isi case study 7

 Read the Case Study and answer the “Discussion Points” in a clear but concise way. Be sure to reference all sources cited and use APA formatting throughout. 

Need minimum 2 pages content

presentation final

  

Using an organization that you currently work for or have worked for previously, create a PowerPoint presentation with the following slides:

1. Slide 1: Introduction of the organization

2. Slide 2: History of the organization

3. Slide 3: Your role within the organization

4. Slides 4 – 10: Describe seven of the following elements related to the organization (select 7 of 15)

a. Operations Strategy and Competiveness

b. Product Design and Process Selection

c. Supply Chain Management

d. Total Quality Management

e. Statistical Quality Control

f. Just-in-Time and Lean Systems

g. Forecasting

h. Capacity Planning and Facility Location

i. Facility Layout

j. Work System Design

k. Inventory Management

l. Aggregate Planning

m. Resource Planning

n. Scheduling

o. Project Management

5. Slide 11: Your overall thoughts of the organization

6. Slide 12: References for all slides

For additional content, use the notes view of PowerPoint to include details. Minimize pictures to those that are relevant to the content.

Assessment criteria (25 points per criteria): 

· The presentation makes good use of course concepts/practices/strategies; 

· The presentation demonstrates understanding of Operational Excellence practices; 

· The presentation demonstrates appropriate application of Operational Excellence ideas/concepts /practices/strategies;

· Thoroughness, appropriateness, and creativity demonstrated by the descriptions; clarity, organization, coherence, and correctness (spelling, grammar) of the writing.

Security Architecture and design

 Briefly answer each of these questions. Use APA style for any outside references.

  • What does a peer review process look like?
  • When does an assessment require a peer review?
  • Who should perform the peer review?

HR 5

minimum 500 words

Discuss the following questions: 1. What is Blockchain’s potential for application in the HR functions of recruitment and selection. 2. How might Blockchain technology impact job repositories. Use the following headings to organize your paper: Introduction, Question 1, Question 2, Conclusion, References.

Writing Requirements for All Assignments:

  • References MUST be cited within your paper in APA format. Your reference page and in-text citations must match 100%. Papers without in-text citations will earn failing grades.
  • Always include a cover page and reference page with all submissions
  • Your paper must have headings in it. For discussion posts Introduction, Prompt/Question, and Conclusion will suffice as headings.  
  • Provide the EXACT web link for all online sources – do not provide just the home page, but the EXACT LINK – I check all sources
  • No abbreviations, no contractions – write formally
  • Write in the third person formal voice (no first or second person pronouns)
  • Write MORE than the minimum requirement of the word count assigned
  • As always, the word count is ONLY for the BODY of the paper – the cover page, reference page, and / or Appendix (if included) do not count towards the word count for the paper 
  • Indent the first line of each new paragraph five spaces
  • Refer to the example APA paper in the getting started folder under the content tab if you need an example. Also, a power is provided under the information tab that addresses APA format.
  • Use double-spacing / zero point line spacing, a running header, page numbers, and left justify the margins.

Practical Connection: Security Breach Evaluation

 

Learning Objectives and Outcomes

  • Analyze the given case study on security breach.
  • Recommend controls to avoid an enterprise security breach.

Assignment Requirements

Read the text sheet named “Local Breach of Sensitive Online Data” and address the following:

Using what you have learned about security breaches, describe what measures should have been taken by the educational service and test preparation provider to avoid the security breach mentioned in the text sheet.

You need to prepare a summary report. The report should include the following:

  • Explanation of the security controls that could have prevented the security breach
  • Rationale for choosing the security controls

Required Resources

  • Text sheet: Local Breach of Sensitive Online Data (access_ts_localbreach)

Submission Requirements

  • Format: Microsoft Word
  • Font: Arial, 12-Point, Double-Space
  • Citation Style: Follow your school’s preferred style guide
  • Length: 2 pages
  • Citation Style:  APA with at least 2 Refferences

Self-Assessment Checklist

Use the following checklist to support your work on the assignment:

  • I have raised questions and solicited instructor input on the topics discussed.
  • I have articulated my position clearly and logically.
  • I have supported my argument with data and factual information.
  • I have provided relevant citations and references to support my position on the issue discussed.
  • I have followed the submission requirements.

Discussion 12

Select from the following list four (4) topics and discuss. Use only 70-words max per topic to discuss and present your answer. The discussion questions this week are from Chapter’s 12-13  

(Jamsa, 2013).

Chapter 12 topics:

  • Discuss key items that should be included in an SLA.
  • Define predictive analytics and discuss how an IT manager might use such analytics.
  • Discuss how an IT manager might use load testing on a site.
  • Define and discuss vendor lock-in and identify steps a company should take to mitigate this risk.
  • With respect to cloud-based solutions, list and discuss 5 to 10 operations or tasks an IT manager should oversee.

Chapter 13 topics:

  • List and describe common system requirements one should consider before moving an application to the cloud.
  • Discuss why a company should consider using a consultant to oversee a cloud migration and list specific skills you would expect the consultant to have.
  • List and discuss resource utilization characteristics one should monitor for an application prior to moving the application to the cloud.
  • List possible training requirements for an SaaS solution integration, a PaaS application migration, and an IaaS application migration.
  • List and describe budget considerations one should evaluate before moving an application to the cloud.
  • List and describe IT governance considerations one should evaluate before moving an application to the cloud.
  • Define and describe cloud bursting.

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions.  

ITS 831 INFOTECH IMPORT IN STRAT PLAN

 

If you have you been involved with a company doing a redesign of business processes, discuss what went right during the redesign and what went wrong from your perspective. Additionally, provide a discussion on what could have been done better to minimize the risk of failure. If you have not yet been involved with a business process redesign, research a company that has recently completed one and discuss what went wrong, what went right, and how the company could have done a better job minimizing the risk of failure.

Your paper should meet the following requirements:

• Be approximately 2-4 pages in length, not including the required cover page and reference page.

• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

New ERP system and network

 

The customer is very happy with their new ERP system and network. The performance of the network and user applications exceeded their expectations. The CIO stated he was very happy they went with PostUTech’s custom solution and that the alternative Cloud SaaS service he evaluated just didn’t seem mature enough for their needs. Discuss your thoughts on future Cloud Use for this customer with your team members.

  • Why is “The Cloud” a hot buzzword? What advantages does it offer? 
  • What are some of the challenges faced by Cloud technology and why might it not be the right solution for every business?
  • Give an example of a SaaS cloud provider. Would this be a good option for your customer in the future?  Try to use a different example from your team members.

Develop a Computer/Internet Security Policy

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy
  • Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

 Include at least 3 scholarly references in addition to the course textbook. At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.