discussion 07/17

 In discussing Organizational Excellence, let’s start with an analysis of your organization or one with which you are familiar. Take the Organizational Diagnosis Questionnaire that is found aboveProvide a detailed analysis of what is working and what is not working. 

400 words.

Need one Response to each below discussion-computing

Please read the each discussion post and provide one response for each discussion in 75 to 100 words

Discussion Post 1:

 

BPaaS comprises of an integration of all processes as conducted by businesses hence enabling commercial enterprises achieve economy and efficiency in conducting business operations. With the shift to cloud computing, organizations are adopting automation of their operations to reduce on the overall cost of hardware, software amongst other resources. The implication of BPaaS on organizational operation include reduced cost of business transaction, minimal risks as well as enabling organizations achieve scalability in utilization of cloud computing infrastructure (Schwarzbach, 2016). For this reason, organizations could continue adopting BPaaS to increase their overall productivity in their operations.

BPaaS could be centrally managed by organizations unlike with other standalone applications. As an integration of all critical business processes such as payroll processing, e-commerce amongst other process, it would be possible for organizations to manage all processes at a single entry point. As a composition of multiple application, it would be relatively easier for enterprises to monitor the performance of BPaaS unlike when individual applications are used in managing business processes. As such, the risk reduction aspect is incorporated to BPaaS by reducing the multiple vulnerability points to organizational operations. BPaaS enables enterprises to have access to a skilled workforce and expertise who have knowledge in application development.  It is hence possible for organizations to seek immediate support from expertise who have knowledge on BPaaS operations. In comparison, to other traditional applications it hence becomes possible for enterprises to reduce the risks of operating BPaaS in the event of failure. It is possible to incorporate new design processes and implement further security measures to the operation of BPaaS by the help of these experts and professionals in the cloud computing platform (Duipmans& Pires, 2012)

BPaaS offers a platform for facilitating social collaborations, web analytics, business process management, security governance, compliances and risk management (Babu, 2013). The effective running of business operations requires business to adopt a comprehensive and a streamlined approach that facilitate efficient service delivery. It hence becomes possible that with the integration of BPaaS, organizations would have it easy having efficient business processing. Risk of business failure due to unstructured business process is hence not possible with the incorporation of BPaaS for business operations.  There is multifunctional capabilities usually associated with the BPaaS. The multifunctional capability hence offers opportunities for organization to adopt flexibility in their operations an attribute that is not present in many applications.  Also, before the full integration of BPaaS by most enterprises, there is usually a trial period upon which organizations should test their business processes in line with the BPaaS. The trial period as offered by most BPaaS service provider is set to make organizations familiarize themselves with the functioning of BPaaS (Babu 2013). As such it hence becomes relatively easy for organizations to use BPaaS with full knowledge on its capability hence minimizing risks of failure due to lack of knowledge and interoperability of BPaaS.

Discussion Post 2:

 

Business Process as a Service (BPaaS) is a type of outsourcing model that outsources cloud-based services to businesses and commercial organizations. Companies or business organizations can increase the agility of their business processes by using BPaaS services. BPaaS provides these companies with some valuable emerging technologies to implement and deploy their business processes. It will definitely reduce the cost related to labor by increasing automation. BPaaS outsources cloud services that can be accessed from the Internet because it is an Internet-based technology. One of the accepted definitions of cloud computing is a model for enabling convenient and on-demand network access to a shared group of configurable computing resources that can be Quickly provision and launch with minimal effort from management or service provider interaction. The core elements of BPaaS are security and privacy and can be achieved by designing some robust business processes in the Cloud. Businesses, organizations or any customer can meet their rapidly growing and changing business needs with the help of BPaaS. BPaaS is defined as a collection of activities that takes one or more types of inputs and creates an output that is of value to the customer. “Automation” will improve operational efficiency and reduce errors, but management middleware of business processes has no tools to quantitatively track these business metrics. (Woitsch & Utz (2015, October))

There are many benefits to the increasing popularity of BPaaS. It is a type of cloud services with almost all cloud services that give business organizations the peace of mind of reducing risks and improving the speed of commercialization. Cloud services store information on servers and hardware that an organization does not control. These external servers have strict security measures that prevent any form of a data breach. They typically require the most powerful firewalls, access credentials, and security protocols to ensure business managers are comfortable storing critical information on their servers. The data is stored in a central repository managed 24/7 by internet security experts. Vendors also perform a threat assessment analysis for each cloud application launched by the company. They constantly work to ensure that the security measures implemented are stronger and more effective. According to KPMG Managing Director Randall Wiele, aside from this, there are many other benefits to focus on avoiding the capital, not only on underlying capabilities but also on constantly updating services. (Barton & Seel (2014).

Now, the business environment or the one-day process changes each new business investment carries a risk, however, BpaaS helps to reduce this risk as a team of professionals with extensive experience in new technologies and processes will be implemented to carry out these activities. Therefore, such an experience could reduce the risks that can come with new systems or growths. As of today, more and more organizations are realizing the benefits of BPaaS or other cloud services to reduce their exposure to risk and are committing to this innovative business approach.

Business Process as a service is intended to automate any business process of a company through cloud services. These cloud services make use of the infrastructure, an application that contains the logic and other details related to the cloud, and these services work collectively. “These cloud services that include software as a service (SaaS), platform as a service (PaaS) and infrastructure as a service (IaaS) are therefore dependent on related services. Another description of BPaaS is that it is a way to automate BPM with the help of very particular software for the business. (Accorsi (2011, July).)

IT Software for Business

1st question

Contextual Information:

· There are two wide used methodologies to manage a software development life cycle: Agile and Scrum. Create a Word Document briefly describing their differences. (word count 500 words).

2nd question

The table below shows the historical data of the Average Closing Price (2005-2020.) Estimate the annual variation of crude oil prices (in %). Use the equation be-low. Draw a line chart showing the evolution of the annual variation and add a trend line and describe its type (positive, negative, neutral). There are 2 historical minimum values reached in 2008 and 2020; relate those minimum values to socio-economic events and include them as labels in the chart. Also read: Software Engineering Methodologies

image1.jpg

  

Year

Average

  

Closing

  

Price

 

2020

38.78

 

2019

56.99

 

2018

65.23

 

2017

50.80

 

2016

43.29

 

2015

48.66

 

2014

93.17

 

2013

97.98

 

2012

94.05

 

2011

94.88

 

2010

79.48

 

2009

61.95

 

2008

99.67

 

2007

72.34

 

2006

66.05

 

2005

56.64

    

· You should submit the spreadsheet used to estimate the annual Change (%)

3rd question

Calculate the annual payment for a loan with an annual constant interest rate of 2%, 35-year duration, a present value of €145,000 and a future value of 0. You should submit the spreadsheet used to estimate the annual payment.

IT communication relationship Leadership development

* APA Format

* Plagiarism-Free

* Refer Textbook attached.

* Answered words should be more than 750 words.

Answer the questions by going through the Textbook and answer each question reasonably.

  

Review chapter 5 of the text.

Q1. What are the recommendations for improving business-IT communication?

Q2. Do you agree with the list?

  

Review chapter 4 in the text.

Q3. Discuss only one of the building block required for a strong business-IT relationship?

  

Review chapter 6 in the text.

Based on your reading, in your own words:

Q4. Discuss the value proposition in investing in IT Leadership development?

Q5. What do you consider are the qualities of good IT Leadership?

  

Review chapter 7 in the text.

Q6. In your own words, discuss the recommendations for creating an effective shared services.

Case Study 2

 Discussion Points 1. Do some Internet research on Chevron’s use of seismic imaging technology. Briefly explain how it works and how it has helped Chevron discover new oil and gas reservoirs.  C6-7 2. Do some Internet research on security vulnerabilities associated with SCADA and digital industrial control systems. Summarize the major security concerns associated with these systems and steps than can be taken to enhance their security. 3. Discuss the pros and cons of moving enterprise-wide applications that have traditionally been supported on premises to the cloud. 4. Do some Internet research on identify management and single sign on systems. Briefly explain how these work and why they are important in business intranets and extranets. 5. Why is it increasing most important for a CIO or IT executive who oversees geographically distributed enterprise networks to be business literate? 

Sources

 [CHEV12] Chevron.com “Seismic Imaging.” Retrieved online: at http://www.chevron.com/deliveringenegy/oil/seismicimaging. [GALL12] Gallant, J. ”Chevron’s CIO Talks Transformation and Why IT Leaders Should Smile.” April 12, 2012. Retrieved online at: http://www.cio.com/article/print/704095. [SCRI11] Scribd.com. “Chevron Corporation CRUSH Report.” August 17, 2011. Retrieved online at http://www.scribd.com/doc/62481977/ChevronCRUSH-Report-09A1. [STAT12] Statistic Brain. “Chevron Company Statistics.” February 12, 2102. Retrieved online at: http://www.statisticbrain.com/chevron-companystatistics/. 

PLEC11

 

Read this Time article and view the video explaining how Russian trolls spread fake news.  Discuss in 500 words whether the government should regulate Facebook more closely.  

Use at least three sources. Use the Research Databases available from the Danforth Library, not Google.  Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Practical Connection

  

Course Description:

Course : Fall 2020 – Application Security (ISOL-534)

This course covers techniques and strategies for securing computers running Microsoft Windows operating systems, and their applications. Focusing on Windows Server 2012 and newer versions, and Windows 10 for clients, the course introduces the Windows operating system platforms and major areas of security vulnerabilities. Students will learn how to assess Windows computers for security vulnerabilities and how to make them more secure.

Course Activities and Experiences:

Students are expected to: • Review any assigned reading material and prepare responses to homework assigned. • Actively participate in activities, assignments, and discussions. • Evaluate and react to each other’s work in a supportive, constructive manner. • Complete specific assignments and exams when specified and in a professional manner. • Utilize learned technologies for class assignments. • Connect content knowledge from core courses to practical training placement and activities

Week 3 Research Paper: Electronic innovation and the government

Find a peer-reviewed scholarly journal article discussing electronic innovation and the government. Complete a review of the article by writing a 3-4 page overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing. 

You should use the UC library (https://www.ucumberlands.edu/library) and/or Google Scholar to find these types of articles (https://scholar.google.com/ )

Once you find the article, you will read it and write a review of it.  This is considered a research article review.

Your paper should meet these requirements: 

  • Be approximately three to four pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Hacking1

Search the Internet and locate an article that relates to the topic of HACKING and summarize the reading in your own words. Your summary should be 2-3 paragraphs(300 words) in length and uploaded as a TEXT DOCUMENT