overall process of developing new software

Discussion: This week we discuss the overall process of developing new software.  Please also note the differences between software development and methods.

Note: The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion.  Please engage early and often.

Your response should be 250-300 words.  Respond to two postings provided by your classmates.

discussion-counter

 

There are a variety of ways that a cyber-attack can cause economic damage. In many cases, attackers try to “penetrate” systems in order to steal technology or other sensitive information. When do you think an attack can be classified as cyber terrorism?

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Discussion and Assignment 5

Discuss the overall process of developing new software. Please note the differences between software development and methods.

Need 125 words on this topic with references and in a separate document.

Assignment 1:

Q1::

How is the IT function organized in your school or place of employment? Create an organization chart showing how the IT organization fits into your overall organization. Comment on how centralized or decentralized the IT function is.

Q2::

Which software-development methodology would be best if an organization needed to develop a software tool for a small group of users in the marketing department? Why? Which implementation methodology should they use? Why?

The above assignments should be one page submitted in a single Word document with references. 

Assignment 2:

Chapter 7 – Review the section on dealing with multiple locations and outsourcing. Review figure 7.2 and note how virtual team communications further reiterates the importance of this model. (Information Technology and Organizational Learning)

Chapter 8 – Review the Siemens AG case study. Note the importance of understanding the interrelationships amongst all the senior leaders at every location. Pay special attention to Figure 8.1 and Figure 8.2. Note how the corporate CIO should engage with each of the regional leaders. Why is this important? (Information Technology and Organizational Learning)

The above submission should be two pages in length (one page for each question) and adhere to APA formatting standards with references included.

bidis1

 Compare and contrast predictive analytics with prescriptive and descriptive analytics. Use examples.

Enterprise Risk management – Practical connection assignment

At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making and enterprise risk management. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career. 

Assignment: 
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 
  • You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 
  • Any use of outside sources, including your own prior work, will result in a zero on the activity and a report being filed with Academic Affairs regarding plagiarism (even if self-plagiarism).

Windows Server Network Proposal

Writing a networking proposal as attatched.

Windows Network Proposal – Networking

You have been hired by Fixing Windows LLC as an Information Technology consultant to develop a technology proposal. Fixing Windows LLC manufactures and distributes solar panel for the consumer market. Your job is to submit a proposal that meets their criteria.

cap

Class: BLCN 531 Introduction to Blockchain and Crypto-currency Assignment: Capstone Project. Length: Minimum of 1000 words.

Pick one area where you think Blockchain Technology could be proposed as a solution and briefly explain your proposed solution. Your final document should include an Abstract and a Conclusion. This assignment should be in APA format and have to include at least six references.