CC W 15 D

 Select from the following list four (4) topics and discuss. Use only 50-words max per topic to discuss and present your answer.  The discussion questions this week are from Chapter’s 19-20  (Jamsa, 2013).

Chapter 19 topics:

  • Define scalability.
  • List five to ten potential relationships that align with the Pareto principle, such as how 80 percent of sales come from 20 percent of customers.
  • Compare and contrast vertical and horizontal scaling.
  • Explain the importance of the database read/write ratio.
  • Assume a site guarantees 99.99 percent uptime. How many minutes per year can the site be down?

Chapter 20 topics:

  • List and describe five ways you think the cloud will change the future of TV.
  • List and describe five potential uses for intelligent fabric.
  • List and describe five ways the cloud will influence the mobile application market, or vice versa.
  • Discuss the importance of HTML 5.
  • Discuss how the cloud will impact future operating systems.
  • List and describe three potential location-aware applications.
  • List and describe five ways intelligent devices may work together.

Linux Implementation Proposal: Migration Proposal Presentation

 

Faster Computing has contacted Go2Linux and requested a brief  proposal presentation for migrating its systems from Windows to Linux.  The company is specifically interested in seeing the following  information:

  • Based on your current understanding of Faster Computing’s business, what are some potential benefits of Linux?
     
  • The company is aware that many different Linux derivatives exist. Which would Go2Linux recommend, and why?
     
  • Are there graphical interfaces available for the Linux workstations  that would provide similar functionality to Windows? Some users are  concerned about working with a command-line interface.
     
  • What steps will be required to migrate the systems from Windows to Linux?
     
  • What tools are available on Linux for the servers to provide file sharing, web servers, and email servers?
     

The deliverable for this phase of the project is a three- to  five-slide PowerPoint narrated presentation. For each slide, you will  embed your own audio recording as if you were presenting the content to  the Faster Computing team. Faster Computing has not yet committed to the  project, so this should be presented as a proposal. 

The presentation should be visually appealing; inclusion of at least  one image that supports the content and adds value to the proposal is  required. You must cite at least two quality sources.

PowerPoint_1G_Northern_Lights

 

#PowerPoint_1G_Northern_Lights

#PowerPoint 1G Northern Lights

Open   the file Student_PowerPoint_1G_ Northern_Lights.pptx downloaded with this project.

Replace all occurrences of the   text North with Northern and then change layout of Slide   1 to Title Slide.

Apply the Ion theme with the   second, blue variant to the presentation.

Change the Slide Size to   Widescreen (16:9).

Display Slide 2, open the Reuse   Slides pane, and then from your downloaded files browse for and display the   presentation p01G_Slides.pptx. If   necessary, clear the Keep source formatting check box, and then insert the   last two slides.
   Note, Mac users, after importing the slides, delete Slide 3-Alaska Slides

Display Slide 2. In either the   slide pane or in the slide outline,  click at the end of the first bullet   point after the word time. Press   SPACEBAR. Add the words for viewing and then in the same slide, increase the list   level of the second and third bullet points.
 

With Slide 2 still displayed,   select the title and change the Font Size to 32. In the Notes pane, type the   following notes: The lights reach their peak in September and March. Be sure to type the period at   the end of the sentence.
 

Display Slide 3. Select the   paragraph of text, and then change the  Font Color to in the last column, the   third color. Change the Font  Size to 16, and then apply Bold.

In the same paragraph, change the Line Spacing to 1.5, and then   center the paragraph and the slide title.

With Slide 3 still displayed,   format the picture with the Soft Edge Rectangle picture style and the Marker   artistic effect.

Display Slide 4. In the content placeholder on the right, from your   downloaded files, insert the picture p01G_Lights.jpg.   Apply the Reflected Rounded Rectangle picture style.

Move Slide 3 between Slides 1   and 2.
 

Display Slide 4. Insert a New   Slide with the Section Header layout. In the title placeholder, type Visit   Fairbanks and View the Northern Lights! In the text placeholder type With Kodiak   West Travel

Apply the Uncover transition and   change the Effect Options to From  Top. Change the Timing by increasing the   Duration to 01.25. Apply the  transition effect to all of the slides.

Insert a Header & Footer on   the Notes and Handouts. Include the  Date and time updated automatically, the   Page number, a Footer with  the text 1G_Northern_Lights and then apply to all the   slides.

Display the Document Properties.   Type northern   lights, Fairbanks   as the Tags.
   Note—Mac users use the Keywords box.

Fundamentals of Security

In discussions with the IT Director you discover that previous requests for network monitoring software were denied despite the large number of devices and logs spread throughout the enterprise. She has new found hope that the change in culture and philosophy with senior leadership will reduce the burden on the network team so they can focus on other high priority efforts. 

write a point paper: 

Discuss the importance of network monitoring software.  

Include a summary of the various network devices and their role in network security.  

Discuss how critical log management is in identifying security incidents.  

Provide a brief description of an enterprise network management solution by doing a search on the web.

I have a deadline by tomorrow 11 AM. let me know soon.

    

1) Assume you have a 5 number bike lock of the form where you roll each key. Each key is hexadecimal (yes we’re geeks) and you have learned 3 of the keys (not in any order though). What is max number of attempts to open the lock? Please show all math. (Hint, first show how many tries for 4 keys and one unknown).

2)  For this use a Windows based machine…use the lab machines if you don’t own one. Locate the Windows Event Viewer and open it

  1. How many warnings in (list the first      10 and describe what the warnings are):

Answer here: list at least 10 warnings and give context of these warnings if necessary (i.e. add a minimum of 100 words for describing what they are)

  1. Do the same for System (list the first      10 and describe what the warnings are).

Answer here: list at least 10 warnings and give context of these warnings if necessary (i.e. add a minimum of 100 words for describing what they are)

  

3)Research and describe, w/diagrams, how AES and DES algorithms work.

total minimum of 900 words split up as follows: 450 words for AES and 450 words for DES. Also include detailed technical diagrams 

Analyzing & Visualizing Data

 

  •   Complete the Developing Intimacy with your Data Exercise located at the following link:
    Working With Data (Click chapter 4 and then exercises)
    Submit a brief paper discussing:
     
  • Why you selected your data set?
  • What are the physical properties of the data set?
  • What could you do/would you need to do to clean or modify the existing data to create new values to work with? 
  • What other data could you imagine would be valuable to consolidate the existing data?
  • Include a screenshot showing your using R, SQL, or Python to perform a manipulation of your data.

        

  • By submitting this paper, you agree: (1) that you are  submitting your paper to be used and stored as part of the SafeAssign™  services in accordance with the Blackboard Privacy Policy;  (2) that your institution may use your paper in accordance with your  institution’s policies; and (3) that your use of SafeAssign will be  without recourse against Blackboard Inc. and its affiliates.