layered communication protocols of networking are discussed hereunder....
9 Pages (2250 words) Essay

International Environmental Law and Sustainability of Global Commons

Globally, efforts are made in this direction through different conventions and protocols such as Biological Diversity and Kyoto Protocol to ensure the sustainability of global commons.... The paper 'International Environmental Law and Sustainability of Global Commons' tries to answer the question of sustainability of natural common assets such as oceans and atmosphere through legislation, the examples of which include Kyoto Protocol, The Law of the Sea, MARRPOL Convention....
16 Pages (4000 words) Assignment

The Urgent Need to Improve Health Care Quality

PI is a study methodology that includes tracking of medical care process factors, patient factors, and outcomes, providing information for the development of analytically based management protocols to achieve desired outcomes over the continuum of care.... From the paper "The Urgent Need to Improve Health Care Quality" it is clear that routine practice usually fails to incorporate the research evidence in a timely manner and reliable fashion....
9 Pages (2250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us