Writing assignment with the required reading attached. The board of directors of your company is currently reviewing its cybersecurity policies and procedures. It has asked you to read the article The Inadequacies of the Cybersecurity Information Sharing Act of 2015 in the Age of Artificial Intelligence and to write a brief report describing the following concepts that were included in a report written by the company’s IT department: Cyber threat indicators Defensive measures Indicators of Compromise (IOCs) Raw Observational Data (ROD) Keep in mind, that the board of directors is making business decisions about how to protect the corporation’s business and reputation. So in describing these concepts make sure that you explain why understanding them is important for making business decisions about the company’s cybersecurity posture.
Write a short essay (roughly 300 words) about some topic related to computing and/or communication technology that interests you and has social or ethical implications. Describe the background; then identify the social or ethical issues, problems, or questions that you think are important. (Don’t make your essay be just an argument for one point of view. You may express your views if you want to, but first explain what the issues are, why there is a problem or a controversy.) Remember to define the problem and cite at least 2-3 references including the definition source. Your report should have an introductory paragraph (identify the issues and your thoughts (importance), a body (where you identify and discuss issues in-depth), and finally a conclusion where you summarize and indicate your recommended solution or solutions that resolved the issue. Consider all sides or perspectives. In addition, you must include in-text citations linked to your Works Cited page at the end of the document.
1500 words/IEEE references. Topic is: – Design a new routing algorithm. Must include the formula used to calculate cost or any other mechanism of determining the next hop, the structure of the L3 packet and what the next hop looks like. Use case of algorithm must be explained
You have been hired to manage the IT network team of Conway Design Firm. Your team is responsible for designing, setting up, and implementing Windows Server 2016 for the organization. Conway Design Firm has two sites, one in New York City and one in Maryland. You are responsible for determining how Windows Server 2016 will be deployed and set up at both sites. You will be expected to design a deployment solution as well as implement the solution for the organization. The company would like to implement the use of virtual machines in the areas where it would be prove most efficient. Conway currently has 60 employees. The employees and departments are listed below: Management Team—5 managers Sales Department—12 employees Design Team—15 employees Human Resources—3 employees IT Staff—4 employees (who manage day-to-day IT duties) Other general project information: Sites: There are two sites—Maryland and New York Equipment: Networking equipment/computers already exist at both locations Please make appropriate assumptions regarding any information gaps in this case scenario. In addition, feel free to add relevant information needed for deploying Windows Server 2016. PROJECT GUIDELINES Adhere to the following guidelines for your project: Your paper should be between 2500 and 3300 words long (approximately 10 to 12 pages, double-spaced). This length excludes the title page as well as graphics, diagrams, tables, and the references page. Font size should be 12 point; use a readable font such as Times Roman or Arial. Use at least five credible resources, and format them according to APA style. For up to two of your references you may use TestOut material or other study materials from this course; the remainder must be external references. Use diagrams and visuals, as appropriate, to demonstrate your solution. Your report must include the following sections and fully address the related topics. Use the following outline format for your report. Introduction: Briefly summarize the highlights of your solution, and list some of the primary reasons behind your plan. (You will discuss this in greater depth in the conclusion.) Features of Windows Server 2016: Explain in detail the features that your team plans to utilize. Server Editions and Deployment: Your solution should answer the following questions: Which edition of WIndows Server will be implemented for all sites, divisions, offices, and so on? Where will the servers be located? Why was this location chosen? How will the servers be deployed? Explain the deployment process. What services and roles will be utilized to deploy the servers? Storage Solution What type of storage will be used? Discuss storage spaces. Active Directory Deployment How many Active Directory domains will be created? How will the sites be created? How will data be duplicated between the sites? How will the organizational units be organized? DNS and DHCP: Explain the following How will DHCP be setup? Explain scopes and number of DHCP server needed. Fault tolerance for DHCP. Exclusions and reservations DNS namespace and zones Virtualization Implementation Where will virtual machines be used and for what purpose? Provide a rationale. Monitoring File and Printer Sharing Number of printers and locations Printer permissions File and folder permissions needed NTFS/share permissions Group Policies What types of group policies are needed? Password policies Audit policies User rights Conclusion and Security Recommendations: In a concluding section, justify your solutions with reference to best practices as well as each solution’s appropriateness for the given scenario, providing rationales. In addition, please provide three to four key recommendations for baseline security hardening of Windows Server 2016 as it relates to your solution.
1. Complete this discussion by selecting one of the Case Studies from Module 1- 8 in MindTap (this can any of the Case Studies in your MindTap book). Answer the questions and then post a summary along with your responses. *Do not submit to MindTap post to the discussion here. Your summary should be paragraph written responses that reflects your understanding- NOT a simple 1 sentence response. No more than 300 words. Use APA citations/references. https://owl.purdue.edu/owl/research_and_citation/resources.html Remember: Use APA style for any citations. You should NOT copy and paste. You should summarize the cited definition- as a college student you don’t and should NOT need to directly quote but instead indirectly summarize what the definition is. As a College student, you should avoid using dictionary definitions. Case1 Cloud Computing at Intercontinental Hotels Group (IHG) InterContinental Hotels Group (IHG) is an international hotel company that operates over 4,000 hotels in 100 countries under seven brands, including Holiday Inn and InterContinental. It is also the largest Western supplier of hotel rooms in China. IHG uses several types of cloud computing platforms to improve the efficiency and effectiveness of its operations. In addition to cost savings, the company says, it moved into cloud computing because it wanted a faster and more flexible way of getting a new system up and running, and because of the cloud’s ease of integrating various applications under a single platform. According to Bryson Koehler, IHG’s senior vice president of revenue and guest information, the savings also comes in other ways, “such as improved flexibility and the ability to deliver a more tailored experience to end users.” IHG is building a private cloud for its CRM applications using Salesforce.com’s CRM. It is also building a private cloud called Camelot for its loyalty program. Camelot performs several major tasks. First, it analyzes current guest activity and maintains historical records for future use. Second, it is used for promotions tailored to individual guests. Third, it runs revenue management and room-yield operations, from which room rates are calculated. The public cloud at IHG is used for application development and testing. This includes steps similar to the systems development life cycle (SDLC) discussed in Module 10. The platform chosen for this operation is Amazon Web Services’ Elastic Compute Cloud infrastructure. At least three cloud delivery models are in use at IHG, including SaaS, IaaS, and a private cloud. Answer the following questions in a Microsoft® Word document and save the file on your computer with your last name in the file. (Example: module_14_case1_Jones.doc) What are some of the reasons that IHG is moving into cloud computing? What are the three cloud delivery models used at IHG? How does IHG use different cloud delivery models? Why are business functions separated in different cloud models? Case2 Virtual Reality Enhances Try Before You Buy Concept A growing number of businesses are using VR, AR, and MR in creative ways in order to sell more products and services, improve customer service, and reduce operational cost. This technology enables businesses to promote their products in an entirely new way. Here are a few examples: Audi, the German car maker, uses VR at the dealership that allows customers to configure their new Audi and experience their dream cars virtually, in real time. Manufacturers such as Boeing and Airbus use the technology to eliminate the need for expensive, full-scale prototypes of their designs. Marriott International uses VR for event planning. Event organizers and customers can get a realistic idea of how their event would look with a VR-powered headset. Users can see 360-degree, 3D views of custom-designed room setups and all the fixtures, making event planning easier than ever. As another example, Lowe’s is a home improvement company that operates more than 2,370 home improvement and hardware stores in the United States and Canada. In select U.S. markets, Lowe’s gives its customers the opportunity to design their perfect bathroom or kitchen and then, using VR, walk through the finished space and experience it as a test drive in order to get the look and feel of the final product. The VR/AR platform used by Lowe’s is called Holoroom, powered by Marxent’s Visual Commerce application. Lowe’s Holoroom customers work with a trained sales associate to choose from thousands of SKUs (stock keeping units), from paint and flooring to plumbing fixtures and appliances. According to Marxent, the items chosen by the customers are added to the design as virtual 3D objects. Once all the items are added and the customer is satisfied, then he or she is given an Oculus Rift headset (by Facebook) to view the space that the customer has designed and get the look and feel and make any adjustments. Interestingly enough, customers can share the designed space with others by sending it to YouTube 360 and can view it at home with a Lowe’s-supplied Google Cardboard. To bring their virtual design to life in the real world, the customer orders the products and services that they have selected from Lowe’s. Answer the following questions in a Microsoft® Word document and save the file on your computer with your last name in the file. (Example: module_14_case1_Jones.doc) How is VR changing sales? What are some additional applications for VR and sales? Discuss. How does Holoroom work at Lowe’s? What are two advantages of using Holoroom at Lowe’s?
The Software Engineering Institute, SEI is located at Carnegie Mellon University and is the brain trust for CMMI, “Capability Maturity Model Integration”. It is a process improvement methodology which has grown in popularity and usage. So far CMMI has been most widely applied in software and systems engineering organizations.
Below are a couple of URL’s which point to relevant web sites which describe and discuss CMMI.
CMMI Institute Overview.: http://cmmiinstitute.com/.
http://www.cmmifaq.info/ (Very extensive web site exclusively dedicated to CMMI FAQs)
Choose a development model, preferably one you have used or using. What are the Process Areas (discuss at least two PAs) that you are missing in your development model? Why do you think they are needed?
Using the spreadsheet given, identify the food items, for which portion amounts are recorded as greater than ‘1’ in your food log. In a new sheet, create one-variable data tables for these food items. Data tables should calculate the amounts of calories relevant to the number of portions. The input values for the number of portions should run between ‘1’ and the value recorded in your food log. For example, if the number of portions for some food item has been recorded as ‘5’ in your food log, then input values in a data table would be integers from 1 to 5. For each previously selected food item, create a two-variable data table that calculates the amounts of calories based on various portion sizes and the number of portions. As in the previous step, the maximum number of portions should agree with the corresponding value of the item in your food log. – Scenarios Using Scenario Manager, create a set of scenarios for projecting the results of calculations in your food log table. Note: Save the initial values as “Original values” scenario. Next, in a new sheet, generate a scenario summary report. Summary Report In a document, using 3-4 sentences, explain the role of one and two-variable data tables in a data analysis process as applied to your model. Briefly describe your approach for building scenarios. Clarify whether you chose to eliminate certain food items from your menu or to reduce the portion sizes, and why. In 3-4 sentences, discuss whether a scenario summary report contains all information necessary for making an adequate decision. Submit both the Excel workbook and a Word document for this activity.
I’m missing the following requirement from this assignment
“Explain how an Agile methodology affects the process flow of each software development phase”
Please add a 1 paragraph entry to phases 1, 2, 3, and 4 on how Agile methodology affects each process
I’ll attach the original assignment overview
Module 03 Course Project – ER Diagram and Implementing the Database
During the Requirements Phase in Module 02, you created a Requirements Document and stated a recommendation. This module’s project assignment will be focused on the Design and Implementation Phases. In this module, you will create a normalized ER diagram in MySQL Workbench for the database described in your Requirements Document. Once the ER diagram is complete, you will create a Forward Engineered SQL script from the ER diagram. You will then run the script to implement the database, tables, and relationships given in the ER diagram.
Create a normalized ER diagram in MySQL Workbench for the database described in your Requirements Document.
Take a screen shot of the ER diagram.
Using Workbench, create a Forward Engineered SQL script from the ER diagram.
Run the Forward Engineered SQL script to implement the database in MySQL. This must include the creation of all tables and relationships given in the ER diagram.
Use MySQL’s CLI to:
Output a list of the tables that exist in the database.
Output the structure of each table.
Take a screen shot of all of these outputs.
Copy the following items in to a Word document.
The screen shot of the completed ER diagram in Workbench.
The script that was created by Forward Engineering the ER diagram in Workbench.
The MySQL’s CLI screen shot of the list of tables in the database.
The MySQL’s CLI screen shots of the structures of all of the tables in the database.
Submit your completed assignment by following the directions linked below. Please check the Course Calendar for specific due dates.
Save your assignment as a Microsoft Word document. (Mac users, please remember to append the “.docx” extension to the filename.) The name of the file should be your first initial and last name, followed by an underscore and the name of the assignment, and an underscore and the date. An example is shown below:
The objective of the final capstone thesis project is to evaluate you on your ability to apply the
program learning outcomes to a final, all-encompassing information systems (IS) or information
technology (IT) thesis project. Successful capstones will follow an objective research
methodology to collect or generate data that informs the analysis and design of a new computing
system related to the primary domains identified by the Association for Computing Machinery
(ACM): cloud architecture and/or computing, cybersecurity systems, databases and/or data
analytics systems, enterprise architecture, information systems, integrated systems, internet of
things systems, networks, platform systems, software development, user interfaces, virtual
systems, and/or web and mobile applications