Oral Presentation:-

   

· Create a 10-minute presentation on you, demonstrating your Professional Profile on LinkedIn and highlighting the skills you can bring to your chosen industry in the Australian market – your presentation topic is: “What I have to offer the Australian workforce”

so I wanted Do CCNA CCNP (Routing And Switching) Course later this year and work as a Network Administrator so can you make research presentation on this Course And Work

short answer

 As a developer, it is important that you find the right language to master. Python is still one of the most used languages, but you want to make sure that you are current with others as well. It is important to note that there are wrong languages to choose that will put you behind the curve, as the landscape is ever-changing. Do some research on the Internet and describe one language other than Python that you feel would be beneficial to your career and one that would not. Be sure to include your reasoning. If you are not a developer, how does learning Python or other languages benefit you? 

Short paper

Please view the following video and answer the following questions:

Cyber-Protecting Critical Infrastructure

https://m.youtube.com/watch?v=yCkip3GRAwM

1) What insights did you get from the presentation?

2) What did you learn about ICS/SCADA systems?

3) What is the US approach to protecting Critical Infrastructure?

quick post

 Writing a good request for proposal (RFP) and managing a well thought out process to select the right partner for your company can mean difference between a great success and a total disaster.

http://tonykinard.net/digital-rfp-guide/#.UswtV7RdCSo

http://operationstech.about.com/od/vendorselection/a/VendorSelect-RFP-RFQ.htm

Alternate Link: https://mindbuffer.wordpress.com/2013/10/08/nine-steps-to-successful-information-technology-vendor-selection/

Describe three things that make an RFP great and three that make it a disaster. Which step should take the most amount of time and which one is the most important?

100 words

Individual Project Week 6: Social Text Analytics

 Social media and its data are both a challenge and an opportunity for managers. Please follow the instruction in Text Social Data Analytics to use Orange software for mining text data from social media. You need to submit the completed Orange file and the sentiment analysis Excel file as a zipped file attachment.

  1. Social Media Text Data Analytics
  2. Using Corpus to Read Tweets for Sentiment Analyses

If Twitter did not approve your application for a developer account, please feel free to use any of the 4 files with tweets data posted in the zipped folder above titled “Tweets Data For Project 7”.  Instead of using the Twitter widget, use the Corpus widget to upload the excel file of your choice (see video 2) and follow the steps shown in the video. 

Assignment

  

The Corporation Techs’ current network consists of 1 web server (accessible by the public), 2 application servers, 2 database servers, 2 file and print servers, and 50 workstations. The web server runs Linux/Apache, the other servers run Microsoft Windows Server, and the workstations run Microsoft Windows. The network is connected through a series of switches, is not physically connected to other networks, and runs Internet Protocol version 4 (IPv4). The network is protected by a single border firewall. The senior network architect, whom you work for directly, has verified the company’s business goals and has determined the features and functions required to meet those goals.

The senior network architect has asked you to create a network design that includes the following components:

§ Current infrastructure elements

§ A logical topology that separates the Accounting and Sales departments

§ Redundant communications

§ Justification for continuing with IPv4 or upgrading to IPv6

 The senior network architect at Corporation Techs has informed you that the existing border firewall is old and needs to be replaced. He recommends designing a demilitarized zone (DMZ) to increase network perimeter security. He also wants to increase the security of network authentication, replacing the current username and password approach 

  

As you are aware, many remote users will soon need access to the internal network and services. A remote access and virtual private network (VPN) plan is needed to connect it all together.

The senior network architect has asked you to create the plan that will allow secure remote access to the internal network while preventing unauthorized access. He specifically requested that all information transferred between remote users and the organizational servers be protected against snooping.

You are ready to create and submit a final network design and plan to the senior network architect, who will present it to senior management and other decision makers.

Tasks
For this part of the project, perform the following tasks:

1. Create a final network diagram that includes the basic diagram and all relevant network enhancements.

2. Create a professional report that includes content from each draft report. Include details for all relevant information, persuasive justification for your recommendations, and methods to measure the success of each major network enhancement. Include a 1- to 2-page executive summary.

3. Use simple, clear language that primary stakeholders (non-IT) can understand easily.

Submission Requirements

  • Format: Microsoft Word (or compatible)
  • Font:      Arial, size 12, double-space
  • Citation style: Your school’s preferred style guide
  • Length of final report: 10–16 pages, including executive summary and      network diagram

Self-Assessment Checklist for Final Report

  • I developed a network design that meets the requirements.
  • I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.
  • I described technology recommendations, provided justification for those recommendations, and described methods to measure the success of each major network enhancement.
  • I included an executive summary and a final network diagram.
  • I included citations for all sources used in the report.
  • I followed the submission guidelines.

game

good day everyone. Guys I ask for help..I want to develop my game and I have fairly rich parents who are ready to help me and invest in my game…but I don’t have the knowledge to do this, help me..

Various maturity stages and variables in the middle manager best practices arc.

This week we focus on the various maturity stages and variables in the middle manager best practices arc.  Refer to chapter 12 from this week’s reading and not the various stages, what they are and why they are important. 

TextBook: 

Information Technology and Organizational Learning

ISBN: 9781498775755

Authors: Arthur M. Langer

Publisher: CRC Press: Taylor & Francis Group

Publication Date: October 2017

Edition: 3rd ED.

IT Data storage

Select an organization of your choice and describe at least two data storage options that the organization adopts. Discuss the reasons why the company chooses these storage options.