Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. An originality report is provided when you submit your task that can be used as a guide.
You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.
A. Summarize Endothon’s outsourcing needs and expectations for the outsourcing vendor, based on the attached “Sourcing Plan Case Study” and “Request for Proposal.”
B. Identify the project sponsor, stakeholders, and steering committee based on information in the Endothon corporate profile, using the attached “Sourcing Plan Case Study.”
C. Summarize the strengths and weaknesses of the proposal from Bullzai Ltd. (Bullzai), noting any gaps in the vendor’s response to requirements specified in the attached “Request for Proposal.”
Note: Use the “Bullzai_Response to Request for Proposal” attached.
D. Summarize the strengths and weaknesses of the proposal from Synesthor Ltd. (Synesthor), noting any gaps in the vendor’s response to requirements specified in the attached “Request for Proposal.”
Note: Use the “Synesthor_Response to Request for Proposal” attached.
E. Identify which vendor you want to award the outsourcing contract to, justifying why that vendor was chosen.
F. Recommend modifications to the chosen vendor’s bid, amending key weaknesses and oversights in the selected vendor’s response to the RFP (i.e., the “Synesthor_Response to Request for Proposal” or the “Bullzai_Response to Request for Proposal” attachment) and justifying how the recommended modifications will benefit your company.
G. Summarize how a problem-solving negotiation strategy could be used to renegotiate the weaknesses and oversights identified in part F.
H. Recommend training to mitigate misunderstandings in cultural communication that may arise between Endothon and the chosen outsourcing vendor.
I. Explain technical and security challenges related to the country where your chosen vendor is located, including IT security, physical security, and the protection of intellectual property.
J. Explain how Encryption and Export Administration Regulations (EAR), Category 5, Parts 1 and 2 apply to communications between your company and your chosen vendor.
K. Acknowledge sources, using APA-formatted in-text citations and references, for content that is quoted, paraphrased, or summarized.
L. Demonstrate professional communication in the content and presentation of your submission.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more