You have been hired as a consultant

  

You have been hired as a consultant to secure all network devices for a large firm. 1. Describe the steps you would take to determine the needs of the organization (the discovery of the network devices) 2. Detail the countermeasures (and tools) you would put in place. 

Marketing Strategy Assignment

  

During this course we will review the key concepts to successfully develop a marketing plan.  You will apply these concepts to a program, product or service of a company of your choosing. (See acceptable company list).  You will use the same company and product and service for all milestone papers.  Once your professor has approved your product/service and company, describe the following in paragraph form:

· Provide an overall summary of the company and the product/service offerings.

· What is the product or service you will redefine or introduce as new? 

· Why is it a good time for the company to explore this opportunity now?   

· What are the short term and long-term goals?

· Does this product or service support the company Mission, Vision and Core Values.  (Yes/No and why?  Be sure to include the company mission and vision statements in your response).

· What are the risks/benefits of introducing this product/service? 

Your initial response to the discussion question should be 250-300 words. You must have at least one course (our text) and one non-course scholarly/peer reviewed source in your initial posting.  Sources require in-text citations and must be incorporated into the body of the post in addition to a full APA citation at the end of the post.

The Internet and Dev-Ops

Placing equipment and services on the Internet exposes them to critical cybersecurity threats. Read this student submission to the SANS Institute, summarize in five sentences and comment on why you feel DevOps would or would not improve security for Internet-connected services.

Continuous Security: Implementing the Critical Controls in a DevOps Environment  (Links to an external site.)

Aligned Objectives

  • Identify methods of protecting servers and services on the Internet
  • Discuss the different types of web services typically run in cyberspace 
  • Identity different cyber threats and how previous topics can prevent issues

Response Parameters

  • Each initial post should be 250 to 350 words. Respond to at least one peer’s post by providing potential solutions to their concern

Criteria

Summarize the article.

Discuss how they would or would not improve security with DevOps.

H3

 Review APA criteria and Lab 3 Document. Please read the document carefully and answer all the questions from Document HW 3.

Problem 11- Legal

Question I – Bono is a musician.  He sells his neighbor a gently used lawn mower at a deeply discounted price.  The neighbor is dissatisfied with the performance of the lawn mower.  Can the neighbor sue Bono under the UCC §2-314, the implied warranty of merchantability?  Why or why not?

Question II – If cigarette companies want to work with one another for a common interest, what is one example that would allow the cigarette companies to do so without violating the Sherman Act?  What source of law protects the cigarette companies’ actions?

Text

Title: Business 

ISBN: 9780357447642 

Authors: Marianne M. Jennings 

Publication Date: 2021-01-01 

Edition: 12th Edition

HR Management & Blockchain

 What are blockchain’s potential applications in organizational functions such as human resource management, accounting, and supply chain management?

500 words paper

 Reference page and in-text citations must match 100%.