Server Virtualization and Cloud Computing

This week, you have read about server virtualization and cloud computing in chapter 6 of your textbook. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

  • Describe the organization’s environment, and evaluate its preparedness for virtualization.
  • Explain Microsoft (or another product) licensing for virtualized environments.
  • Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization.
  • Explain Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure’s Internet as a Service (IaaS) and storage capabilities

Make a recommendation for cloud computer use in the organization, including a justification for your recommendations.Submit your midterm research paper as a single document. Your paper should meet the following requirements:

  • Be approximately four to five pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Access Control Research

Research 14-1 – Application security or penetration testing methodology.    APA formatting is expected.  Research various application security testing or penetration testing methodologies.  Compare and contrast the pros and cons of each methodology and recommend your preferred approach. 

Intellectual Property Theft

 This week, your internship assignment takes you to the Corporate Security office, headed by the Chief Security Officer (CSO). This office has recently completed an investigation into how a competitor may have obtained copies of the confidential architectural drawings and design plans for a new type of resort that the company had planned for a recently acquired island property. At least one competitor is known to have received copies of the company’s intellectual property through an economic development office within its country’s government. It is suspected that an Advanced Persistent Threat mechanism may have been used to exfiltrate information from Padgett-Beale’s existing hotel property within that geopoliticall jurisdiction. Another competitor, also operating in that geographic area, contacted Padgett-Beale’s Corporate Security Office and disclosed that it had been sent URLs for web pages containing links to the resort plans by an unknown party. The other firm wanted to make it clear to Padgett-Beale that they did not condone nor participate in such illegal and unethical taking or receiving of another company’s intellectual property.

As part of the company’s response to this theft, the CSO’s office has been asked to prepare a background briefing for company’s executives that addresses the problem of protecting intellectual property stored in digital form. The briefing must include recommendations for best practices that the company’s executives should be adopting to prevent / respond to such thefts.

Begin by reading the readings for this week. Then find additional information through your own research.

Write a 2 page summary of your research and analysis for review by the CSO’s senior staff. Your summary should begin by explaining the problem of intellectual property theft. Next, address the reasonable and customary processes and procedures which should be used to discourage or make it difficult for employees, managers, and executives to inadvertently misuse and/or steal the company’s intellectual property (at a minimum, you must address data classification and marking, separation of duties, and least privilege). You should also identify and explain five or more best practices which the company should implement as it responds to this growing problem.

Remember to list and cite your sources at the end of your research summary using a professional and consistent citation format (APA recommended).

week 3 Discussion physical security

Question: Based on this week’s lectures take an inventory of door and window locks in your living area or place of work to identify areas of concern and improvement. Remember to get permission from security.  

For this assignment: The 4 Heading-1s are required. Each Heading-1 must have at least 3 Heading-2s. Each Heading must have at least 2 properly formatted paragraphs with 3 properly formatted sentences each. 

– References 

– APA 7 Format

– 400 words

–  No plagiarism 

Discussion 15- Legal

Assigned Readings:Chapter 19. Management of Employee Welfare.Chapter 20. Management: Employment Discrimination.Initial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:

  1. Explain what OSHA is, its purpose, and what responsibilities there are under the law. Additionally, explain how it can be violated, and the penalties for any violation.
  2. Peter Plaintiff had his constitutional rights violated by a county sheriff’s department.  What steps would Peter Plaintiff need to take to seek damages under 42 U.S.C. § 1981?
[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!]

Text

Title: Business 

ISBN: 9780357447642 

Authors: Marianne M. Jennings 

Publication Date: 2021-01-01 

Edition: 12th Edition

6/3 discussion

  1. Upload your second paper (assignment 6.3 Second Paper) (compliance and governance plan) to the discussion for the workshop.
  2. Give a short summary of the paper and the subjects you covered in the document.
  3. Your initial post should be a minimum of 300 words

short answer

 In order to be an effective developer, one must be able to write applications for both the Web and for local devices. Web development comes with its own unique set of issues and problems. After doing some research on the Internet, describe three coding issues that you, as a developer, feel are the most important to overcome. 

Discussion & Assignment

For discussion – 1 question need 3 different answers – Each answer with 1 APA reference, 150 words

Assignement – 5 question need 1 answer for each – 100 words for each (1 or 2 APA references in total)

Week 12 Homework

Select any example of a visualization or infographic, maybe your own work or that of others. The task is to undertake a deep, detailed ‘forensic’ like assessment of the design choices made across each of the five layers of the chosen visualization’s anatomy. In each case your assessment is only concerned with one design layer at a time.For this task, take a close look at the annotation choices:

  1. Start by identifying all the annotation features deployed, listing them under the headers of either project or chart annotation
  2. How suitable are the choices and deployment of these annotation features? If they are not, what do you think they should have been?
  3. Go through the set of ‘Influencing factors’ from the latter section of the book’s chapter to help shape your assessment and to possibly inform how you might tackle this design layer differently
  4. Also, considering the range of potential annotation features, what would you do differently or additionally?

Submit a three-page document answering all of the questions above.  Be sure to show the visualization first and then thoroughly answer the above questions. Ensure that there are at least two-peer reviewed sources utilized this week to support your work.Your work must be enterely origional, checked with grammarly, and make use of proper grammatical conventions.