Java class

Hello,

I am looking for assistance with my Java class through Sofia. I am looking for a person with a decent amount of Java experience. 

IT348 week 7

 APA Format Header and citation 400 words

Click on the link “The main reasons why IOT companies failed.”  Compare the mistakes/challenges from chapter 8, pages 175-177, with those mentioned in the article. Match each mistake (5) in the article with at least one in chapter 8.
https://www.raconteur.net/technology/the-main-reasons-why-iot-projects-fail (Links to an external site.)

Submit your answer in Canvas for credit.

network security

A typical IT infrastructure has seven domains: User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, WAN Domain, Remote Access Domain, and System/Application Domain. Each domain requires proper security controls that must meet the requirements of confidentiality, integrity, and availability.

Answer the following question(s):

In your opinion, which domain is the most difficult to monitor for malicious activity? Why?

In your opinion, which domain is the most difficult to protect? Why?

Risk management

 

Write a 250 to 500 word-long discussion post addressing the way risk management affects the way an organization implements an Information Security program. 

APA format is not required for discussion posts, but if you do choose to use external references, you need to format them using the APA format and cite them in your post.

Artificial Intelligence Discussion

Question: What is artificial intelligence and can humans co-exist with it?Review the Podcast instruction Guide in the General above to create your Podcast discussion or review these instructions using Audacity:

Audacity is a free, open-source, cross-platform software for recording and editing sounds. It is available for both Windows, Mac, GNU/Linux, and other operating systems.

Initial Discussion: 300 words

Responses 4 : Each 300 Words 

Ethics and Proprietary Information

Read the scenario and respond to the questions.

As a well-known consultant in the area of U.S. laws regarding counterfeit software and media, you have been asked to speak at a symposium of Chinese officials on the benefits of having strong anti-counterfeiting laws and copyright protections for software. Knowing that the counterfeiting of software is a common occurrence in China, you see this as an opportunity to speak directly with people who can help develop stronger anti-counterfeiting legislation in China. However, you are sensitive to the fact that China’s culture has different perceptions regarding the ethics of using copied software.

Do some research on how intellectual property is approached in China and perceived within Chinese culture, particularly as it involves the counterfeiting of software. Make sure to review at least two credible resources. Respond to the following in a persuasive minimum 2-page paper: 

  1. How would you explain the concepts of intellectual property theft to the Chinese officials from a U.S. viewpoint?
  2. What arguments would you use, besides legal ones, to explain why theft of other’s work product is wrong?
  3. How might you seek to bring about a change in the beliefs of someone who does not see the need for stronger intellectual protections for software?

Make your argument from both a cultural and moral standpoint. You should explain your viewpoint with the utmost professionalism.

Specific Requirements for Part 2: 

  • State a clear position on the scenario and provide a detailed explanation to support that position.
  • Examine both sides of the situation to identify the ethical issues involved.
  • Demonstrate superior organization, is well-ordered, logical, and unified.
  • Cite at least two references.
  • Follow all writing and submission requirements.