only experienced programmers to work on it, i need it within 8-10 hours. contact me asap
it is like this from this blog post
only experienced programmers to work on it, i need it within 8-10 hours. contact me asap
it is like this from this blog post
this is Ethic Project that needs to be done By Today.
I will provide everything you need to understand it, it’s small Project
Welcome to Week 3
This week we will tackle the tough topics of anonymity, net neutrality, censorship, and controlling speech. All these topics can easily start a debate among the most conservative individuals. It is important to understand these concepts can sometimes counteract the progression of technology in society.
Pick a topic below and post your reply by Wednesday at midnight. Your response should be at least 200 words and appropriately cites your resources.
Respond to two of your classmates by Sunday at midnight. Your responses should be at least 100 words and should be substantive. You should offer additional resources, insight, or other helpful feedback. A simple “I like your post” will result in a 0.
You will not be able to see your classmates’ posts until you make your first post.
Note: plagiarism is not tolerated in this course. Everything must be in your own words with sources! Failure to do so will result in failing grade.
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course(ENTERPRISE RISK MANAGEMENT) have been applied, or could be applied, in a practical manner to your current work(SOFTWARE DEVELOPER) environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. Requirements:
Background: Kamehameha Institute is an organization that provides educational offerings to non-traditional students via the institute’s website in a three-tier web, application, and database configuration. The State of Hawai’i regulates the educational sector, driving the need to ensure Kamehameha follows the State’s strict security and regulatory requirements. Kamehameha’s leadership is also very concerned with the threat posed by the online theft of their unique intellectual property. Additionally, the number of Hawai’ian entities breached by threat actors is on the rise. Thus, security, privacy, and compliance are all important considerations for the Kamehameha network architecture.
Your boss, the Kamehameha Institute’s Chief Operating Officer (COO) has tasked you to design a network infrastructure for three facilities located in the Hawaiian Islands of Honolulu, Hilo, and Lihue. The COO stipulated that you must provide for strengthened defenses to protect Kamehameha’s cultural heritage. After meeting with the COO, the two of you drafted the following set of requirements for your network design:
Submission: Using a network diagramming tool such as Microsoft Visio, or free tools such as LibreOffice Draw or Draw.io available at https://draw.io (no sign-in or registration required), create a network diagram (drawing) specific to the organization that encompasses the three facilities and also depicts any necessary interconnections. Figure 1 shows the draw.io ‘new network diagram’ dialog window:Figure 1. Draw.io New File Dialog Showing the Network Diagramming Templates
Your diagram should include enough detail to show the topology interconnections. The viewer should be able to understand the Kamehameha Institute’s network environment and be able to implement the architecture you develop. Ensure that you properly cite any external sources.
One of the keys to producing a viable network diagram is labeling the objects consistently and descriptively. Think about what you would want to know about a network device if you logged into it with little prior information. Consider location, floor number, or other pertinent information. At a minimum, include the following elements:
Example Network Diagram Callout Box.
CMIT 350 6980
Project #1 Network Diagram
Student Name: Name
Date: 6/22/2010
When finished, export the diagram as a PDF document (Note: You will need to use this diagram again in Project 3, so ensure you save the xml source file!) and submit it to the Assignment folder. Figure 2 demonstrates how to export your draw.io diagram as a PDF document:
Week 9 Assignment:
Submit a one to two-page paper in APA format. Include a cover page, abstract statement, in-text citations and references.
Need a Cloud-based Antivirus which would satisfy the specs mentioned below
1. Must have a local agent/software on the local computer that monitors a directory for new files.
2. Whenever a new file is added to this directory, the local agent must check the file to find if it is in the blacklist or whitelist.
3. If it is in neither, then the local agent must upload it to the cloud.
4. On the cloud side, there must be the following components: multiple virtual machines each with a separate anti virus engine installed, and a central monitor virtual machine that accepts file uploads (or monitors file uploads to S3), and then uses cloud services such as AWS Lambda to provide the file to the virtual machines with anti virus engines. The engines scan the file and sends report back to the monitor which combines the reports and sends the report back to the local engine, telling it if it is a virus/not a virus. Also, the blacklist or whitelist must be updated
Discussion 1
Comment on the topic below.
Mobile Devices and Apps for Health Care Professionals: Uses and Benefits
Give some reasoning behind your views. What would be the impact of this approach to the Health care facilities like Hospitals and general public.
Source https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4029126/
Mobile devices are being used more daily to include smartphones and tablet computers that have both cellular and Wi-Fi (Wireless Fidelity) connectivity. The wealth of information stored on these devices leads the investigator to look at them for clues or leads that would aid in the investigation.
An investigator has found some graphics involved in a case. There is a strong suspicion that the picture location can help put the subject at different locations in question.
The investigator needs to know as much about the graphics as can be discovered about what equipment was used, locations where they were taken, and dates and times of them. Using the files found in the attached file, complete an analysis of the graphics, and write a formal report outlining the findings of the analysis.