6 PAGE PAPER

 

Phase II: the Course Project (comprised of Phase I and II) – Recommend solutions to the potential weaknesses from either the Aircraft Solutions or Quality Web Design Company

In this phase of the project you will include Part I (presumably improved as needed based upon Week 3 feedback) and then you will recommend solutions for the security weaknesses you identified in the Phase I.

Definition of the solution – Hardware solutions must include vendor, major specifications with an emphasis on the security features, and location of placement with diagram. Software solutions must include vendor and major specifications, with an emphasis on security features. Policy solutions must include the complete portion of the policy that addresses the weakness identified. Any outsourced solution must include the above details and the critical elements of the service level agreement.

Justification – You must address the efficacy of the solution in terms of the identified threats and vulnerabilities; the cost of the solution, including its purchase (if applicable); and its implementation, including training and maintenance.

Impact on business processes – You must discuss any potential positive or negative effects of the solution on business processes and discuss the need for a trade-off between security and business requirements using quantitative rather than simply qualitative statements.

Other required elements include:

  • Cover sheet
  • APA-style
  • In-text citations and Reference section
  • 5 reference minimum
  • Minimum length of solutions: 6 pages, maximum length 10 pages (not counting cover sheet, diagram(s), references). Do not exceed the maximum length.

paper

 

This week, you have read about server virtualization and cloud computing in chapter 6 of your textbook. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

 • Describe the organization’s environment, and evaluate its preparedness for virtualization.

• Explain Microsoft (or another product) licensing for virtualized environments.

• Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization.

• Explain Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure’s Internet as a Service (IaaS) and storage capabilities

Make a recommendation for cloud computer use in the organization, including a justification for your recommendations.

Submit your midterm research paper as a single document. Your paper should meet the following requirements:

• Be approximately four to six pages in length (1200-1800 words), not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

A3

Attached is the document contains the question. Include at least 4 APA formatted references (and APA in-text citations). The assignment is 3 pages in length. Go through the word document for further details.

Honor and Emotional Reactions

Honor and Emotional Reactions
Click here to read the APA ethical principles of psychologists and code of conduct.
Using the Online Library, search the article, “A Bumpy Train Ride: A Field Experiment on Insult, Honor, and Emotional Reactions.”
Pay special attention to the Method section. Summarize the purpose of the study. Think about the specific issues or points they should have covered in the debriefing session. Consider the APA ethical requirements. Write the specific things the investigators would have had to include during the debriefing session if the study had been conducted in the United States. Explain why the investigators would have to include these specific things. Compile your work in a 1- to 2-page Microsoft Word document.
Submission Details:
Support your responses with examples.
Cite any sources in APA format.
Name your document SU_PSY2061_W9_A1_LastName_FirstInitial
Submit your document to the Submissions Area by the due date assigned.

700 word discussion: From this context, what is the functional role of the ICT? Identify and name the functional role of the ICT, and provide a narrative to support your response.

Chapter 19 – The digital divide remains formidable in scaling information and communication technology (ICT)-enabled opportunities for effective leadership and development in countries lagging behind, (Ahmed, 2015).  Based on the case study, the authors reminded us that, the practice of e-Participation provides an avenue for adaptation, application, and utilization of ICT as a subset of e-Commerce, in the realm of e-Democracy and, it is a concept needed to bridge the existing digital gap within and across countries in a global context. 

From the chapter, we learned that as the world moves at a faster and voluminous pace, there is a need to acquire technology and the skill to use it, as is increasing at the rate beyond those societies that are unable to remedy their inadequacies.  However, the challenges to meet this pressure could be enormous, but not insurmountable, and the means to address such challenges are abundantly available in ICT-supported processes like e-Participation.   

Question:  From this context, what is the functional role of the ICT? Identify and name the functional role of the ICT, and provide a narrative to support your response.

BI

find information about IBM Watson’s activities in the healthcare field. write a report
include  two APA formatted references (and APA in-text citations) 

Discussion

Define wireless metropolitan area networks (WMANs) and explain why they are needed and outline the security features of WMANs.